How to Increase Awareness of Your Company’s Offerings With Blog Posts (A Repurpose)

How can blog posts increase the awareness of your identity/biometric or technology company’s products and services? I’m going to explain how in this blog post. 

By the way, this is a rewrite of my more technical Tuesday blog post “How Can Your Technology Company Increase Product Benefit Awareness Right Now?” Because you can rewrite blog posts when you feel like it.

Why a funnel?

Imagine there’s a funnel. It’s easy if you try. But this funnel doesn’t stream water, but people. (Or wombats.)

The funnel. Imagen 4.

In this funnel, the people (or wombats) who are potentially interested in your offering—your prospects—start at the very top. The few who actually buy your offering emerge from the bottom. 

But how do you get people to enter the funnel and become aware of your offering?

How can blog posts help you?

One great way to let people know about your offering is by blog posts such as this one. 

Blogs are a fast way to tell your prospects how your offering can help them. And you can create blog posts very quickly, within days or even hours. 

If you want to make prospects aware of your company’s service, write a blog post.

What can Bredemarket offer to you?

One of Bredemarket’s offerings is…writing blog posts for other companies. I can help your identity/biometric or technology company write blog posts so you can get more people to learn about your services.

If you want to learn how I can help your company write blog posts, visit bredemarket.com/mark.

Artificial Intelligence Body Farm: Google AI Grows a Basilar Ganglia

(Imagen 4)

Last month I discussed Google’s advances in health and artificial intelligence, specifically the ability to MedGemma and MedSigLIP to analyze medical images. But writing about health is more problematic. Either that, or Google AI is growing body parts such as the “basilar ganglia.”

Futurism includes the details of a Google research paper that “invented” this “basilar ganglia” body part.

“In their May 2024 research paper introducing a healthcare AI model, dubbed Med-Gemini, Google researchers showed off the AI analyzing brain scans from the radiology lab for various conditions.

“It identified an “old left basilar ganglia infarct,” referring to a purported part of the brain — “basilar ganglia” — that simply doesn’t exist in the human body. Board-certified neurologist Bryan Moore flagged the issue to The Verge, highlighting that Google fixed its blog post about the AI — but failed to revise the research paper itself.”

A little scary…especially the fact that it took a year to discover the error, a conflation of the basal ganglia (in the brain) and the basilar artery (at the brainstem). There’s no “basilar ganglia” per se.

And the MedGemma engine that I discussed last month has its own problems.

“Google’s more advanced healthcare model, dubbed MedGemma, also led to varying answers depending on the way questions were phrased, leading to errors some of the time.”

One could argue that the same thing could happen with humans. After all, if a patient words a problem in one way to one doctor, and in a different way to a different doctor, you could also have divergent diagnoses.

But this reminds us that we need to fact-check EVERYTHING we read.

Us, Them, Pornographic Deepfakes, and Guardrails

(Imagen 4)

Some of you may remember the Pink Floyd song “Us and Them.” The band had a history of examining things from different perspectives, to the point where Roger Waters and the band subsequently conceived a very long playing record (actually two records) derived from a single incident of Waters spitting on a member of the audience.

Is it OK to spit on the audience…or does this raise the threat of the audience spitting on you? Things appear different when you’re the recipient.

And yes, this has everything to do with generative artificial intelligence and pornographic deepfakes. Bear with me here.

Non-Consensual Activity in AI Apps

My former IDEMIA colleague Peter Kirkwood recently shared an observation on the pace of innovation and the accompanying risks.

“I’m a strong believer in the transformative potential of emerging technologies. The pace of innovation brings enormous benefits, but it also introduces risks we often can’t fully anticipate or regulate until the damage is already visible.”

Kirkwood then linked to an instance in which the technology is moving faster than the business and legal processes: specifically, Bernard Marr’s LinkedIn article “AI Apps Are Undressing Women Without Consent And It’s A Problem.”

Marr begins by explaining what “nudification apps” can do, and notes the significant financial profits that criminals can realize by employing them, Marr then outlines what various countries are doing to battle nudification apps and their derived content, including the United States, the United Kingdom, China, and Australia.

But then Marr notes why some people don’t take nudification all that seriously.

“One frustration for those campaigning for a solution is that authorities haven’t always seemed willing to treat AI-generated image abuse as seriously as they would photographic image abuse, due to a perception that it isn’t real’.”

First they created the deepfakes of the hot women

After his experiences under the Nazi regime, in which he transitioned from sympathizer to prisoner, Martin Niemoller frequently discussed how those who first “came for the Socialists” would eventually come for the trade unionists, then the Jews…then ourselves.

