MDM Phone-chain


People want to work with the electronic tools they bring to the office or wherever else they spend their time, not with the school supplies handed to them by their employers.

These would be the “CI” (company-issue) phones and tablets, i.e., having to toggle ceaselessly between “their” phone and the company’s. Makes perfect sense. So we were encouraged the other day to hear a senior IT executive of a Fortune 50-sized enterprise describe his contempt for the MDM thrust of trying to manage people away from what they want to do.

“I want to enable people to work the way they’re most comfortable and productive,” he said.  Imagine that.  A major dude who sees himself as an enabler of the people who do the work that pushes his company forward.  “This includes me,” he added.  So he’s pushing a strategy of security that protects proprietary information and privacy while maximizing productivity. A non-trivial task, to be sure, but considering the alternative of falling behind his like-minded competitors it’s a mission he must accomplish. Encumbered employees aren’t anywhere near peak performance and never will be.

Technology must enable, not obstruct: simple concept, often misinterpreted. Leave people to their own devices and ensure productive results.

When he’s not ranting on this blog or creating content at Write Angle, Stan DeVaughn serves as senior consultant in customer development and marketing at RightOn Mobile, Inc. a developer of location-based security products for a mobile, BYOD workforce.

Photo © Mhristov



Illuminated iPhone 5 Apps screen on a computer keyboard Editorial Photography

© Paul Radulescu

OK, so Google brand just elbowed Apple brand out of the way in the nonstop roller derby of world’s most valuable  brand. So what? So this means that Apple’s time in the sun as Master of the Innovation Universe is history? Don’t bank on it.

In an innovation slug-fest, in which the physics associated with mega companies makes it ever more difficult to stop-and-pivot on a dime, big cash reserves can buy a lot of innovation. Why do you think Google/YouTube is in perpetual shopping mode? Ditto Apple. Double-ditto Facebook.  Each of these cash-laden titanosaurs has strengths and weaknesses. And, when you blow away all the smoke,  GOOG is at heart a search engine, FB is a social network and AAPL manufactures consumer electronics and computer software products.

As long as Apple makes and sells things with which people actually do things–and without which those users would be incapable of searching anything and/or posting incessant updates, it’s going to have the inside track in the value derby.


Small Big Business Handshake Size









© Dave Bredeson


Financing your tech venture, especially product development, may require sources of funds untypical of VCs or Angels. It might point to a source you may not have considered: a potential customer, ideally one with deep pockets and a history of early adoption.

In certain cases, the right corporate customer may want to explore the possibility of influencing a tailored product, especially an I.T. solution.

If this sounds like you, here are a few essentials your appeal for financing should address:

>Spotlight your team’s experience/accomplishment in similar projects such as the one you’re proposing. What can you tell them that will inspire confidence that you can execute? Put yourself in their shoes. What would inspire you?

>Describe a scenario or two or three by which your target can gain a better understanding of the way you think about approaching the kinds of problems you’re purporting to solve — and delivering what would amount to a beta release.

>To the best of your knowledge, what resources do you need to mount the type of project you’re proposing: how much money are you looking for and where will it go?

Your objective for meeting #1 is simple: get invited to meeting #2. You want the discussions to continue. But no matter if there’s is a second meeting or not, you will leave the first one with invaluable information about customers and product requirements. This is pure gold. Be prepared with questions of your own as well as clear, candid and confident answers to the ones they ask you.


BYOD Bring your own Device Tablets Icon Cloud and
About a year ago, Stanford University’s information systems (SUNet) suffered a sophisticated and serious breach evidently originating from a quasi-governmental entity in Asia, according to the May/June issue of Stanford Magazine. It was a first for Stanford and, from all accounts, it was the cyber equivalent of the Loma Prieta 1989 earthquake. It penetrated the core of SUNet’s authentication systems. Yes, this was serious.

Fortunately thus far for Stanford and its SUNet users, there’s been no evidence of compromises to personal information such as Social Security and credit card numbers, or personal health information.

“But the attack shook us up,” said Stanford’s Randy Livingston, vice president of business affairs.  When you consider that campus operations involve more than100 merchants who accept credit cards, you can appreciate Livingston’s post-traumatic stress.

In fact, Stanford is not alone among American universities incessantly subjected to attacks that are made all the more harrowing and potentially disastrous due to the rampant BYOD culture of college campuses. Not to mention the inherent resistance to the BYOD mandates so common among businesses today. There’s no way to prevent security breaches, of course, especially when they’re conducted by forces at the governmental level.  Still, in the post-BYOD era, layered security is the best bet. It’s useful to think home security here, where we have alarm systems and locks on our doors and windows. It’s not an either/or, it’s both. And then some.


