The Leader Q2 2001 — Austin Software Council
Transcription
The Leader Q2 2001 — Austin Software Council
circulation 5K The Leader Supporting Our Technology Community, 2Q01 IN THIS ISSUE FEATURES Technology Assessment Supplement Technology Assessment in Today’s EverChanging Market . . . . . . S•1 Effective Technology Selection Through the Use of a Technology Roadmap . . . S•2 Implementation of the ASC Member Cards Program . . S•2 A Structured Approach to Technology Assessment . . S•3 SOAP— A Viable Option? . . . . . .S•4 Executive Roundtables: An Opportunity to Learn and Build Relationships . . 10 Why Implement a B-to-B e-Loyalty Program? . . . . . 18 DEPARTMENTS A Note on This Issue . . . . . 2 Sponsors . . . . . . . . . . . . . . 3 Executive Director’s Report . . . . . . . . . . . . . . . . 3 General Counsel’s Comments . . . . . . . . . . . . . 4 Workforce Development . . 5 Export Control Considerations for the Software Business . . 6 Austin’s International Development Gaining Critical Mass . . . . . . . . . . .8 Monthly Meetings in Review: March: Final Jeopardy— Are You Betting Your Business on Your Sales Force? . . . . 14 April: E-Care—The Convergence of Software, Internet Services and Call Centers . . 15 May: Funding Sources . . . 16 Membership Gallery . . . . . 19 New and Renewing Corporate Members . . . . 21 Upcoming Events . . . . . . 24 Economic Times Spur Advice for Employees and Employers Re-Careering in a Changing Economy Jamie King Belinne, Associate Director for MBA Career Services, University of Texas at Austin In Austin’s rapidly changing market, many people are dusting off old resumes and exploring their options should they decide to make a career move. For those who have always conducted job searches in a “seller’s market,” exploring the “hidden job market” can be overwhelming. To make this process both manageable and rewarding, you must first overcome the questions that paralyze most job seekers in turbulent economic times. 1. Whom do I know that can help? A survey last month by Techies.com of more than 1,600 technical professionals named one’s personal network as the most effective means of finding satisfying employment. Your network includes your current coworkers, peers in other companies, friends, and acquaintances. Make sure everyone you know understands your core skills and career interests. Also, make sure to pass along information or contacts of interest to people in your network whenever possible. Networking has to be a two-way exchange to work effectively. 2. What do I say to them? To network well, you need to be able to “sell” yourself in less than a minute. Very few networking contacts want to hear your life story, and at a professional organization meeting, you don’t have more than a minute to get your message across. Spend time developing and practicing your pitch so it comes out naturally and can easily be tailored to meet the needs of your audience. For example, “Hi. I’m Dustin King. I’m working at WidgetsRUs managing vendor relationships to make sure our new product launches run Continued on page 11 It’s Hard (and Dangerous) to Say Goodbye... Tips on staying out of court with former employees Laura M. Merritt, Bracewell & Patterson, LLP In a hot economy, employment litigation declines. Unhappy workers simply move on to greener pastures, and terminated employees find alternative work easily, often before their final paycheck is processed. However, when corporate belts collectively begin to tighten, it becomes increasingly difficult for individuals to change jobs. The result? More employment lawsuits are filed against former employers. Sexual harassment, breach of contract, nonpayment of wages, race/national origin discrimination, disability discrimination, workers’ compensation retaliation, defamation…the list of potential causes seems endless. Although the only way to guarantee you will never be sued by employees is to not have employees at all (hardly a workable solution!), the following strategies will help prevent employment lawsuits and enhance the probability of courtroom success if your company does become a litigation target. 1. Carefully review each individual termination before finalizing the decision. Does the employee have a contract for a specific period of employment? Has the employee recently filed a discrimination complaint or workers’ compensation claim? Has the company followed policy? Does the company’s documentation support the termination? The company’s human resources executive, legal counsel, or other high level decision-maker should carefully consider these and similar issues as well as the specific, individualized facts and circumstances of each termination. Requiring more than one executive to approve the decision will prevent “heat of the moment” terminations and help ensure that the company’s action will be well reasoned and legally sound. 