Back To BlueToad.com

VARS

Basic Information on BlueToad’s Value Added Reseller Program

Basic Information on BlueToad’s Value Added Reseller Program

Get a basic overview of the different client relationships BlueToad maintains with its publishers and resellers. Introduction The intended audience for this blog is an organization that maintains relationships with multiple publishers and publications as well as existing BlueToad direct customers considering becoming a Value Added Reseller (VAR). This document will provide a basic understanding of your partnership options. Learn more by contacting BlueToad’s sales department. Table of Contents Service Level Overview Becoming a VAR Support for VARs Service Level Overview BlueToad’s direct customers and VAR partners work closely with BlueToad’s support team to ensure publishing digital editions is fast and easy. Service levels range from: Standard Features: Upload and create your own digital publication including setting up text articles, page jumps, video/audio, etc. Publisher’s Package: Upload your publication and BlueToad will assist you with the contents menu setup, advertiser menu setup, text version of articles, manual linking, and rich media insertions (video, audio, slideshows & animations). Hands Free Service: BlueToad will provide you with one-on-one support and will assemble your entire publication for you including file uploads, page setup, cropping, combining, and activation. Retail Package: Upload your retail publication and BlueToad will enhance your edition using special Retail Assisted Services including product rollovers, product detail pages, SKU links, and product number links. In addition to these service level options, some clients have decided to partner with BlueToad as a VAR. VARs sell white-label versions of BlueToad’s products and services to their customer base. BlueToad welcomes as a VAR anyone who would like to add digital editions and mobile apps to their product portfolio. BlueToad gives VARs the opportunity to...
Trends: Digital Content Consumption

Trends: Digital Content Consumption

Mobile-Connected Devices > Earth’s Population With the number of mobile-connected devices expected to exceed the number of  people on earth by the end of 2014, it is essential that content creators and publishers develop a digital strategy that will best meet the demands for delivery and engagement with a growing connected audience. When developing a digital strategy, a good place to start is understanding how the connected consumer behaves and prefers to consume content. Such insight requires big data. With nearly 700 million issue views over the last three years, BlueToad is in a unique position to provide content creators and publishers the digital audience big picture perspective. The Data Is In, And The Findings May Surprise You. Let’s begin with the question that seems to dominate conversations regarding the future of digital development: Native App vs. HTML5, which is better? To answer this question, BlueToad compiled data from publications with apps over the last year: January 2013 – January 2014. The data shows that notwithstanding the availability of a native app, 53% of consumers still accessed the issues via a non-native platform. The data also suggests that the gap between native and non-native page views is closing. Non-native platform page views grew from 34% to 47% over the past 12 months. Why Is This Important? The trend toward non-native viewing for both issues and pages is important information for content creators and publishers as they continue to develop their digital strategy. The data reminds us that regardless of which platform we believe to offer a superior experience, the consumer is the ultimate judge, and publishers who care about reach and engagement should not ignore...
Basic Security Practices for Digital Publishers

Basic Security Practices for Digital Publishers

Introduction The general purpose of this white paper is to provide a basic overview of security practices for digital publishing. The intended audience for this document is a publisher, digital marketing professional, or a reseller interested in publishing and distributing content across multiple platforms. A separate and more detailed BlueToad Information Assurance document is available for IT and security departments upon request. Table of Contents Security Overview Healthy Coding Standards Internet Perimeter & Intrusion Monitoring System Penetration Testing System Services & Security Updates Written Information Security Standards Data Center Physical & Environmental Security  Security Overview Mobility and easy distribution have become enormous assets for improving the reach of the publisher to the reader in the digital publishing enterprise. The ability to digitally access information throughout the world has transformed digital publications. Content and data security should be a top  priority when deciding to digitally publishand distribute your content. When choosing a digital publishing partner, it is important that you understand the processes and security measures that are in place to protect your content and user information. Generally speaking there are six security related questions that you should ask your digital publishing partner: How does the prospective partner ensure healthy coding standards? What steps are taken to prevent intrusion attempts? Does the prospective partner initiate any proactive and independent system penetration testing? How quickly does the prospective partner respond to security updates for software and hardware? What measures are taken to ensure the prospective partner’s employees are aware and comply with all security policies and procedures? How does the prospective partner ensure the physical and environmental security of your hardware? BlueToad takes data security and system reliability very seriously. BlueToad is committed to maintaining and proactively testing its security systems in an effort to properly monitor its digital infrastructure. Healthy Coding Standards How does BlueToad ensure healthy coding standards? BlueToad routinely audits its code base for security vulnerabilities; these...