And I’m sure that some of you believe I’m trivializing Niemoller’s statement by equating deepfake creation with persecution of socialists. After all, deepfakes aren’t real.

But the effects of deepfakes are real, as Psychology Today notes:

“Being targeted by deepfake nudes is profoundly distressing, especially for adolescents and young adults. Deepfake nudes violate an individual’s right to bodily autonomy—the control over one’s own body without interference. Victims experience a severe invasion of privacy and may feel a loss of control over their bodies, as their likeness is manipulated without consent. This often leads to shameanxiety, and a decreased sense of self-worth. Fear of social ostracism can also contribute to anxiety, depression, and, in extreme cases, suicidal thoughts.”

And again I raise the question. If it’s OK to create realistic-looking pornographic deepfakes of hot women you don’t know, or of children you don’t know, then is it also OK to create realistic-looking pornographic deepfakes of your own family…or of you?

Guardrails

Imagen 4.

The difficulty, of course, is enforcing guardrails to stop this activity. Even if most of the governments are in agreement, and most of the businesses (such as Meta and Alphabet) are in agreement, “most” does not equal “all.” And as long as there is a market for pornographic deepfakes, someone will satisfy the demand.

What is the Proper Identity Assurance Level (IAL) for Employer Identification Number (EIN) Assignment?

(Imagen 4)

In the latest Know Your Business brouhaha, the Treasury Inspector General for Tax Administration (TIGTA) has questioned some potential gaps in the assignment of an Employer Identification Number, or EIN.

It seems that some so-called “businesses” are using an EIN as a facade for illegal activity…and insufficient identity assurance is preventing the fraudsters from being caught.

Obtaining Employer Identification Numbers to commit tax fraud

What is an EIN? In the same way that U.S. citizens have Social Security Numbers, U.S. businesses have Employer Identification Numbers. It’s not a rigorous process to get an EIN; heck, Bredemarket has one.

But maybe it needs to be a little more rigorous, according to TIGTA.

“EINs are targeted and used by unscrupulous individuals to commit fraud. In July 2021, we reported that there were hundreds of potentially fraudulent claims for employer tax credits….Further, in April 2024, our Office of Investigations announced that it helped prevent $3.5 billion from potentially being paid to fraudsters. Our special agents identified a scheme where individuals obtained an EIN for the sole purpose of filing business tax returns to improperly claim pandemic-related tax credits.”

Yes, that’s $3.5 billion with a B. That’s a lot of fraud.

Perhaps the pandemic has come and gone, but the temptation to file fraudulent business tax returns with an improperly-obtained EIN continues.

Facade.

Enter the Identity Assurance Level

So how does the Internal Revenue Service (IRS) gatekeep the assignment of EINs?

By specifying an Identity Assurance Level (IAL) before assigning an EIN.

Specifically, Identity Assurance Level 1.

“In December 2024, the IRS completed the annual reassessment of the Mod IEIN system. The IRS rated the identity proofing and authentication requirements at Level 1 (the same level as the initial assessment in January 2020).”

IAL1 doesn’t “assure” anything…except continued tax fraud

If you’ve read the Bredemarket blog or other biometric publications, you know that IAL1 is, if I may use a technical term, a “nothingburger.” The National Institute of Standards and Technology (NIST) says this about IAL1:

“There is no requirement to link the applicant to a specific real-life identity. Any attributes provided in conjunction with the subject’s activities are self-asserted or should be treated as self-asserted (including attributes a CSP asserts to an RP). Self-asserted attributes are neither validated nor verified.”

If that isn’t a shady way to identity a business, I don’t know what is.

Would IAL2 or IAL3 be better for EIN assignment?

These days it’s probably unreasonable to require every business to use Identity Assurance Level 3 (discussed in the Bredemarket post “Identity Assurance Level 3 (IAL3): When Identity Assurance Level 2 (IAL2) Isn’t Good Enough“) to obtain an EIN. As a reminder, IAL3 requires either in-person or supervised proof of identity.

But I agree with TIGTA’s assertion that Identity Assurance Level 2, with actual evidence of the real-world identity, should be the minimum.

Does your firm offer an IAL2/IAL3 product?

And if your identity/biometric firm offers a product that conforms to IAL2 or IAL3, and you need assistance creating product marketing content, talk to Bredemarket.

The “Crowd” in Custom Software Development

Bredemarket provides several services, but one service I don’t provide is custom software development.

Even though I’ve launched mobile apps.

Well, not really.

During my final years at MorphoTrak, I handled speaker and session coordination for the company’s annual Users Conference. Among my duties were managing the loading of speaker and session biographies into the CVENT-powered conference website.