2. Understand and follow wage payment laws and regulations. The Texas Payday Act requires final wage payments to be made by specific deadlines (by the sixth day after termination if involuntary, by the Continued on page 24 The Leader Board of Directors Robin Lea Curle, CEO Partnerships Les Belady, Consultant Bill Bock, Verity Ventures John Dirvin, Austin Ventures Neil Iscoe, e-Certain Dick Moeller, Verity Ventures TBD, Tivoli Systems Betty Otter-Nickerson, Elegiant Lauren Peters, Peters Group Public Relations Juan Sanchez, University of Texas at Austin Ed Taylor, Collective Technologies Paul Toprac, ASC Executive Director Chair A Note on This Issue Emily Sopensky, The Iris Company Staff 305-0023 Main Number Executive Director Paul Toprac, 305-0032 [email protected] Council members, both employees and employers, should be able to glean needto-know advice from contributors Jamie King Belinne (University of Texas) and Laura Merritt (Bracewell and Patterson, LLP) that is useful in both good and tepid economic eras. Then, too, Executive Director Toprac has some suggestions about how Council membership is useful regardless of the economic times. Workforce Development Chair Craig Eissler focuses on the market for IT workers. Check out the new supplement on Technology Assessment. As outsourcing and partnering become more and more important to the viability of the corporate structure and income, the rigors of assessing technology are even more important. Consultant Cole approaches the subject favoring flexibility, redundancy and monitoring the market constantly. Pat Flanagan of Athens Group gives us the framework for a solid technology roadmap. Embrace Software’s Raj Sundra describes the Council’s new member card program and the technology assessment involved in implementing this benefit. ConnectTel CEO Kannan Kaliyur writes about SOAP, a new protocol for webenabled integration of services. He invites you to explore this technology and do your own assessment. We are in the process of improving the content and design of the newsletter so please let us know what you think— good and not so good. The design will be altered slightly and we will have a new set of department articles focusing on the membership. As always, we look forward to contributions from members. We’re interested in both timeless articles that are of interest and use to our membership as well as those that address the times. Next quarter we’re focusing on New Beginnings. Remember this is a newsletter FOR and BY members, so please join the Council first if you want to submit an article. Contact me at [email protected]. I look forward to hearing from you. Director of Member Relations Catherine Bartlett, 305-0010 [email protected] Business Development Manager Ron Miller, 305-0014 [email protected] Office Manager Sandra Kaso, 305-0043 [email protected] Events Coordinator Susan Snow, 305-0042 [email protected] X-Team X-Team Chairs ASC “University” Chancellor Chris John, 478-8779 x13 [email protected] Community/Civic Vacant Conferences Vacant Deirdre Mendez, 338-1177 [email protected] International Development Legislative Jeff Heckler, 477-7342 [email protected] Legal Counsel Tom Adkins, 494-3640 [email protected] Marketing Steve Farrer, 418-9059 [email protected] Membership Vacant Mixers Vacant Programs Charlie Jackson, 491-2625 [email protected] Publicity Lauren Peters, 794-8600 [email protected] ASC Communities Sponsorship Website Workforce Development 2 Keith Zimmerman [email protected] Vacant Judith Manriquez, 930-4286 [email protected] Craig Eissler, 912-9694 [email protected] 2Q01 Sponsors Community Investors Bracewell & Patterson L.L.P. IBM developerWorks Team KPMG LLP McKinsey & Company Microsoft Technology Center Stax Research Trilogy Software Report from the Executive Director Paul Toprac, Executive Director Annual Underwriters “When times are hard, the last thing you should do is panic. When you panic, your brain shuts down; you stop listening and learning.” William F. Miller, professor emeritus of computer science, Stanford University School of Engineering R developerWorks Team Supporting Sponsors Platinum Arthur Andersen Bracewell & Patterson L.L.P. GraphX Creative PetersGroup Public Relations Protéan Marketing Gold Copy Craft Printers, Inc. PricewaterhouseCoopers Silver Rockford Business Interiors Sigma Information Group, Inc. Bronze Jump.net Thompson & Knight, LLP This quote says it all. Austin’s technology community has begun a difficult transition, but we cannot panic. Instead, let’s weather the storm and emerge stronger than before. The companies that survive will flourish by creating and reaping value for their customers and investors. Those workers whose jobs have vanished will create new ideas and find meaningful work in new endeavors. The most dangerous thing we can do is to allow panic to stop the listening and learning because through learning we can overcome the current obstacles and uncover greater success. How can the Council help you to succeed in these difficult times? We have programs that will help your company l Find new business opportunities l Increase intellectual capital l Reduce cost and risk In the coming year, we plan to model future initiatives on our past successes. For example, we have offered several ways to connect to international business opportunies. The most significant have been our International B2B Trade Missions and the International Trade Fair. We will continue to offer international business interchanges, along with the opportunity to learn new ideas, master emerging technologies, locate market opportunities, and obtain new skills. Future conferences, including “Funding in 2001, Part II” and “Partnering,” will help your company find new funding and partnerships. The “Content Management” eBusiness Forum and the “Linux Invades” Internet Appliance SIG will focus on managing new markets and technologies. Finally, programs such as the “Alliance and Partnerships” marketing forum and the “Testing Software” seminar at ASC “University” will offer additional new skills. Each of these ongoing programs represents a community for technology executives and workers to connect and learn from each other, creating business relationships that help companies grow. We have launched a program to give executives the critical information and support they cannot find elsewhere. Access to this information will provide tools for successfully overcoming hostile business conditions. The Executive Roundtables consist of top executives from Austin’s high-tech