nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Chris Hardee

Chris Hardee

Headline

B2B Technology Writer

About Me

Finding the right tech writer for your business can be challenging. You need someone who is not only reliable, but can quickly come up to speed with your products and services.


Unlike most copywriters, I have over 20 years of experience in the IT industry. I've sat on the other side of the table during demos, so I know what goes into the technology buyer's decision-making process.


While you're good at marketing, you may not have the copywriting staff on-hand that can speak "engineer" and translate their technical wisdom into how your products and services improve your customer's business.


This is what I do.


I work with marketing departments to expand their capacity by creating content that gets more leads and makes conversions.


I specialize in website content, email marketing, landing pages, white papers, and case studies.


Some of my clients have included:


Find out more about me at: http://resoundingwords.com/

Interested in learning more?  

Industries I Write About

Computer Software

Find writers and ideas in this industry

Computer Hardware

Find writers and ideas in this industry

Computer & Network Security

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Information Services

Find writers and ideas in this industry

Internet

Find writers and ideas in this industry

Marketing & Advertising

Find writers and ideas in this industry

Telecommunications

Find writers and ideas in this industry

My Writing Samples

Putting the Brakes on Hacked Cars

I was the on-site blogger for the MISTI cybersecurity conference. This blog post was part of the content I created for the event.

https://misti.com/infosec-insider/putting-the-brakes-on-hacked-cars

PostgreSQL vs. MariaDB

This is part of a series I created for Panoply that compares various databases (and introduces their tool).

http://blog.panoply.io/postgresql-vs-mariadb

How to Conduct An Excel Spreadsheet Intervention

If it feels like your accounting department will cling to its Excel spreadsheets until the day the earth ends, you're not alone. Like Elsa, this post explains why it's time to "Let it Go".

https://docs.google.com/document/d/19aDNwONzM9JVMFUNvPH0WIfO1agxdG7HHMfHX_CU_sw/edit?usp=sharing

5 Secrets to Launching a Great Entrepreneurial Product (While You’re Still Employed)

Following these five steps can help you launch a great product while still holding down a day job. This will allow you to minimize your risk and make most of your time.

https://docs.google.com/document/d/14FAU3AkwwOhEFgUwFOeUnHWhNzWd1rBPe9384VXOHNM/edit?usp=sharing

The Benefits of Running Your Web CMS in the Cloud

Example white paper

https://drive.google.com/open?id=0B8rNBm4oD2K8YU5uZTVuaGJYbFk

Experience

B2B Freelance Writer

B2B freelance writer and content strategist with 20 years of experience in the technology industry.

Company: ResoundingWords.com

I worked there from 8/2009 until now

Content I Write

Ideas and Pitches I Wrote

X Cloud Migration Headaches You're Likely To Experience And How To Overcome Them

This article will discuss some of the current headaches businesses are likely to find as they start migrating processes to the cloud and how to overcome them.

Content type: Blog Post

Keywords: cloud migration

Links:

How Will SDN and NFV Change Your Network?

What are SDN and NFV? What are the differences between the two? Problems SDN creates The importance of end-to-end monitoring Why you need to adopt SDN and NFV

Content type: Blog Post

Keywords: SDN NFV

Links:

Malware Gets Organized

Who creates modern malware and its tie-in to organized crime. Why do they create malware? What do they have to gain? How has ransomware changed the game? How do we protect ourselves? (Tie in with SentinelOne) What should you do after you become a victim of malware?

Content type: Blog Post

Keywords: malware, organized crime

Links:

Teaching Cyber Security With Gamification

This post will cover ways gamification can help increase awareness and improve cyber security.

Content type: Blog Post

Keywords: cyber security, gamification

Links:

X Tips To Data Governance Mastery

Why it's critical for business How new factors like IoT and cloud will effect data governance Tips to help you master data governance in your organization

Content type: Blog Post

Keywords: data governance

Links:

X Ways To Not Get Caught In The Next Phishing Attack

Stats on the how half of the population will click on anonymous links (reference new findings) How phishing plays on this (list stats from actual attacks) How to train employees to reduce the risk (reference a security tool)

Content type: Blog Post

Keywords: phishing

Links:

How To Successfully Grow Your MSP Business

What does it take to become a next-gen MSP? Where you should focus your attention as you grow How to pick the right partners Narrowing your niche Getting feedback from your user base

Content type: Blog Post

Keywords: MSP, msp growth

Links:

Phishing As A Service? Theives Make It Easier To Steal Passwords

This post will discuss the growing trend of Malware as a Service, how it works, and the effect it will have on businesses.

