Product marketing strategy (not tactics), including why, how, what, and process.
Product marketing environment, including the market and competitive intelligence, the customer feedback loop, and the company culture.
Product marketing content, both internal and external, including positioning, personas, go-to-market, sales enablement, launches, pricing, packaging, and proposals.
Product marketing performance, including metrics, objectives, and key results.
Does your firm have all four puzzle pieces? Or are one or more of the pieces lacking?
Proven expertise from Printrak BIS, MorphoWay, and a recent launch for a Bredemarket client?
Recent Go-to-market.
If you are ready to move your firm’s product marketing forward with Bredemarket’s content-proposal-analysis services for technology firms, let’s discuss your needs and how Bredemarket can help you solve them. Book a free meeting at https://bredemarket.com/mark/.
Who can provide remote supervised identity proofing?
“NextgenID Trusted Services Solution provides Supervised Remote Identity Proofing identity stations to collect, review, validate, proof, and package IAL-3 identity evidence and enrollment data for CSPs operating at IAL-3.”
And there are others who can provide the equivalent of IAL3, as we will see later.
How do you supervise a remote identity proofing session?
“The camera(s) a CSP [Credential Service Provider] employs to monitor the actions taken by a remote applicant during the identity proofing session should be positioned in such a way that the upper body, hands, and face of the applicant are visible at all times.”
But that doesn’t matter with me now. What matters to me is WHEN we need remote identity proofing sessions.
Governments aren’t the only entities that need to definitively know identities in critically important situations.
What about banks and other financial institutions, which are required by law to know their customers?
Now it’s one thing when one of my Bredemarket clients used to pay me by paper check. Rather than go to the bank and deposit it in person at a teller window (in person) or at an ATM (remote supervised), I would deposit the check with my smartphone app (remote unsupervised).
Now the bank assumed a level of risk by doing this, especially since the deposited check would not be in the bank’s physical possession after the deposit was completed.
But guess what? The risk was acceptable for my transactions. I’m disclosing Bredemarket company secrets, but that client never wrote me a million dollar check. Actually, none of my clients has ever written me a million dollar check. (Perhaps I should raise my rates. It’s been a while. If I charge an hourly rate of $100,000, I will get those million dollar checks!)
So how do financial institutions implement the two types of IAL3?
“If you need to initiate a funds transfer payment, an authorized signer for your account may also initiate funds (wire) transfers at any Chase branch.”
Note the use of the word “may.” However, if you don’t want to go to a branch to make a wire transfer, you have to set up an alternate method in advance.
Remote supervised
What about remote supervised transactions at financial institutions, where you are not physically present, but someone at the bank remotely sees you and everything you do? Every breath you take? And every move you make? Etcetera.
It turns out that the identity verification providers support video sessions between businesses (such as banks) and their customers. For example, Incode’s Developer Hub includes several references to a video conference capability.
To my knowledge, Incode has not publicly stated whether any of its financial identity customers are employing this video conference capability, but it’s certainly possible. And when done correctly, this can support the IAL3 specifications.
Why to use IAL3 for financial transactions
For high-risk transactions such as ones with high value and ones with particular countries, IAL3 protects both the financial institutions and their customers. It lessens the fraud risk and the possible harm to both parties.
Some customers may see IAL3 as an unnecessary bureaucratic hurdle…but they would feel differently if THEY were the ones getting ripped off.
This is why both financial institutions and identity verification vendors need to explain the benefits of IAL3 procedures for riskier transactions. And do it in such a way that the end customers DEMAND IAL3.
To create the content to influence customer perception, you need to answer the critically important questions, including why, how, and benefits. (There are others.)
And if your firm needs help creating that content, Underdog is here.
Visit https://bredemarket.com/mark/ and schedule a time to talk to me—for free. I won’t remotely verify your identity during our videoconference, but I will help you plan the content your firm needs.
“I ask, then I act” is an attention-grabbing statement, but it’s admittedly simplistic. I don’t fall in the “ready, fire, aim” school, but believe that action incorporates review. As the management consultants Daft Punk stated many years ago:
One more time
And they proceeded to say:
One more time
So I guess it’s important.
“One more time” with a client’s content
One time I used my technology product marketing expertise to draft a piece for a client, which the client then edited with Track Changes on. The client made a number of improvements to my text, so I should have been happy with that and let it go. But I thought I’d look at the document.
