Speak Softly? Is Theodore Roosevelt’s Advice Still Relevant?

So I just created a short reel for no purpose other than to illustrate Theodore Roosevelt’s famous saying “Speak softly and carry a big stick.”

But then I began thinking. For product marketers, is “speaking softly” an idea that should be relegated to the early 20th century? The answer to that question partially depends on whether you are marketing in an earlier awareness stage, or a later conversion stage.

But the reel doesn’t get that deep.

Speak softly.

An aside (overly serious product marketers skip this part)

Originally this reel was supposed to be a single image, with no stick, showing President Roosevelt to the audio accompaniment of Paul Simon’s “Loves Me Like a Rock.”

Who do you think you’re fooling?

To be honest, ORIGINALLY the President was supposed to be Nixon, whose mama loved him and was a saint.

But once Roosevelt got behind the Presidential podium, my mind traveled to earlier times in the Dakotas and Cuba, and the stick—softly—inserted itself.

Excluded from the reel but not forgotten: my earlier fictional conception of Roosevelt overseeing the construction of the Panama Canal, previously shared here.

A man, a plan…

And if you haven’t already figured it out, Teddy appears to be safe from the restrictions from Google’s guidelines on depictions of famous figures. As I said before, no picture generation of President Richard Nixon, or President Taylor Swift.

But it doesn’t matter with me now, because this post can’t just be about silly pictures. It has to have a Serious Business Purpose.

For product marketers, does speaking softly work?

So let’s talk about Roosevelt’s phrase that inspired the reel.

First, the full phrase is “Speak softly and carry a big stick; you will go far.”

Second, the phrase was not original to Roosevelt. Well-read people learn from their reading, and Roosevelt picked up the phrase from elsewhere.

“This quote often attributed to Theodore Roosevelt is actually a West African proverb. Roosevelt writes this in a letter to Henry Sprague on January 26, 1900.”

A year and a half later, after Roosevelt’s political enemies had maneuvered him into the then-obscure position of Vice President of the United States (subsequently characterized as a bucket of warm…spit), he expounded upon the phrase at the Minnesota State Fair on September 2, 1901.

Deep fried pizza on a stick. Not historically accurate.

(He and his political enemies had no way of knowing that later that month McKinley would be assassinated and Roosevelt would be President. Oops.)

“”Speak softly and carry a big stick—you will go far.” If a man continually blusters, if he lacks civility, a big stick will not save him from trouble; and neither will speaking softly avail, if back of the softness there does not lie strength, power. In private life there are few things more obnoxious than the man who is always loudly boasting; and if the boaster is not prepared to back up his words his position becomes absolutely contemptible. So it is with the nation. It is both foolish and undignified to indulge in undue self-glorification, and above all, in loose-tongued denunciation of other peoples.”

As Roosevelt noted, the “and” it’s important. A soft speaker without a big stick will not be persuasive.

But is speaking softly all that important?

Speaking loudly: Berliners, Crazy Eddie

There are certainly instances, both in diplomacy/politics and product marketing, in which speaking loudly is extremely effective. Avoiding the 21st century (we really don’t want to go there) and confining myself to the 20th, the masses of people at the Berlin Wall were very loud.

9 November 1989.

As was the radio guy (Jerry Carroll) who played in the Crazy Eddie commercials.

Insane!

Let’s face it; product marketing is often loud to grab your attention. I should know.

Bridge your content gap.

Speaking softly: Theodore Roosevelt, golfers

But sometimes, even in an awareness campaign, speaking softly is an effective differentiator against the loud cacophony of everyone else.

Tell your story.

And by the time you move to the conversion stage, you don’t want to be loud and blustery. I’m prevented by NDA from citing personal examples, so let’s look at Theodore Roosevelt again.

“The Treaty of Portsmouth formally ended the Russo-Japanese War of 1904–05. The negotiations took place in August in Portsmouth, New Hampshire, and were brokered in part by U.S. President Theodore Roosevelt….Although the actual importance of Roosevelt’s mediation and personal pressure on the leadership in Moscow and Tokyo to the final agreement is unclear, he won the Nobel Peace Prize for his efforts in moderating the talks and pushing toward peace.”

Of course, everyone knew that negotiations were taking place in Portsmouth, just like everyone knew that Egypt and Israel were negotiating at Camp David 70+ years later.

But sometimes the negotiating parties speak so softly that no one knows they’re talking. Take this announcement in June 2023:

“The world of golf was left stunned on Tuesday as the PGA Tour, DP World Tour and rival Saudi-backed LIV circuit, who have been involved in a bitter fight that has split the sport, announced a shock agreement to merge and form one unified commercial entity….The bombshell announcement was slammed by many PGA Tour players who were left in the dark about the merger…”

Not historically accurate. I don’t think.