companies. Each group is designed to match executives with the noncompeting peers who can help them the most. The goal is to provide targeted advice to give executives a competitive advantage. Twelve peers will meet on a monthly basis to confidentially discuss highly relevant issues. If every executive’s time is worth $150 per hour, then the Executive Roundtables provide over $3,000 worth of advice each session and nearly $40,000 of counseling in one year. This is a great opportunity to make valuable contacts and help yourself while helping others. For more information, see the article in this issue of The Leader and email me at [email protected] or call 512-305-0032. The Council offers benefits to reduce the cost and risk of operations. Our Member Services program provides reduced payroll costs through ADP, online employee benefits services from benefits.com, discounted long-distance service with SmartPrice.com, discounted business furniture from Rockford Business Furniture, and recruiting programs through KLBJ and the Austin Chronicle. You can also reduce your business risks through an insurance program with InsureHiTech. To find out more, contact Catherine Bartlett at [email protected] or at 512-305-0010. Additionally, we have responded to the needs of displaced workers with career opportunities that keep valuable talent in Austin. Modeled after the highly successful JobConnect in March, the Council again partnered with the Greater Austin Chamber of Commerce and the Capital Area Workforce Commission to hold a bigger and better JobConnect in June. More than 30 companies came together to recruit from several thousand prospective employees. This successful event benefited the community, companies, and candidates. The Council continues to focus on helping companies Sell, Save, and Survive, but we can do more. If you have any ideas about how we can better serve companies in the Austin area, contact me at [email protected] or 512-305-0032. See you at our next meeting! 3 The Leader General Counsel’s Comments All Eyes Focus on Online Privacy W. Stephen Benesh, Bracewell & Patterson, LLP Companies have responded to this It’s difficult to open a newspaper or magazine these days without reading about anoth- increasing public concern over Internet privacy in a number of ways. Web-based busier lawsuit alleging improper use of private nesses have long recognized four widely information obtained through the Internet. accepted fair information practice principles: Perhaps the most well known of these is the Notice (clearly and conspicuously state inforDoubleClick litigation. DoubleClick used mation practices); Choice (offer choices on cookies (tracking software) to monitor users how personal information is used); Access at each of the websites where advertising for (grant users access to their own information); DoubleClick’s clients was displayed. Many of and Security (take reasonable steps to protect these websites required disclosure of users’ the security of user information). However, personal information. Last year, DoubleClick the FTC reported last year that unveiled plans to merge dataonly about 20% of the websites bases with Abacus Direct, a ...less than 10% sampled in its 2000 survey have company that maintains a of the sampled implemented, even in part, these marketing database gathered from catalog retailers’ cussites are enrolled principles (although 42% of the 100 busiest commercial sites in the U.S. tomer information. This in online privacy have implemented them). Likewise, merger announcement resultseal programs... the FTC survey determined that ed in a number of lawsuits less than 10% of the sampled sites against DoubleClick alleging are enrolled in online privacy seal programs invasion of privacy (based on information and conspicuously display privacy seals. gathered through the cookies) and a request Many companies—including IBM, for a Federal Trade Commission (FTC) invesDoubleClick, AT&T, ExciteAtHome, and tigation of DoubleClick’s practices. Many of EarthLink—have also responded to concerns us also recall the Toysmart.com fiasco, where the crumbling toy vendor attempted to sell its over online privacy by creating the position of Chief Privacy Officer. CPOs are given a varidatabase of 200,000 customers as it slipped into bankruptcy. These lawsuits are not isolat- ety of responsibilities, ranging from soothing customer concerns about the use of their pered incidents; in the last few years, over 30 sonal information to lobbying lawmakers over well known companies have been named as parties in privacy-related lawsuits, and the fre- proposed technology-related legislation. Allen Weston, President of Privacy in American quency of such suits is increasing rapidly. Business, estimates that 75 to 100 U.S. comThe rise in Internet privacy litigation is panies have employed privacy officers and that merely a symptom of growing concern over “there will be hundreds or thousands in the the use of consumer data obtained over the United States over the next few years.” (In Internet. In a 1998 Harris poll, 88% of the respondents stated that they were “concerned contrast, the Bush administration has opted not to appoint a “chief counselor for privacy,” about general threats to their privacy” and a position created by the Clinton administra82% felt that they had “lost all control over tion, instead placing responsibility for privacy how companies collect and use their personal issues in the hands of the White House Office information.” Almost 78% believed that comof Management and Budget.) panies ask for too much information on the Nevertheless, there is a general sense that Internet. In a May 2000 report to Congress, web-based businesses have done too little too the FTC stated that 92% of consumers are late to protect users’ private online informaconcerned (67% very concerned) about the tion. As a result, both the Texas Legislature misuse of their personal information online. and the U.S. Congress are currently considerThis study also estimated that by 2002 privaing several proposed bills and legislation govcy concerns might result in potential losses of erning the use and dissemination of online online retail sales of up to $18 billion. 