One more time.
Stupid Word tricks, the Read Aloud edition
So I made a copy of the document, accepted all the changes in the copy, and had Microsoft Word read the document to me (Review menu, Speech section, Read Aloud).
Imagen 4.
Unlike the audio transcription tool (now superseded by AI meeting assistants), the built-in “Read Aloud” feature remains essential today.
Everything flowed well, and Word’s built-in editor didn’t flag anything.
My eyes had seen the problem
But my eye caught something.
In my initial draft, I had referenced the client’s 800 number.
Which in and of itself isn’t bad.
Except for the fact that this is a worldwide company, and many of the prospects who responded to the piece would be calling from outside the United States, where 800 numbers are not supported.
Imagen 4.
So I shot an urgent message saying to correct my error and change the number from an 800 number to a domestic number.
That one additional review eliminated a possible source of friction between my client and its prospects.
Problem solved, even before anyone noticed there was a problem.
You knew this was coming
Anyone notice the similarity between this song and Phil Collins’ “One More Night”? Or is it just me?
Take a look at your most recent content. If you extracted this content from your channels, changed the names, and injected it into the channels of one of your competitors, would anyone know the difference?
This post looks at content created by human SEO experts, and my generative AI colleague Bredebot. And how to differentiate your content from that of your competitors. (Inserting a wildebeest isn’t enough.)
Several years ago
Several years ago (I won’t get more specific) I was a writer for a company’s blog, but I didn’t own the blog. Frankly, I don’t think anyone did. There were multiple writers, and we just wrote stuff.
One writer had the (apparent) goal of creating informational content. The writer would publish multiple articles, sometimes with the same publication date.
The posts were well-researched, well-written, and covered topics of interest to the company’s prospects.
They were clearly written with a focus on SEO—several years ago, AEO didn’t exist—and were optimized for keywords that interested the prospects.
The goal was simple: draw the prospects to the company website with resonating content.
What could be wrong with that?
This week
Now it’s 2025, I’m writing for the Bredemarket blog, and I own the blog and control what is in it.
Bredebot. (In the middle.)
But I’m not the only writer. I brought a new writer on staff—Bredebot. And like a managing editor, I’ve been giving Bredebot assignments to write about.
As of Sunday August 31 (when I’m drafting this post), the next three Bredebot posts to be published are as follows (subject to change):
Move Over, Authentic AI: Why You Shouldn’t Overlook AI’s Role in Modern Marketing
Power Up Your Sales: A CMO’s Guide to Sales Enablement (with a Wink and a Nudge)
What Is Liveness Detection? Let’s Re-Examine a Sentence
Bredebot just finished writing the sales enablement and liveness detection posts Sunday afternoon, and they blew me away.
The posts were well-researched, well-written, and covered topics of interest to Bredemarket’s prospects.
And while I’m not as much of an SEO/AEO expert as my colleague from several years ago, the posts do feature critical keywords. For example, the references to Chief Marketing Officers are intentional.
The goal is simple: draw prospects to the Bredemarket website with resonating content.
What could be wrong with that?
Next week
I’ll tell you what’s wrong with that:
Any other company could publish identical content.
My colleague from several years ago could produce identical content for any firm in that particular industry. Or some other writer could produce identical content.
Moving to the present day, my esteemed competitor Laurel Jew of Tandem Technical Writing could (if she wanted to; she probably wouldn’t) log in to her favorite generative AI engine and churn out bot-written posts on sales enablement and liveness detection that read just like mine—I mean Bredebot’s. Especially if she reverse engineers my prompts and includes things like “Include no more than one reference to wildebeests as marketing consultants and wombats as customers of these marketing consultants.” Once Bredebot has been easily cloned, game over.
TTW Bot?
As I noted Sunday, a correlation in which two bots use the same source data ends up with the same results.
Perhaps I could mitigate the risk by using a private LLM with its own super secret data (see Writer) to generate Bredebot’s content, but as of now that ain’t happening.
Another way to mitigate the risk is by careful prompt tailoring. I experimented with this in the pre-Bredebot days, back when Google Gemini was still Google Bard, and I told it to assert that “Kokomo” is the best Beach Boys song ever.
But in the end, no matter what data you use and what prompt you use, a generative AI bot is not going to produce anything original.