When he’s not ranting on this blog, Stan DeVaughn oversees customer development and marketing at RightOn Mobile, a BYOD security start-up in stealth mode, and collaborates with agency partner Peter Davé at Write Angle, Silicon Valley’s premiere content-development specialists for the tech industry.

I consult for a stealth start-up in the BYOD-security category. Which, in case you haven’t noticed, is giving new meaning to the term “saturated”. What I pointed out to them this week has a nearly universal resonance for marketers and entrepreneurs of all stripe, beyond IT, BYOD, MDM, or most other acronyms.It boils down to this: it’s mission-critical for your customer outreach and content, in all their multiple forms, to depict your solution exclusively through the eyes of the folks whose attention you seek. You need every talking point (and everything backing it up) to convey user-centric content. Exclusively.

So, you can never know too much about your user’s world. And you must see this world through their eyes, knowing everything there is to know–at least to the extent that you can. This and this alone enables you to present a forceful case for yourself as the solution of choice — the most comprehensive value proposition in a category saturated with alternatives.

Start by rigorously stripping out of your website any and all things that could give the impression that your approach is just a derivative of seeing your target users through the prism of your solution.  This, BTW, is how practically all vendors sound to their target customers. Same thing applies to oral delivery. Unless you stand out, you stand down.

The more you know your user’s world, the more authoritative and diligent and rigorous you appear. This will resonate with a senior IT types, whether they’ve risen through the ranks of government or are the ones who’ve helped build successful start-ups.

What are you doing to infuse your content with this P.O.V.? What do your latest Google analytics and Webmaster tools telling you?

When he’s not ranting on this blog, Stan DeVaughn is senior consultant for customer development and marketing at RightOn Mobile, Inc. and creative director at Write-Angle, the premiere content-development agency in Silicon Valley.
Benefit Stock Image - Image: 31592611
© |


A new client of ours has an old problem: how to explain a complicated technology in simple terms. On the web. Never a simple job but that’s why we get hired.

The mission: Explain to the IT customer how the client’s network-as-a-service technology worked as way to get this customer to better understand what he was buying and why.

To our way of thinking, the key to an effective description of a product’s inner workings is to keep the ultimate benefit of the product foremost in mind.  Here’s where many tech companies stumble. In our experience, letting the technological features muddy what will actually benefit the customer will confuse the story. To their credit, our client understood this from the outset. They sought to de-complicate, not over-complicate.

So, what to do? We
start by digesting every piece of existing material the client can furnish us, as well as all the industry information.  When this falls short, it’s incumbent upon the content creation agency (that’s us) to articulate how the client’s I.P. or core technology does what it does. Very often, the language simply doesn’t exist. Yet.

Engineers are rightfully proud of their work. Their products can be marvels of creativity and technical know-how. What’s overlooked sometimes, however in the hectic environments of hacking out code at breakneck speed — ever-expanded functionality and getting a new release into beta test — is recognition of the simple need a customer has to experience a benefit.

Keeping this in mind as you dissect and explain what’s going on under the hood of your offering helps create the arc of the story and clarifies how the many strands of technology come together to create the fabric of the benefit.  Engineers weave features. And while many IT customers appreciate an understanding of the technology behind these features, what you want them to do is buy the benefits those features deliver.

When he’s not ranting on this site or directing global branding and communications for FilterMag,  Stan DeVaughn’s observations can be read on The Write Stuff along with those of his agency compatriot Peter Davé.

Jobs At Times Stock Photography - Image: 21501032



Everything you need to know about how to do big-time PR you can learn by studying Apple. Forget what you read in “best practices” uncovered in searches. They’re for drudges.

September 10 is the rumored date for unveiling the next iPhone.  But consider: Apple, for years, has pulled off what might be termed the 4X formula for media-blitz announcements.  Since the early ’80s Apple has earned at least quadruple the exposure that anybody else has. Far in advance of any pending announcement, then right before the announcement, then the announcement itself, and finally during the aftermath analysis and review of the announcement. It’s happening right now, with the latest “big announcement”.

Since the beginning, AAPL flouted every PR principle you read about in the marketing tomes and the bibles of firms like H&K, Burson-Marsteller, Edelman and all the rest. Apple makes nice with the media when it wants something from them. Then ices them when it senses a lack of fealty. And gets away with it. The media reaction? Kinda like the fraternity paddling scene in Animal House : “Thank-you, sir!  May I have another?”

When he’s not ranting on this site or directing global branding and communications for FilterMag,  Stan DeVaughn’s observations can be read on The Write Stuff along with those of his agency compatriot Peter Davé.