4 information and protecting the privacy rights of Internet users. Seventy bills relating to privacy issues were introduced in the most recent session of the Texas Legislature. Many relate specifically to the health care and financial services industries, but some have broader applications. For example, the Legislature was considering an amendment (as of press time) to Article One of the Texas Constitution to recognize a personal right of privacy. Also, noting the lack of “a consistent or comprehensive personal information privacy policy,” the Texas Legislature was considering establishing a Task Force on Personal Privacy to assess the effect of Texas laws on individuals, commerce, and government operation in relation to personal information privacy concerns. Additionally, the Task Force would address whether existing or proposed laws contravene commonly held expectations of individual privacy and affect commerce by creating an environment in which individuals will become less likely to divulge information. “Personal information,” as defined in the bill, includes an individual’s address, telephone number, Social Security number, date of birth, marital status, family member information, financial history, and consumer history (presumably, sales, purchases, and other commercial activity). The U.S. Congress is also considering a number of privacy-related bills: l Online Privacy Protection Act of 2001— requiring the FTC to create regulations to protect the privacy of personal information collected from and about individuals who are not covered by the Childrens’ Online Privacy Protection Act. l Electronic Privacy Protection Act—prohibiting the manufacture, sale, and use of an information collection device without notice and consent. l Consumer Internet Privacy Enhancement Act—protecting the privacy of consumers who use the Internet. l Consumer Online Privacy and Disclosure Act—requiring the FTC to create regulations to protect the privacy of personal information collected from and about individuals on the Internet. 2Q01 Workforce Development IT Workforce: How Has the Economy Changed Demand? Craig Eissler, Workforce Development Chair l Privacy Commission Act—establishing a commission for the comprehensive study of privacy protection. l Spyware Control and Privacy Control Protection Act of 2001—providing for the disclosure of the collection of information through computer software. As concerns over Internet privacy grow, companies must alleviate customer and user concern over the confidentiality of private information. Companies should pay close attention to the manner in which such information is gathered, stored, and disseminated and also take specific steps to assure user anonymity. As evidenced by DoubleClick’s difficulties, many privacy disputes are triggered by partnerships and joint ventures between web-based businesses contemplating shared ownership of user information. Companies contemplating such situations should take steps to ensure that proposed joint marketing and joint venture arrangements do not violate either company’s privacy policies. W. Stephen Benesh is a partner in the trial section of Bracewell & Patterson, LLP’s Austin office, which serves as General Counsel to the Austin Software Council. Mr. Benesh engages in commercial and technology litigation and is a member of the law firm’s Information Technology & E-Commerce (ITEC) Group. Mr. Benesh may be reached at [email protected]. The emphasis this year is on traditional Like the rest of the U.S., Austin’s IT job information technology skills: programming, market is undergoing significant change. software engineering, and network design and While demand for workers remains strong, administration. Demand for candidates in the numbers and nature have changed subenterprise systems climbed to 62%. stantially in the past 12 months. Four-year college degrees proved the best This past April, the Information pre-hire means of attaining needed skills and Technology Association of America (ITAA) released one of the most comprehensive stud- knowledge in four of the eight IT job clusters developed by the NorthWest Center for ies of the IT workforce ever conducted. The Emerging Technologies (NWCET): database study indicates that despite the experience of development/administration, enterprise sysindividual companies, a steady supply of new tems, programming/software development, IT workers is still needed. In the U.S., and technical writing. The other four IT job approximately 425,000 positions will go unfilled because of insufficient applicants with clusters are network systems specialist, web administrator, interactive digital media spethe requisite skills. Last year, ITAA collected cialist, and customer systems support. data indicating a shortfall of 850,000 posiCertification through a vendor or industions. The new study suggests that while the try certification program remains of moderate employment picture has changed, demand is importance. IT companies viewed certificastill very high. tions as at least as important as a bachelor’s “The downswing in the U.S. economy degree; non-IT companies placed certificahas undoubtedly affected the demand for IT workers this