Content type: Blog Post

Keywords: malware, malware as a service

Links:

Next-Generation Endpoints: Where Will Malware Strike Next?

This post will briefly discuss the old days with antivirus and how things have changed ; Facts about new malware threats ; How modern security needs endpoint protection and the shift to next-gen endpoints.

Content type: Blog Post

Keywords: endpoint protection , endpoint security

Links:

GovRAT Targets US Government Employees

This post will discuss GovRAT and provide details on what it does and how it targets government employees.

Content type: Blog Post

Keywords: govrat, malware

Links:

New Trojan Is Targeting IoT Devices

This post will discuss the ELF Linux/Mirai trojan which is targeting IoT devices.

Content type: Blog Post

Keywords: trojan, malware

Links:

How Big Data Is Being Used To Improve Cyber Security

This post will discuss how businesses and the federal government are using big data to improve their cyber security. It will discuss the future of cyber security and how analytics will plan an important role.

Content type: Blog Post

Keywords: cyber security

Links:

X Cloud Migration Headaches You're Likely To Experience And How To Overcome Them

This article will discuss some of the current headaches businesses are likely to find as they start migrating processes to the cloud and how to overcome them.

Content type: Blog Post

Keywords: cloud migration

Links:

What Is A Pragmatic Hybrid Cloud?

Reference the David Linthicum blog post (see link) and discuss how IT pros are finding new ways of pairing legacy systems with public cloud. ; Discuss what is pragmatic hybrid cloud, when it is appropriate, and how it could be used.

Content type: Blog Post

Keywords: hybrid cloud, pragmatic hybrid cloud

Links:

SDN and IoT: A Match Made In Heaven?

Some of the challenges we expect to see with IoT ; Why IoT and SDN will be great together.

Content type: Blog Post

Keywords: SDN, IoT

Links:

Why Do We Pick Bad Passwords?

This post will discuss the psychological reasons behind why we pick bad passwords and what businesses can do to help.

Content type: Blog Post

Keywords: passwords, cyber security

Links:

Expect More IoT Botnets: Mirai Source Code Now Freely Available

The source code for Mirai has been publicly released. This article will cover the announcement and what it will mean for businesses.

Content type: Blog Post

Keywords: mirai, botnet, IoT

Links:

Protecting Your Data In The Cloud

How will we protect our data as it moves from cloud to mobile to IoT and back again?

Content type: Blog Post

Keywords: cloud security

Links:

DDoS Attacks Against Twitter, Netflix, and More

Some of the giants in entertainment suffered a DDoS attack today. This post will cover the latest details of the attack.

Content type: Blog Post

Keywords: DDoS attack

Links:

What Caused Last Week's DDoS Attack?

Last Friday, Twitter, Netflix, many more sites were hindered by the attack on Dyn. Now we know what caused this attack and where it originated from. This post will give the details based on the latest news.

Content type: Blog Post

Keywords: malware, cyber security, cyber attack

Links:

Do You Really Need Cyber Insurance?

This post will talk about the growing need (and benefits) of cyber insurance.

Content type: Blog Post

Keywords: cyber insurance

Links:

WSF Attachments On The Rise

The number of Windows Script File attachments have increased in the past few months. This post will discuss how these attachments are spreading Locky, what it is, how the tactics have changed, and how to protect yourself.

Content type: Blog Post

Keywords: locky , malware , windows script file

Links:

Smart Cities And The Threat Of Malware

Smart cities will be technology dense. This will provide more IoT devices per square mile that can potentially be infected by malware. How will this impact smart cities and more importantly, how will they protect themselves?

Content type: Blog Post

Keywords: smart cities, IoT, malware

Links:

How To Find The Real Threads In Time

We get an enormous amount of threat data from a variety of formats. This makes it easy for the important threat information to drowned out by all of the superfluous data. This blog post will discuss how to tell the threat intelligence from the threat data.

Content type: Blog Post

Keywords: threat intelligence

Links:

AtomBombing: Real Threat Of Just A Lot Of Hype?

AtomBombing has become a popular topic recently. This post will evaluate what it is and whether it is a real threat. Of course, this post will tie in SentinelOne endpoint security into the story.