For the moment, ignore the fact that the merger hasn’t happened two years later. The heated war between the PGA and the LIV meant that while a merger made financial sense (see the NFL and the AFL bidding up football player prices in the 1960s), no one expected a PGA-LIV merger to happen.

But the rival parties had spoken…softly.

Veo 3 and Deepfakes

(Not a video, but a still image from Imagen 4)

My Google Gemini account does not include access to Google’s new video generation tool Veo 3. But I’m learning about its capabilities from sources such as TIME magazine.

Which claims to be worried.

“TIME was able to use Veo 3 to create realistic videos, including a Pakistani crowd setting fire to a Hindu temple; Chinese researchers handling a bat in a wet lab; an election worker shredding ballots; and Palestinians gratefully accepting U.S. aid in Gaza. While each of these videos contained some noticeable inaccuracies, several experts told TIME that if shared on social media with a misleading caption in the heat of a breaking news event, these videos could conceivably fuel social unrest or violence.”

However, TIME notes that the ability to create fake videos has existed for years. So why worry now?

“Veo 3 videos can include dialogue, soundtracks and sound effects. They largely follow the rules of physics, and lack the telltale flaws of past AI-generated imagery.”

Some of this could be sensationalism. After all, simple text can communicate misinformation.

And you can use common sense to detect deepfakes…sometimes.

Mom’s spaghetti 

Then again, some of the Veo 3 deepfakes look pretty good. Take this example of Will Smith slapping down some pasta at Eminem’s restaurant. The first part of the short was generated with old technology, the last part with Veo 3.

Now I am certain that Google will attempt to put guardrails on Veo 3, as it has attempted to do with other products.

But what will happen if a guardrail-lacking Grok video generator is released?

Or if someone creates a non-SaaS video generator that a user can run on their own with all guardrails disabled?

Increase the impact of your deepfake detection technology

In that case, deepfake detection technology will become even more critical.

Does your firm offer deepfake detection technology?

Do you want your prospects to know how your technology benefits them?

Here’s how Bredemarket can help you help your prospects: https://bredemarket.com/cpa/

Keith’s “Why”

One of the best “why” stories I’ve seen in some time was written by Keith Puckett of Ubiety Technologies

He had purchased a feature-rich home security system and received an alarm while he was traveling. That’s all—an alarm, with no context.

“The security company then asked me, ‘Should we dispatch the police?’ At that moment, the reality hit: I was expected to make a decision that could impact my family’s safety, and I had no information to base that decision on. It was a gut-wrenching experience. The very reason I invested in security—peace of mind—had failed me.”

From Ubiety Technologies, “What is Your Why?”

https://ubiety.io/what-is-your-why

Puckett then started his company so others wouldn’t face the same emotions of fear and helplessness that he faced.

Why ask why?

Why is a “why” story so powerful? 

Because a story like this grabs a prospect’s attention a million times better than some boring technical feature list with optimum camera angles.

Make it personal. Many prospects have their own challenges that you can solve. 

Make sure you have the answers to their questions. That’s why Bredemarket asks questions before creating content…so your prospects don’t have to.

After all, “why ask why?” is more than an old beer commercial slogan.

And one more thing

For those like me who noted Ubiety Technologies’ Illinois location—you know, BIPAland—here is the company approach to privacy.

For Your Reading Pleasure: Rewrite, Shorten, and Simplify

This week has been a busy week in Bredemarket-land, including work on some of the following client projects:

  • Creating the first deliverable as part of a three-part series of deliverables.
  • Reworking that first deliverable for more precision.
  • Preparing to start work on the second deliverable.
  • Drafting a blog post for a client.
  • Gathering information for an email newsletter for a client.
  • Following up on a couple of consulting opportunities that take advantage of my identity/biometric expertise.
  • Creating a promotional reel based upon the grapes in my backyard. (Yet another reel. I plan to reveal it next week.)
  • Engaging in other promotional activities on Bredemarket’s key social media channels.

Plus I’ve been working on some non-Bredemarket deliverables and meetings with a significant time commitment.

But there’s one more Bredemarket deliverable that I haven’t mentioned—because I’m about to discuss it now.

The task

Without going into detail, a client required me to repurpose a piece of third-party government-authored (i.e. non-copyrighted) text, originally written for a particular market.

  1. Rewrite the content for a different market.
  2. Shorten the text so it would be more attractive to the new market.
  3. Simplify the presentation of the text to make it even more attractive to the new market.

