6 Ways to Leverage Technical Articles

Technology vendors often contribute bylined articles to trade journals. The articles are great exposure for these companies but they don't come cheap ? the trades rarely pay for these articles but the vendors spend time and resources to assign pieces, write them, approve them and submit them. Your PR agency can help your clients leverage their investment by wringing top value out of these articles. Here are some possibilities:

  • Reprints

  • White papers

  • Product briefs

  • Booklets

  • Speech outline and handouts

    Reprints

    It's pretty galling to contribute a byline to a publication, only to turn around and spend major bucks for reprint rights. But reprints are good things: they significantly increase your client's exposure to the market. Make sure you use the reprints anywhere you can, including press kits, presentation handouts and conference take-aways. Post them on your site too. Even if you haven't paid for electronic rights you can probably link to the publication's URL, assuming they've posted your article online. (It doesn't hurt to ask.) If you've got digital reprint rights and are posting the article on your client's site, avoid using a scanned hard copy of the printed article ? the resolution is poor and not very readable. Create a .PDF file and use that for posting and downloading.

    White Paper

    Please don't use the published article as is for a white paper -- even if you retain all rights it's shamelessly self-plagiarizing, and if the publication retains all rights it's rather criminal. However, you can use the article text to form the technology section of a white paper. Edit for length as necessary and re-work the text to emphasize your client's product and technology take. Then add white paper elements like a beginning executive summary and a problem statement. Follow these with your technology section, and then add details on how your client's product will solve the problem, a customer case study, and a conclusion on how great the product is. (You can always switch the order by writing a white paper first, then editing the technology section into a bylined trade journal article.)

    Product Briefs

    The article can serve as a great basis for expanded product briefs ? say the front and back of an 8-1/2x11, or a longer technical brochure. Edit the article for length and jazz up the text, and you've got a solid technology basis for the marketing document. (Good marcom can explain what a NAS gateway is, but not by yammering about "enterprise-wide intelligent data management portals." Puts readers right to sleep.)

    Booklets

    One of the best press kits I ever saw included a sharp and informative booklet on the vendor's technology. The booklet explained the general technology's development and background, presented the vendor's product, and listed clear customer advantages. It impressed both journalists and customers in a way a press release or even a white paper wouldn't have done. Booklets are labor-intensive, so use your trade journal article as the basis for writing your own.

    Speech Outline and Handouts

    Use existing articles as the basis for client speeches and presentations. Since trade journal articles are usually vendor-neutral, they'll work as-is for similar talks. When the presentation is about a product you can still use the article outline for the background technology and analysis then add product details, customer case studies, and Q&A's. You can use article reprints as a handout, or turn the outline into speaker's notes and use that instead.

    If your client gulps at the cost of developing a trade journal article, don't leave them gasping for breath ? list all the ways they can leverage it to increase market exposure and profits.

    --

    Christine Taylor is president of Keyword Copywriting, which helps marketing and PR pros leverage their relationships with technology clients. E-mail her at chris@keywordcopy.com, call her at 760-249-6071, or check out Keyword's Website at chris@keywordcopy.com

    About The Author

    Christine writes technical marketing communications for data storage, networking and pharmaceutical clients, including:

    EMC

    Commvault

    Quantum

    StoneFly Networks

    Sybase

    Maranti Networks

    ClariStor

    Fujitsu

    AES

    Obagi Medical Products

    She specializes in trade journal articles, white papers, press kits and online content. She serves as a contributing editor to Computer Technology Review and acts as editor-in-chief for Storage Inc. and Storage Management Solutions.

    Before moving into technical journalism and marketing she served 20 years in the IT trenches, including systems administration at Avery Dennison's Research and Development division.

    chris@keywordcopy.com

    no-contract cleaning service Mundelein ..
    In The News:

    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
    New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
    FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
    New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
    OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
    Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
    New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
    DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
    Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
    Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
    Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
    A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
  • Apotheosis - the Seminal Insight of the Hero for Screenwriting

    Every hero has a seminal insight - the apotheosis. Once... Read More

    Recipe for a Style Guide

    Wired Online has recently announced its plans to drop capitalization... Read More

    Writing Dialogue That Make Your Characters Come Alive

    Characters in a good novel really carry the story along... Read More

    How to Build Your Site with Other Peoples Content -- Part 1

    Building a new website can be extremely exciting. Seeing your... Read More

    How to Create Incredible Characters Easily

    Creating incredible characters can be easy if you know of... Read More

    To Outline Or Not To Outline

    Ah, the age-old writer's debate--to outline or not to outline?Outlines... Read More

    Writing Tips For Novice Authors

    If you are reading this article then you probably have... Read More

    Understanding The First Rule Of Writing ? Before You Start The Great American Book

    Chaos and confusion come when established rules and procedures are... Read More

    Nobody Likes A Rambler

    We all know people who ramble. They include every boring... Read More

    Writing Press Releases That Get Noticed

    Among the various foolproof methods used to boost traffic to... Read More

    How You Can Take Advantage of the Increasing Demand for Freelance Online Writers

    The freelance writing market is a growing market to be... Read More

    Common Writing Mistakes - Are These Holding You Back From Writing Success?

    During the years that I've been teaching writing and participating... Read More

    Top 7 Writers Sites for 2005

    If you dream of turning your book into a best... Read More

    Does The Title Reflect The Story?

    Short Story Writing Tips ?We all have different tastes in... Read More

    Writing as a Gift

    What am I supposed to give Anthony as a wedding... Read More

    Writing for Local Veterinary Hospitals

    Freelance writer STANLEY BURKHARDT has a passion for animals. He... Read More

    Local Knowledge: Background and Historical Setting in Novels

    You're writing a story set in your local city, but... Read More

    How To Self-Publish Your Own Books, Manuals, Reports Or Newsletters

    You can make a lot of money by writing and... Read More

    Greatness

    [When I was a nineteen-year-old high school student and budding... Read More

    How To Build A Successful Freelance Editorial Career

    In the current job market, many editorial freelancers have turned... Read More

    Does Each Element of Your Story Further The Theme?

    Creative Writing Tips ?Whichever theme you choose, all the elements,... Read More

    The Power of Punctuation

    Punctuation, when used creatively, is powerful. Note, however, that when... Read More

    Using Technology to Improve Your Final Draft

    One Saturday afternoon, I sat in a packed conference room... Read More

    Creative Problem-Solving: Following Your Stream of Consciousness

    Having trouble finding a solution to a nagging problem? Try... Read More

    Character Motivation - Always Ask WHY

    For many years, I've been a tutor for students undertaking... Read More

    maid service near Glenview ..