year,” said ITAA President Harris tions slightly below a bachelor’s degree in N. Miller. “Skilled technology workers—still a importance. The Austin regional manager of the highly desirable commodity to IT and non-IT recruiting firm PDS Technical Services, Dan companies—are facing more cautious hiring practices than the “irrational exuberance” that Frey, says “I am seeing more resumes and some say described 2000. However, our 2001 with more variety than in months past. The highly skilled A-players are always in high numbers suggest that hiring has by no means demand, and though the less technically halted for IT workers, rather demand still far skilled workers will experience exceeds supply in this market.” Other top findings are that …demand still far more competition, they will still fare better on the average non-IT companies, in aggregate exceeds supply… than the non-IT worker.” terms, employ 10 times more IT CEO of the executive workers than do IT companies. Austin-based recruiting firm Pedley-Richard On a per-company basis, however, the hiring & Associates, Sally Pedley, says, “We have needs of IT companies are greater than nonseen a dramatic reduction in the number of IT companies. ITAA defines IT companies as contract recruiters we place, but IT-skilled firms that create and sell commercial IT soluworkers are being absorbed relatively quickly. tions. Non-IT companies use IT solutions to Due to the recent massive layoffs, I expect to assist in business operations. The typical IT company will attempt to fill almost 19 slots in see more individuals moving into the independent consulting business, particularly the the next 12 months compared to just two for more senior non-IT skilled professionals.” non-IT companies. The complete ITAA study, “When Can Technical support people remain most in You Start? Building Better IT Skills and demand by IT and non-IT companies alike— Careers,” is available for $50 to ITAA memone-fourth of all new positions over the next 12 months. Even so, this report finds demand bers and for $75 to non-members. To order, visit www. itaa.org. for these professionals is down 65%. 5 The Leader Export Control Considerations for the Software Business John Symington, attorney-at-law If your company is licensing software outside the United States, you need to be aware of U.S. export controls, just as any other exporter should. For most companies, an export control program need not be complex, and many compliance activities can be outsourced. But responsibility for compliance cannot be delegated, and the penalties for violations of export controls can be severe. Consequently, you need to understand how export controls affect your business and implement an appropriate compliance program. The U.S. government controls international trade in goods and services, financial transactions, and disclosure of technical data. Depending on the characteristics of a transaction and the goods or technology involved, a transaction may require no license, may require a license that is published and granted generally for all qualifying transactions, may require application to the government for a specific license, or may be prohibited altogether. Controls may be imposed for a number of reasons, including proliferation of missile technology; nuclear, chemical or biological weapons; national security; terrorism; and potential for dual military/civilian use. Export controls include many different laws and regulations, as well as international agreements, and are administered by various different government departments, principally the Commerce, Treasury, and State Departments. It can get quite complicated. But once you identify the particular regulations that apply to your business activity, compliance is often a routine and simple process. The compliance program should be periodically updated. Export controls are politically sensitive, and, as a result, they are subject to constant change. Each year significant changes may bring trade to a halt in one area or open previously forbidden markets. Further, as your business grows and evolves, the new activities may involve additional regulatory requirements. 6 Software may be many things, and defin- tions, etc.). Because many aspects of export ing it may be difficult and subject to long control are not obvious, you simply cannot debate. But for purposes of export control, know how you are affected until you look the definition is straightforward: software is into the matter. technical data. Accordingly, exports and reSo where do you start? For general inforexports of software need not necessarily mation, the relevant government web pages involve shipment of physical media (i.e., CDare a good place: ROM) or even a cross border transmission l Department of Commerce (Bureau of (i.e., downloading) to be subject to export Export Administration) www.bxa.doc.gov controls. Software may also be subject in l Department of Treasury (Office of some cases to “deemed” export rules. Under Foreign Assets Control) these rules, disclosure of data to a foreign www.treas.gov/ofac/index.html national may be “deemed” to be an export to l Department of State (Office of Defense that person’s home country, even though the Trade Controls) www.pmdtc.org disclosure takes place within the U.S. For simple compliance requirements, Even if your company is licensing busifreight forwarders and other export profesness or consumer software of types commonly sionals can be very helpful, particularly when available and exporting only to implementing the procedures necrelatively unregulated trade destiessary for your company to comSoftware is nations like Canada, Mexico, and ply. For more complicated requiretechnical