The request was clear, and I’ve already completed the first draft of the text and am working on the second draft.

But I wanted to dive into the three steps above—not regarding this particular client writing project, but in a more general way.

Step 1: Rewrite

When you’ve worked in a lot of different industries, you learn that each industry has its own language, including things you say—and things you don’t say.

I’ll give you an example that doesn’t reflect the particular project I was working on, but does reflect why rewriting is often necessary.

When I started in biometrics, the first two industries that I wrote about were law enforcement and benefits administration.

  • Law enforcement’s primary purpose is to catch bad people, although sometimes it can exonerate good people. So when you’re talking about law enforcement applications, you frequently use a lot of terms that are negative in nature, such as “surveillance,” “suspect,” and “mugshot.”
  • Benefits administration’s primary purpose is to help good people, although sometimes it can catch bad people who steal benefits from good people. So when you’re talking about benefits administration applications, you tend toward more positive terms such as “beneficiary.” And if you take a picture of a beneficiary’s face, for heaven’s sake DON’T REFER TO THE FACIAL IMAGE AS A “MUGSHOT.”

These two examples illustrate why something originally written for “market 1” must often be rewritten for “market 2.”

But sometimes a simple rewrite isn’t enough.

Step 2: Shorten

Now I don’t play in the B2C market in which crisp text is extremely necessary. But it’s needed in the various B2G and B2B markets also—some more than others.

If you are writing for more scientific markets, your readers are more accustomed to reading long, academic, “Sage”-like blocks of text.

But if you are writing for other markets, such as hospitality, your readers not only don’t want to read long blocks of text, but actively despise it.

You need to “get to the point.”

Tim Conway (Sr.), as repeatedly played during Jim Healy’s old radio show. Sourced from the Jim Healy Tribute Site.

In my particular project, “market 1” was one of those markets that valued long-windedness, while “market 2” clearly didn’t. So I had to cut the text down significantly, using the same techniques that I use when rewriting my “draft 0.5” (which a client NEVER sees) to my “draft 1” (which I turn over to the client).

But sometimes a simple shorten isn’t enough.

Step 3: Simplify

If you know me, you know I’m not graphically inclined.

Someday I will reach this level of graphic creativity. Originally created by Jleedev using Inkscape and GIMP. Redrawn as SVG by Ben Liblit using Inkscape. – Own work, Public Domain, link.

But I still pay attention to the presentation of my words.

Remember those long blocks of text that I mentioned earlier? One way to break them up is to use bullets.

  • Bullets break up long blocks of text into manageable chunks.
  • Bullets are easier to read.

So your reader will be very happy.

But as I was editing this particular piece of content, sometimes I ran into long lists of bullets, which weren’t really conducive to the reading experience.

QuestionAnswerWhat does this mean?
Why are long lists of bullets bad?Because with enough repetition, they’re just as bad as long blocks of text.Your readers will tune you out.
How can you format long lists of bullets into something easier to read?One way is to convert the bullets into a table with separate entries.Your readers will enjoy a more attractive presentation.
What do tables do for your reader?They arrange the content in two dimensions rather than one.The readers’ eyes move in two directions, rather than just one.
Hey, wait a minute…Yeah, I just plugged my seven questions again by intentionally using the first three: why, how, and what.You can go here to download the e-book “Seven Questions Your Content Creator Should Ask You.”
I don’t have the skill to make WordPress tables look as attractive as Microsoft Word tables. But even this table breaks up the monotony of paragraphs and lists, don’t you think?

So what happened?

After I had moved through the three steps of rewriting, shortening, and simplifying the original content, I had a repurposed piece of content that was much more attractive to the “hungry people” (target audience) who were going to read it.

These people wouldn’t fall asleep while reading the content, and they wouldn’t be offended by some word that didn’t apply to them (such as “mugshot”).

So don’t be afraid to repurpose—even for a completely different market.

I do it all the time.

Look at two of my recent reels. Note the differences. But note the similarities.

The identity/biometrics version of the reel.
The Inland Empire version of the same reel.

So which of Bredemarket’s markets do you think will receive the “grapes” reel?

Stay tuned.

Educational Identity: Why and How Do Educational Institutions Verify Identities?

Chaffey High School, Ontario California.

Whether a student is attending a preschool, a graduate school, or something in between, the educational institution needs to know who is accessing their services. This post discusses the types of identity verification and authentication that educational institutions may employ.

Why do educational institutions need to verify and authenticate identities?

Whether little Johnny is taking his blanket to preschool, or Johnny’s mother is taking her research notes to the local university, educational institutions such as schools, colleges, and universities need to know who the attendees are. It doesn’t matter whether the institution has a physical campus, like Chaffey High School’s campus in the video above, or if the institution has a virtual campus in which people attend via their computers, tablets, or phones.