CVENT had a sister mobile app known as CrowdCompass that allowed presentation of the information in mobile form. I briefly mentioned the app before. You would load your information into the existing framework, and then CVENT would facilitate the approval of your custom app in the App Store and Google Play.

From a Google search.

I found an online reference to one of my old apps, but the app itself does not appear to be on the CNET website.

And you know that picture of me at a podium, waving my arm around? I was evangelizing my app to the Users Conference crowd.

Evangelizing my so-called custom software development.

So that’s my so-called experience with custom software development. If you’re looking for TRUE custom software development services, perhaps I can place you in touch with Silicon Tech Solutions.

Repetition

(Imagen 4)

As you will discover on the Bredemarket blog on Thursday, I just repeated myself.

Normally when I incorporate royalty-free music into my videos, I try NOT to use a song that I just used.

But Thursday’s video intentionally incorporates the same song that I just used in my “Landscape (Biometric Product Marketing Expert)” video that I shared on August 10.

The song, incidentally, is “LoFi Chill Beat.” The Spotify link for the full song is here, although so far I’ve only used the first 36 seconds of the song.

So far.

Changes in Process to California Privacy Regulations

There are laws, and there are regulations. In California, we are modifying the latter.

Before launching into these regulatory changes, remember that the CCPA is the California Consumer Privacy Act, while the CPPA is the California Privacy Protection Agency. (There’s also a CPRA, the California Privacy Rights Act.)

Imagen 4.

I have attached the May 2025 version of the “Modified Text of Proposed Regulations,” specifically regarding changes to the California Consumer Privacy Act regulations. They affect automated decision-making, conducting risk assessments, and performing cybersecurity audits.

This is still an in-process document. As OneTrust notes:

The regulations will now head to the California Office of Administrative Law for final review before they can be formally enacted. 

In the meantime, we have this thingie, in which

The initial proposal (noticed on November 22, 2024) is illustrated by blue underline for proposed additions and red strikethrough for proposed deletions, unless otherwise indicated, as in Articles 9, 10, and 11. Changes made after the 45-day comment period are illustrated by purple double underline for proposed additions and orange double strikethrough for proposed deletions.

When you get to the purple double underline and orange double strikethrough stage, you know things are getting serious.

When You Reduce a Product’s Feature Set

When engineers engineer products, they naturally pack in as many features as possible. Why? Because engineers, um, calculate that prospects desire a wide array of features.

Proposal managers and product marketers know the truth. Some prospects find too many features to be undesirable.

But first, a quote

From Biometric Update.

This quote from my Biometric Update guest post is pertinent. These are three of my recommendations to biometric vendors (and other identity vendors) to ensure responsible data use.

“Collect only the minimum necessary personal information. If you don’t need certain data, don’t collect it. If it’s never collected, fraudster hackers can never steal it.

“Store only the minimum necessary personal information. If you don’t need to keep certain data, don’t store it. I’m sure our decentralized identity friends will agree with this.

“Comply with all privacy laws and regulations. This should be a given, but sometimes vendors are lax in this area. If your firm violates the law, and you are caught, you will literally pay the price.”

Two of these three recommendations came into play shortly after I wrote those words.

When “feature-rich” is undesirable

I recently fulfilled two roles for a Bredemarket client: first a proposal manager, and rhen a requirements manager. And as my role shifted, my focus shifted also.

Bredemarket the proposal manager

Hundreds of proposals. Imagen 4.

Some time ago I helped a Bredemarket client manage and write a proposal for a prospect. I can’t identify the client or the prospect, but I will just say that the proposal was for a product that collected personally identifiable information (PII).

The proposal not only presented the features of my client’s product, but also the benefits. And it presented several alternative configurations to the prospect, including an array of value-added options.

Bredemarket the requirements manager

Fast forward after proposal submission, and after my Biometric Update guest post was published. 

The prospect wanted to hold further discussions with Bredemarket’s client, and Bredemarket shifted from consulting proposal manager to consulting requirements manager.

The prospect’s first request?

Remove ALL the proposal’s value-added options from the final deliverable.

Not because of cost, but because these value-added features would make the prospect’s life MORE difficult. 

While the prospect had no issue with the data that the supercharged value-added configured product collected, it had other concerns:

  • Some of the storage features of the value-added product ended up storing things the prospect didn’t need or want to store.
  • In addition, the value-added product caused privacy issues with the prospect’s own end customers.

An added benefit to removing these features: the slimmed-down product would be easier for the prospect to manage.

Reduce. Imagen 4.

Sometimes less is more, as a sculpture artist will tell you. A huge hunk of marble is less desirable than a sculpture in which much of the marble was taken away.

If you need Bredemarket to help shape your proposals, requirements, or other content or analysis, let’s talk.