Content type: Blog Post

Keywords: atombombing

Links:

Ransomworm Is Coming, Are You Ready?

This post will cover some of the malware innovations we are likely to see in 2017.

Content type: Blog Post

Keywords: malware, ransomware

Links:

When It's Popcorn Time, What Will You Do?

Popcorn Time is a new variant of ransomware that, after it encrypts files, gives its victims 2 choices: Pay 1 Bitcoin or infect 2 other companies (and have them pay). This post will provide details on this nasty new twist in ransomware.

Content type: Blog Post

Keywords: ransomware, popcorn time

Links:

Don't Assume Linux Is Safe From Ransomware

A new variant of KillDisk targets Linux machines. However, even if someone pays the $250K ransom, it still deletes their files. This post will discuss KillDisk and other ransomware that are made for Linux. It will finish with ways to protect the Linux machines on your network.

Content type: Blog Post

Keywords: linux malware

Links:

X Ways To Protect Your Wireless Network Against Threats

Best practices for protecting your wireless network against threats.

Content type: Blog Post

Keywords: network threats

Links:

X Ways Your CRM Can Benefit From Predictive Analytics

This post will discuss how CRM (in general, not a specific product) can benefit from predictive analytics by: predictive lead scoring, personalized product targeting, personalizing the consumer journey, improving decision making, categorizing customer spending.

Content type: Blog Post

Keywords: predictive analytics

Links:

How Machine Learning Can Improve Sales

Machine learning can be used to seek out opportunities using structured and unstructured data. This post will give tips and best practices on how businesses can benefit from using machine learning to improve sales.

Content type: Blog Post

Keywords: machine learning

Links:

Mariadb vs mysql

Comparison / contrast post of MariaDB and MySQL similar to https://blog.serverdensity.com/mongodb-vs-cassandra/

Content type: Blog Post

Keywords: database comparison

Links:

Threat Hunting: When You Can't Sit Back and Wait

So many companies sit back and wait for a breach to occur. This post will discuss the importance of being proactive with threats and then provide tips on how to get started. If tools are needed, I can supply a list of open source options if you like.

Content type: Blog Post

Keywords: threat hunting

Links:

X Tips For Successful Cybersecurity Email Marketing

Cybersecurity experts are "programmed" not to click on links. This post will discuss tips for reaching this group using an email series.

Content type: Blog Post

Links:

Network Security Vs. Endpoint: Which One Is Right For Your Business?

This idea has been done before, but it's usually from a vendor that wants to spin the topic in the direction of their tool and service. I would like to create a post that list the pros and cons for network security and endpoint that is vendor neutral.

Content type: Blog Post

Keywords: endpoint security,network security

Links:

Attribution: Finding Your Adversaries Before They Strike Again

You've been hacked. How important is it to find out who did it and how? This post will discuss what is attribution, its different levels, and how to find out more about the attacker.

Content type: Blog Post

Links:

Is Your Backup Strategy Ready For The Next Ransomware Attack?

What happens when it's 4:55pm and ransomware is released on your network, encrypting all of your file shares? Will you have to start restoring data from the previous night in hopes that your backup strategy worked and you have everything? This post will discuss this scenario and then talk about how to create and maintain a successful backup strategy. It can also allude to Unitrends as the being the solution.

Content type: Blog Post

Links:

How To Reduce Your Cyber Attack Surface Before It's Too Late

This post will cover best practices for reducing the attack surface of a company. It will cover securing the right boundary, including security in DevOps, reducing complexity, encrypting mission critical data, and more.

Content type: Blog Post

Keywords: cyber attack surface

Links:

Increasing Renewals By Knowing Your Customer Journey

This post will discuss: how the customer journey can be applied to onboarding, upsells, cross-sells, and churn ; how the reader can use the customer journey to increase renewals

Content type: Blog Post

Links:

X Tips for Building A Rewarding Automated Renewals Process

This post will discuss tips for building an automated renewals process (that references iasset as part of the solution).

Content type: Blog Post

Keywords: automated renewals process

Links:

How To Reduce Churn And Predict The Future

This article really isn't about predicting the future, but provides tips on how businesses can reduce churn and increase their subscriptions, making the future more predictable.

Content type: Blog Post

Keywords: reduce churn

Links:

Keeping Your Loyal Customers (and Saving a Bundle)

This post will provide stats on the benefits of keeping a loyal customer versus having to get a new ones. Once it has made the argument, it will give actionable tips on ways to keep more of those valuable loyal customers.

