Skip to main content

Home/ LumpysCorner/ Group items tagged blogging marketing

Rss Feed Group items tagged

John Lemke

Growing Your Blog One Reader At a Time - 0 views

  • Building your blog’s foundation requires some significant work if you want it to stand the test of time.
  • I’m talking about real people who engage with you in regards to your blog on a regular basis
  • the more you post the faster your blog will grow.
  • ...1 more annotation...
  • a great headline
John Lemke

Blog Marketing: 4 Steps for Drawing Attention to Your Posts - 0 views

  •  
    This post makes some good points and is going beyond the obvious ones of daily posting, etc.,
John Lemke

9 Irresistible Incentives That'll Grow Your Email List Like Crazy - 0 views

  • Unless they see the value of joining your list, they simply won’t invest any of those valuable minutes in you and your blog.
  • Do something for me and I’ll do something for you. In this case, the bribe is “give me your email address and I’ll give you something that isn’t freely available on my blog.”
  • Minimum requirements: Useful and engaging content, whether unique to the bribe or already published on your blog, that you can easily break into pieces. On the technical side, you’ll need an email newsletter service (e.g. Mailchimp, AWeber (aff), etc.) with an autoresponder feature ($10-20/month).
  • ...2 more annotations...
  • Minimum requirements: A word processor like Microsoft Word, Apple Pages or OpenOffice Writer is sufficient for creating a simple cheat sheet, but for a more sophisticated end product, you might require a desktop publishing package such as Adobe InDesign, Microsoft Publisher, or QuarkXPress. Alternatively, you can use a cheat sheet tool like Cheatography to generate cheat sheets based on a default template.
  • Minimum requirements: Your chosen word processor is enough to create a basic template, but to make it even more visually appealing, consider using some simple design elements such as colors, backgrounds and borders. If the template is meant to be printed, you can convert your .docx or .pages file into a downloadable PDF for your readers’ convenience.
John Lemke

How to Find Inspiration for Your Blog Posts (38 Experts Reveal Their Secrets) | The Cre... - 0 views

  •  
    While a writer must write whether motivated or not, it is nice to hear how others deal with inspiration.
John Lemke

» "Is there really writing work out there?" : Freedom With Writing - 0 views

  • How, then, do writing opportunities work? To be paid for writing, you need to look for a person with two characteristics: They’ve got money to spare. They’re looking for writers. This could be: A magazine editor who is looking for feature articles. An aristocrat or multi-billionaire who wants to support the career of an aspiring artist. A blogger who makes money from advertisements, or from selling information products, but is too busy to do all their blogging themselves. A book publisher who is looking for the next Da Vinci Code or Harry Potter. A business owner who needs help from a writer to promote their business. Do you see where this is going? There are writing opportunities out there, if you know where to look, and if you know the right people.
  • First, the more money a potential client has, the more they’ll be willing to pay you. Bloggers and content creators don’t typically earn much money from advertising. That’s why revenue sharing sites, which share advertising revenue with writers in exchange for content, often pay a relatively low rate. Magazine editors and book publishers are somewhere in the middle. They pay reasonably well, but they’re looking for extremely high quality, so you’ve got to be real good to get their attention. Business owners who have a steady income usually pay the most generous fees to writers. Businesses have a budget for marketing, so they’ve got cash to splash.
John Lemke

What happens with digital rights management in the real world? | Technology | theguardi... - 0 views

  • In 1997's Bernstein v United States, another US appeals court found that code was protected expression. Bernstein was a turning point in the history of computers and the law: it concerned itself with a UC Berkeley mathematician named Daniel Bernstein who challenged the American prohibition on producing cryptographic tools that could scramble messages with such efficiency that the police could not unscramble them. The US National Security Agency (NSA) called such programs "munitions" and severely restricted their use and publication. Bernstein published his encryption programs on the internet, and successfully defended his right to do so by citing the First Amendment. When the appellate court agreed, the NSA's ability to control civilian use of strong cryptography was destroyed. Ever since, our computers have had the power to keep secrets that none may extract except with our permission – that's why the NSA and GCHQ's secret anti-security initiatives, Bullrun and Edgehill, targetted vulnerabilities in operating systems, programs, and hardware. They couldn't defeat the maths (they also tried to subvert the maths, getting the US National Institute for Standards in Technology to adopt a weak algorithm for producing random numbers).
    • John Lemke
       