Access boils down to two questions:

  • Who is allowed within the educational institution?
  • Who is blocked from the educational institution?

Who is allowed within the educational institution?

Regardless of the type of institution, there are certain people who are allowed within the physical and/or virtual campus.

  • Students.
  • Instructors, including teachers, teaching assistants/aides, and professors.
  • Administrators.
  • Staff.
  • Parents of minor students (but see below).
  • Others.

All of these people are entitled to access to at least portions of the campus, with different people having access to different portions of the campus. (Students usually can’t enter the teacher’s lounge, and hardly anybody has full access to the computer system where grades are kept.)

Before anyone is granted campus privileges, they have to complete identity verification. This may be really rigorous, but in some cases it can’t be THAT rigorous (how many preschoolers have a government ID?). Often, it’s not rigorous at all (“Can you show me a water bill? Is this your kid? OK then.”).

Once an authorized individual’s identity is verified, they need to be authenticated when they try to enter the campus. This is a relatively new phenomenon, in response to security threats at schools. Again, this could be really rigorous. For example, when students at a University of Rhode Island dining hall want to purchase food from the cafeteria, many of then consent to have their fingerprints scanned.

From https://www.youtube.com/watch?v=JzMDF_LN_LU

Another rigorous example: people whose biometrics are captured when taking exams, to deter cheating.

But some authentiation is much less rigorous. In these cases, people merely show an ID (hopefully not a fake ID) to authenticate themselves, or a security guard says “I know Johnny.”

(Again, all this is new. Many years ago, I accompanied a former college classmate to a class at his new college, the College of Marin. If I had kept my mouth shut, the professor wouldn’t have known that an unauthenticated student was in his class.)

Who is blocked from the educational institution?

At the same time, there are people who are clearly NOT allowed within the physical and/or virtual campus. Some of these people can enter campus with special permission, while some are completely blocked.

  • Former students. Once a student graduates, their privileges are usually revoked, and they need special permission if they want to re-enter campus to visit teachers or friends. (Admittedly this isn’t rigorously enforced.)
  • Expelled students. Well, some former students have a harder time returning to campus. If you brought a gun on campus, it’s going to be much harder for you to re-enter.
  • Former instructors, administrators, and staff. Again, people who leave the employ of the institution may not be allowed back, and certain ones definitely won’t be allowed back.
  • Non-custodial parents of minor students. In some cases, a court order prohibits a natural parent from contact with their child. So the educational institutions are responsible for enforcing this court order and ensuring that the minor student leaves campus only with someone who is authorized to take the child.
  • Others.

So how do you keep these people off campus? There are two ways.

  • If they’re not on the allowlist, they can’t enter campus anyway. As part of the identity verification process for authorized individuals, there is a list of people who can enter the campus. By definition, the 8 billion-plus people who are not on that “allowlist” can’t get on campus without special permission.
  • Sometimes they can be put on a blocklist. Or maybe you want to KNOW that certain people can’t enter campus. The inverse of an allowlist, people who are granted access, is a blocklist, people who are prevented from getting access. (You may know “blocklist” by the older term “blacklist,” and “allowlist” by the older term “whitelist.” The Security Industry Association and the National Institute of Standards and Technology recommend updated terminology.)

There’s just one teeny tiny problem with blocklists. Sometimes they’re prohibited by law.

In some cases (but not in others), a person is required to give consent before they are enrolled in a biometric system. If you’re the ex-student who was expelled for brining a gun on campus, how motivated will you be to allow that educational institution to capture your biometrics to keep you off campus?

And yes, I realize that the expelled student’s biometrics were captured while they were a student, but once they were no longer a student, the institution would have on need to retain those biometrics. Unless they felt like it.

This situation becomes especially sticky for campuses that use video surveillance systems. Like Chaffey High School.

Sign: "To reduce property damage to our facilities, this campus has installed a video surveillance system."
Chaffey High School, Ontario, California.

Now the mere installation of a video surveillance system does not (usually) result in legally prohibited behavior. It just depends upon what is done with the video.

  • If the video is not integrated with a biometric facial recognition system, there may not be an issue.
  • If Chaffey High School has its own biometric facial recognition system, then a whole host of legal factors may come into play.
  • If Chaffey High School does not have a biometric facial recognition system, but it gives the video to a police agency or private entity that does have a biometric facial recognition system, then some legal factors may emerge.