Whether you’re a marketer, a biometric expert, a technologist, or just someone scrolling the webs, you can feel a variety of emotions after reading a Bredemarket blog post.
Maybe amused.
Maybe informed,
Maybe empowered.
But some will experience more powerful emotions.
For a targeted few who find themselves paralyzed, maybe afraid. Afraid that your competitors will steal your prospects unless you act.
Or for those targeted few who despise powerlessness and want to act, maybe hungry. Hungry to get your product’s benefits to your prospects so they convert.
I have to be honest. Some of the people who are inspired to act are perfectly capable of acting on their own. Because they’re not complete unknowns.
But others can use the help of an outside consultant such as Bredemarket.
Content, proposals, analysis. I can help with all of them.
If you compete with Zoominfo, you have to understand Zoominfo…so you can exploit its weaknesses.
Highlights from the Zoominfo podcast
I could have listened to a long podcast with CEO Henry Schuck to understand the company’s weaknesses, but I didn’t have to because Matthew Robinson provided a time-stamped list of highlights. Or maybe Robinson didn’t do it himself, because Robinson is no longer necessary.
This first one caught my attention as the biometric product marketing expert, for obvious reasons.
(13:34) How they automated product marketing: From 26 people translating product info into content, down to 2 people managing AI agents.
Basically, mining data and auto-creating content.
And this second one just plain caught my attention.
(27:32) When you know the AI pressure is working: His CMO literally dreamed she disappointed him because her kids weren’t AI algorithms yet.
It’s good to know that Zoominfo has a distracted CMO. And that the CEO thinks it’s funny.
When Zoominfo’s headcount hits zero
And it’s awfully amusing that 24 product marketers lost their jobs. Remember the claims that AI wouldn’t replace you, but would let you do your job better? Lies.
Zoominfo’s business, by the way, is providing information on companies and the people who work for them. And as companies like Zoominfo right size, there is less demand for their services.
And that’s when Zoominfo will eliminate the position of the CMO and automate it.
Have you ever used the phrase “sort of unique”? Something is either unique or it isn’t. And International Mobile Equipment Identity (IMEI) numbers fail the uniquness test.
Claims that International Mobile Equipment Identity (IMEI) numbers are unique
Here’s what a few companies say about the IMEI number on each mobile phone. Emphasis mine.
Thales: “The IMEI (International Mobile Equipment Identity) number is a unique 15-digit serial number for identifying a device; every mobile phone in the world has one.”
Verizon: “An IMEI stands for International Mobile Equipment Identity. Think of it as your phone’s fingerprint — it’s a 15-digit number unique to each device.”
Blue Goat Cyber: “In today’s interconnected world, where our smartphones have become an indispensable part of our lives, it is essential to understand the concept of IMEI – the International Mobile Equipment Identity. This unique identifier plays a crucial role in various aspects of our mobile devices, from security to tracking and repairs.”
These and other descriptions of the IMEI prominently use the word “unique.” Not “sort of unique,” but “unique.”
Which means (for non-person entities, just like persons) that if someone can find a SINGLE reliable instance of more than one mobile phone having the same IMEI number, then the claim of uniqueness falls apart completely.
Examples of non-uniqueness of IMEI numbers on mobile phones
“In theory, hackers can clone a phone using its IMEI, but this requires significant effort. They need physical access to the device or SIM card to extract data, typically using specialized tools.
“The cloning process involves copying the IMEI and other credentials necessary to create a functional duplicate of the phone. However, IMEI number security features in modern devices are designed to prevent unauthorized cloning.”
So don’t claim an IMEI is unique when there is evidence to the contrary. As I said in my April post:
“NOTHING provides 100.00000% security. Not even an IMEI number.”
What does this mean for your identity product?
If you offer an identity product, educate your prospects and avoid unsupportable claims. While a few prospects may be swayed by “100%” claims, the smarter ones will appreciate more supportable statements, such as “Our facial recognition algorithm demonstrated a 0.0022 false non-match rate in the mugshot:mugshot NIST FRTE 1:1 laboratory testing.”
When you are truthful in educating your prospects, they will (apologizes in advance for using this overused word) trust you and become more inclined to buy from you.
If you need help in creating content (blog posts, case studies, white papers, proposals, and many more), work with Bredemarket to create the customer-focused content you need. Book a free meeting with me.