      This is also why they have a hard on for developing a quantum computer.
  • An increase in the security of the companies you buy your media from means a decrease in your own security. When your computer is designed to treat you as an untrusted party, you are at serious risk: anyone who can put malicious software on your computer has only to take advantage of your computer's intentional capacity to disguise its operation from you in order to make it much harder for you to know when and how you've been compromised.
  • The DMCA's injunction against publishing weaknesses in DRM means that its vulnerabilities remain unpatched for longer than in comparable systems that are not covered by the DMCA. That means that any system with DRM will on average be more dangerous for its users than one without DRM.
  • ...4 more annotations...
  • For example, in 2005, Sony-BMG music shipped a DRM called the "Sony Rootkit" on 51m audio CDs. When one of these CDs was inserted into a PC, it automatically and undetectably changed the operating system so that it could no longer see files or programs that started with "$SYS$." The rootkit infected millions of computers, including over 200,000 US military and government networks, before its existence became public. However, various large and respected security organisations say they knew about the Sony Rootkit months before the disclosure, but did not publish because they feared punishment under the DMCA. Meanwhile, virus-writers immediately began renaming their programs to begin with $SYS$, because these files would be invisible to virus-checkers if they landed on a computer that had been compromised by Sony.
    • John Lemke
       
      How the Sony DRM created serious security issues.  It should also be considered a violation of our civil rights.  Who the hell gave Sony permission to modify my OS!  Furthermore why didn't the OS companies sue Sony?  Likely because they are in bed together.
  • If I was a canny entrepreneur with a high appetite for risk -- and a reasonable war-chest for litigation – I would be thinking very seriously about how to build a technology that adds legal features to a DRM-enfeebled system (say, Itunes/Netflix/Amazon video), features that all my competitors are too cowardly to contemplate. The potential market for devices that do legal things that people want to do is titanic, and a judgment that went the right way on this would eliminate a serious existential threat to computer security, which, these days, is a synonym for security itself.And once anti-circumvention is a dead letter in America, it can't survive long in the rest of the world. For one thing, a product like a notional Itunes/Amazon/Netflix video unlocker would leak across national borders very easily, making non-US bans demonstrably pointless. For another, most countries that have anti-circumvention on the books got there due to pressure from the US Trade Representative; if the US drops anti-circumvention, the trading partners it armed-twisted into the same position won't be far behind.I've talked to some lawyers who are intimate with all the relevant cases and none of them told me it was a lost cause (on the other hand, none of them said it was a sure thing, either). It's a risky proposition, but something must be done. You see, contrary to what the judge in Reimerdes said in 2000, this has nothing to do with whether information is free or not – it's all about whether people are free.
  • The DMCA is a long and complex instrument, but what I'm talking about here is section 1201: the notorious "anti-circumvention" provisions. They make it illegal to circumvent an "effective means of access control" that restricts a copyrighted work. The companies that make DRM and the courts have interpreted this very broadly, enjoining people from publishing information about vulnerabilities in DRM, from publishing the secret keys hidden in the DRM, from publishing instructions for getting around the DRM – basically, anything that could conceivably give aid and comfort to someone who wanted to do something that the manufacturer or the copyright holder forbade.
  • Significantly, in 2000, a US appeals court found (in Universal City Studios, Inc v Reimerdes) that breaking DRM was illegal, even if you were trying to do something that would otherwise be legal. In other words, if your ebook has a restriction that stops you reading it on Wednesdays, you can't break that restriction, even if it would be otherwise legal to read the book on Wednesdays.
John Lemke

USB Implementers Forum Says No to Open Source - 0 views

  • Please immediately cease and desist raising funds to purchase a unique USB VID for the purpose of transferring, reselling or sublicensing PIDs and delete all references to the USB-IF, VIDs and PIDs for transfer, resale or sublicense from your website and other marketing materials.
  • Arachnid Labs had an interesting idea to solve this problem. Since other USB device vendors such as Microchip and FTDI give away USB PIDs for free, a not for profit foundation could buy a VID, give PIDs away to foundation members making open source hardware, and we would all live in a magical world of homebrew devices that are certified as USB compliant.
John Lemke

Writer Unboxed » A 'Logic Model' for Author Success - 0 views

  • in this age of the “writer as an entrepreneur” responsible for a growing share of the work required to not only create but also sell a book, adding management skills to our repertoire of abilities is not at all a bad idea.
  • as launch time approaches, authors get overwhelmed by thinking that they have to do “everything:” Twitter, Facebook, Goodreads, ad campaigns, bookstore talks, conference panels, media articles, email newsletters, book clubs…you name it.
  • what our goals are beyond sales
  • ...2 more annotations...
  • Based on our mission and our definition of success, we can then work out a manageable set of steps to take in line with our specific interests and goals. We feel more in control and less anxious about having to “do it all.”
  • A more viable definition of success does have a quantitative element, but it doesn’t necessarily mean “number of copies sold or dollars earned.” It can mean other measurable outcomes such as landing a teaching job or a column in a respected publication.
1 - 8 of 8
Showing 20 items per page