Or may not. Some facial recognition bans allow police use, and if this is true then Chaffey can give the footage to the police to use for authorized purposes. But if the jurisdiction bans police use of facial recognition, then people on the video can only be recognized manually. And you know how I feel about that.

Writing About Educational Identity

As you can see, educational identity is not as clear-cut as financial identity, both because financial institutions are more highly regulated and because blocklists are more controversial in educational identity. Vladimir Putin may not be able to open a financial account at a U.S. bank, but I bet he’d be allowed to enroll in an online course at a U.S. community college.

So if you are an educational institution or an identity firm who serves educational institutions, people who write for you need to know all of these nuances.

You need to provide the right information to your customers, and write it in a way that will motivate your customers to take the action you want them to take.

Speaking of motivating customers, are you with an identity firm or educational institution and need someone to write your marketing text?

  • Someone with 29 years of identity/biometric marketing experience?
  • Someone who understands that technological, organizational, and legal issues surrounding the use of identity solutions?
  • Someone who will explain why your customers should care about these issues, and the benefits a compliant solution provides to them?

If I can help you create your educational identity content, we need to talk.

Which Content Should You Create First?

So you’ve decided that you are going to create some content for your business. But which content type should you create first? Audio? Blog post? Case study? Social media post? White paper? Video? Something else?

Designed by Freepik.

Now I could charge you $96.96 and present a really complex 96-step way to choose the appropriate content to create for your specific needs.

(A few of you see what I did there. That probably doesn’t help my so-called problem.)

But coming up with a complex content creation matrix is silly, because selecting a content type isn’t that hard. (This post does have a content creation matrix, but it’s easy to understand and pretty straightforward.)

The first question

What is the first question you have to answer before deciding which content to create?

First, you need to look at your online presence and see which outlets you have, and which ones you don’t have.

  • Do you have a website?
  • Do you have a blog?
  • Do you have social media accounts? If so, which ones, and which types of content do they support? (Threads, for example, supports text, image, audio, and video content.)

If you don’t have a certain outlet, then that makes your decision a lot easier.

  • For example, if you have social media outlets but don’t have a blog, then don’t worry about creating blog posts (unless you have LinkedIn and want to create LinkedIn articles). You’re not going to create blog posts on Instagram or Threads or Twitter (unless you’re a blue check person).
  • Similarly, if you’re not on YouTube, TikTok, or Instagram, videos are less important. (Although a lot of services support video.)

Create content for your outlet(s)

So now that you know which content outlets you have, and which you don’t, you can create content that is supported by your outlets.

Here’s a handy-dandy table that suggests the content types you can create, depending upon your online presence. These are suggestions, not hard and fast rules.

Content TypeWebsiteBlogSocial Media With AudioSocial Media With ImagesSocial Media With TextSocial Media With Video
AudioYes
BlogYes
Case StudyDownload
Social Media PostYesYesYesYes
VideoYes
White PaperDownload

Some of these are fairly obvious (yes, if you have a blog you can create blog posts), but it helps to say them.

Don’t worry about the content outlets that you don’t have. If you don’t have a blog today, don’t worry about creating one just so you can write blogs. Go with what you have.

(And if you don’t have ANYTHING right now to promote your business, then the easiest thing to do is to create some type of social media account: Facebook, LinkedIn, whatever. They’re free, and it’s easy to create content for them.)

As I said above, these are suggestions, not hard and fast rules. For example, the table above says that case studies and white papers are best if you have a website from which prospects can download documents. But some social media services allow you to embed documents (such as case studies or white papers) into your social media posts.

Think about what you’ve got, and create for it.

Repurpose

And once you’ve created the content, don’t be afraid to distribute it on other channels, or even to repurpose it on other channels.

  • Have you uploaded a great video to YouTube? Embed the video in a blog post.
  • Did you write a great blog post? Repurpose it as a downloadable document. (That’s what I did.)

You may choose to only issue a specific piece of content using a single content type. But if you feel like repurposing the material for other content types, go for it.

Don’t be afraid to fail

Finally, don’t be afraid to create content, even if it’s not perfect. I’ve (re)committed myself to video, and spent yesterday creating multiple videos for multiple outlets. Two of the videos that I created ended up having problems…but I left them up anyway, and learned in the process.

I figure that the more content that I create, the better that I will get at it.

You will find that the same holds true for you.

Do you need help with textual content?

Now when you are ready to create content, do you need someone to help you create it?

I can help you with certain types of content.

(Not video. If you need a video pro, contact Loren Feldman at 1938 Media.)

But if you need help with the text for blog posts, case studies, white papers, and the like, I can help you. Especially if your text involves biometrics, identity, or technology. Contact me!

Which Content Should You Create First? (the video version)