Content type: Blog Post

Keywords: customer loyalty

Links:

Making More Sales With CPQ

This post will provide tips and best practices for getting more sales with CPQ (configure-price-quote).

Content type: Blog Post

Keywords: cpq,configure price quote

Links:

10 Power Tips for Panoply You Can Use Today

Let's collaborate on some power tips that will show the world some of the features of Panoply.

Content type: Article

Links:

Are You Making the Most of Each Cell Phone Transaction?

How to make money on the device trade-in at POS, in addition to profiting from the sale of a new phone ; Using software to determine pricing for a device trade-in ; The importance of analytics (and knowing your KPIs) to make the whole process profitable. (I will need to do a quick interview with a subject matter expert to get the information required for this post.)

Content type: Article

Links:

X Ways to Improve Your Cellular POS Business

X ways to improve your cellular POS business by integrating trade-in solution software with retail POS systems, billing systems warehouse management systems, etc. (I will need to do a quick interview with a subject matter expert to get the information required for this post.)

Content type: Article

Links:

Buyer Personas: Are You Doing Them Wrong?

What if we walk the reader through the right way of creating buyer personas? We could start with why they are important to businesses, how they tie into great content, and how most places do them wrong. Then we can include some steps on how to create them the right way.

Content type: Blog Post

Links:

X tips to make you cloud migration a success

What are the biggest challenges in cloud security? X tips to make your cloud migration a success.

Content type: Blog Post

Links:

How to Make the Most of Your Data

You can have access to the best data scientist, but if your company isn't structured in a way to make use of the data, it won't do you much good. This post will offer tips for how businesses can make the most of their big data.

Content type: Blog Post

Links:

Is Latency Slowing You Down (And You Don't Even Know It)?

This post will discuss common causes of latency as well as tips on how to prevent it.

Content type: Blog Post

Links:

X Things You Need To Consider In Your Next Cloud Migration

There are so many steps to a successful cloud migration. This post will provide an overview of the process.

Content type: Blog Post

Links:

Azure Databricks: What It Means For Your Business

Azure Databricks has arrived. Let's celebrate this event with an introduction to this new tool, what it means for AI, and how it can be used to help businesses make the most out of data analytics.

Content type: Blog Post

Keywords: azure databricks

Links:

How To Increase Sales With Your Content Marketing

I've spent a lot of time recently (maybe too much) researching how to tie content to the various phases of the buyer's journey. This actionable post will take the reader through the process of doing it for their B2B company and hopefully make more sales along the way.

Content type: Blog Post

Links:

The Ultimate Splice: Connecting 5G, AI, Analytics, and the IoT to Create a New World

What happens when you combine the speed of 5G with AI, data analytics, and mix in some IoT? Find out how the combination of these technologies will enhance user experiences for communications, applications, digital content, commerce, and more.

Content type: Blog Post

Links:

How To Make More Sales By Combining Analytics and Website Personalization

Real-time analytics can be a powerful tool when combined with personalization. What happens when you take it to the next level and use the improved personalization to increase up-sells and cross-sells and have a greater impact on the bottom line?

Content type: Blog Post

Links:

X Ways To Grow An MSP Business

Managed Service Providers must update their businesses in order to survive. This post will give them X tips they can use to grow their business and thrive.

Content type: Blog Post

Links:

Maximizing Game Revenue For Fun And Profit

This post will cover a variety of ways the gaming industry can benefit from streaming analytics. I will utilize use cases from the VoltDB website in addition to research.

Content type: Blog Post

Links:

X Steps To Better Cyber Security

This post will discuss X steps businesses need to do for to have better cyber security including physical security, endpoint security software, server protection, and the importance of training your staff on the essentials social engineering, email, passwords, etc.

Content type: Blog Post

Keywords: cybersecurity, physical security, endpoint security software

Links:

X Things You Should Do Before Hiring a Freelancer

Too often companies hire a freelancer without having a plan a place. This post will discuss X things they need to consider before hiring a freelancer.

Content type: Blog Post

Links:

Email Spoofing: How it Happens and What Can Be Done

We've all received emails from spoofed addresses. This post will go through some technical details on how it happens and what users can do to avoid to growing trend.

Content type: Blog Post

Links: