6 Ways to Leverage Technical Articles

Technology vendors often contribute bylined articles to trade journals. The articles are great exposure for these companies but they don't come cheap ? the trades rarely pay for these articles but the vendors spend time and resources to assign pieces, write them, approve them and submit them. Your PR agency can help your clients leverage their investment by wringing top value out of these articles. Here are some possibilities:

  • Reprints

  • White papers

  • Product briefs

  • Booklets

  • Speech outline and handouts

    Reprints

    It's pretty galling to contribute a byline to a publication, only to turn around and spend major bucks for reprint rights. But reprints are good things: they significantly increase your client's exposure to the market. Make sure you use the reprints anywhere you can, including press kits, presentation handouts and conference take-aways. Post them on your site too. Even if you haven't paid for electronic rights you can probably link to the publication's URL, assuming they've posted your article online. (It doesn't hurt to ask.) If you've got digital reprint rights and are posting the article on your client's site, avoid using a scanned hard copy of the printed article ? the resolution is poor and not very readable. Create a .PDF file and use that for posting and downloading.

    White Paper

    Please don't use the published article as is for a white paper -- even if you retain all rights it's shamelessly self-plagiarizing, and if the publication retains all rights it's rather criminal. However, you can use the article text to form the technology section of a white paper. Edit for length as necessary and re-work the text to emphasize your client's product and technology take. Then add white paper elements like a beginning executive summary and a problem statement. Follow these with your technology section, and then add details on how your client's product will solve the problem, a customer case study, and a conclusion on how great the product is. (You can always switch the order by writing a white paper first, then editing the technology section into a bylined trade journal article.)

    Product Briefs

    The article can serve as a great basis for expanded product briefs ? say the front and back of an 8-1/2x11, or a longer technical brochure. Edit the article for length and jazz up the text, and you've got a solid technology basis for the marketing document. (Good marcom can explain what a NAS gateway is, but not by yammering about "enterprise-wide intelligent data management portals." Puts readers right to sleep.)

    Booklets

    One of the best press kits I ever saw included a sharp and informative booklet on the vendor's technology. The booklet explained the general technology's development and background, presented the vendor's product, and listed clear customer advantages. It impressed both journalists and customers in a way a press release or even a white paper wouldn't have done. Booklets are labor-intensive, so use your trade journal article as the basis for writing your own.

    Speech Outline and Handouts

    Use existing articles as the basis for client speeches and presentations. Since trade journal articles are usually vendor-neutral, they'll work as-is for similar talks. When the presentation is about a product you can still use the article outline for the background technology and analysis then add product details, customer case studies, and Q&A's. You can use article reprints as a handout, or turn the outline into speaker's notes and use that instead.

    If your client gulps at the cost of developing a trade journal article, don't leave them gasping for breath ? list all the ways they can leverage it to increase market exposure and profits.

    --

    Christine Taylor is president of Keyword Copywriting, which helps marketing and PR pros leverage their relationships with technology clients. E-mail her at chris@keywordcopy.com, call her at 760-249-6071, or check out Keyword's Website at chris@keywordcopy.com

    About The Author

    Christine writes technical marketing communications for data storage, networking and pharmaceutical clients, including:

    EMC

    Commvault

    Quantum

    StoneFly Networks

    Sybase

    Maranti Networks

    ClariStor

    Fujitsu

    AES

    Obagi Medical Products

    She specializes in trade journal articles, white papers, press kits and online content. She serves as a contributing editor to Computer Technology Review and acts as editor-in-chief for Storage Inc. and Storage Management Solutions.

    Before moving into technical journalism and marketing she served 20 years in the IT trenches, including systems administration at Avery Dennison's Research and Development division.

    chris@keywordcopy.com

    cleaning team near Winnetka ..
    In The News:

    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
    OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
    South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
    Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
  • A Freelancers Journey, Part One

    Today it begins.I have always known I was a freelancer.... Read More

    How NOT to Get a Freelance Writing Job

    In the business of freelance writing, it's not enough to... Read More

    The Dreaded Daily Word Count

    Open any book on 'how to write,' and somewhere you... Read More

    Every Result is an Asset

    Not long ago, I went to an Internet Marketing Seminar.... Read More

    Italics Part 1 - Do You Need to Use Italics?

    Next time you're tempted to use italics for emphasis... STOP!"Why?"... Read More

    Beginners Blues: How to Collect Samples, Testimonials, and References as a Freelancer

    Beginner's Blues: How to Collect Samples, Testimonials, and References as... Read More

    Starting a Local Writers Group

    My husband is no poet, so when I offer my... Read More

    Do You Plot With Your Character In Mind?

    Creative Writing Tips ?You are plotting the story. You write... Read More

    Writing Without Style

    Style manuals are all well and good, and in fact,... Read More

    6 Tricks To Squeeze Your Letters Onto One Page

    Anyone who has read any of my articles on the... Read More

    Frequently Asked Questions from Writers

    1. What Is A Premise?A premise is the point you... Read More

    Amazing Ways Writing Articles Can Improve Your Business

    How to get a lot of traffic to your website... Read More

    To Write Successful Business & Academic Communications, Learn the Architecture of a Story

    Human beings seem to be born with a gene for... Read More

    Effective Collaboration - Working With Your Ghostwriter

    Using a ghostwriter to craft your free reprint articles and... Read More

    Become an Instant Author by Playing Well with Others

    You wrote a tips booklet. Maybe more than one. Oh... Read More

    Its All About YOU!

    The Hottest Word on the WebDid you know marketing people... Read More

    Top Ten Reasons Its Great To Be A Writer

    10 - You will always have a job. As long... Read More

    How To Write for the Web

    The Scanning ReaderWriting for the Web is different than writing... Read More

    Childrens Stories - The Essentials

    There is no specific formula for children's fiction. There are,... Read More

    How Long is a Chapter?

    How long should your chapters be?I can't resist... I have... Read More

    A Book Note Vs a Book Report

    IntroductionSince our early days of elementary education we have been... Read More

    Which Comes First - Short Story Or Novel?

    A writer writes. Bet you've heard that one... Read More

    How To Be A Published (Non-Fiction) Author

    1. Turning your idea into a bookWith non-fiction books the... Read More

    Is Horror Dead?

    I've noticed a big shift away from traditional horror recently,... Read More

    Writing Business Letters That Get The Job Done

    Despite the widespread use of e-mail in commerce today, traditional... Read More

    family-safe home cleaners Northbrook ..