data. ments, specialists can advise on the EC, you need to examine how export controls affect your busihow to design and implement a ness. Commonly available applications in the good compliance program. And at any level U.S. may be subject to strict export control, of complexity, it helps to consult a lawyer as has been the case for many years with familiar with the law in this area. encryption applications. The technology and Export controls are complicated and can products subject to controls are not always be intimidating, but they are not normally a obvious. For example, unless you know how reason to avoid international trade. Be aware. to build missiles or make mustard gas, the Adopt a reasonable compliance program. products and processes involved will not be Update the program periodically. In this way, obvious, and you cannot be sure that your you can achieve and maintain compliance and software is not a potentially integral part of avoid the potentially serious sanctions for viosuch activities. And you will never find out lation of export control laws. unless you go through the exercise of classifyJohn Symington is an attorney in Austin. ing your software. Even where the product His practice focuses on general business classification and destination controls are legal matters and international business known, there may be procedures that you transactions. He can be reached at need to implement to qualify for the [email protected]. ble license, such as screening customers against the TDO list (a list of persons and companies that have been identified with embargoed governments, terrorist organiza- Think of it as 220-volt PR. SocketPR is high energy public relations for the high technology industry. Powered by industry expertise, individual excellence and innovative thinking. Proactive public relations services scaled to fit your company’s unique requirements. Powerful media and analyst relationships that produce the results you want. Plug into SocketPR. Atlanta - Austin 512.335.8771 www.socketpr.com The Leader Austin’s International Development Gaining Critical Mass Deirdre Mendez Things are sizzling in Austin’s international arena—international opportunity for Austin companies has never been greater. The Council is sending out a regular e-mail newsletter to keep you informed; if you’d like to receive the monthly International Update, let me know. Some Of The Signs That We’re Gaining Global Ground At the Greater Austin International Coalition’s annual conference in May, more than 100 members of the 300-member audience signed up to work on international projects. GAIC’s new stakeholder program will allow volunteers to propose and participate in community projects, such as the following that have been proposed: l International Protocol Network to host international visitors and maximize their exposure to the community and vice versa l ABIA Support Group to increase the international services at Austin-Bergstrom International Airport l Promotion of an international trade center for Austin l An initiative to create international opportunities for Austin’s film and music industries l An international labor and workforce development initiative l Advocacy of international policies to state government l Education Peer Group to network and create joint international programs among the region’s academic institutions l A project to educate government officials about international issues l An initiative to create international exchange in the fine and performing arts 8 Participation is open to anyone; contact me if you’d like to work with this group. More good news: John Brier, the new VP of Economic Development at the Chamber of Commerce, has expressed his commitment to serving Austin’s business community through international initiatives. It’s great to see the Chamber returning to an international focus. The Mayor’s International Infrastructure Task Force has recommended that the city create a public/private partnership to promote international expansion in the region. The development of an international trade organization will be part of this initiative. Mayor Watson has appointed 12 people to serve on an interim board to get this project up and running. International investors are showing interest in Austin. At a time when U.S. companies are having difficulty attracting lateround investment, foreign investors are an ideal solution. International organizations don’t follow a U.S. venture capital model. They’re more interested in connecting with a particular technology than realizing shortterm capital gain; take longer to conduct due diligence and process paperwork; and typically prefer to invest in solid companies with a history of prudent management, a product, and some customers. This profile makes them a great match for Austin’s investment community, whose portfolios are heavy with lateround companies. The best thing about foreign investors is that they can open up other markets to the companies they invest in. So international capital isn’t just money—it’s smart money. Within the local venture capital community, we’re seeing increased interest in overseas investment, a sign that Austin is maturing and taking a long-term approach to managing local companies. The Council is as committed as ever to providing international opportunity for Austin technology companies. We have an IT software mission to Japan scheduled for early October and a European mission planned for spring 2002. Contact me for details. If your company’s products have a global market, you need to think about international business. The good news is that Austin’s business community is mobilizing to meet your needs. For more information, contact Deirdre Mendez, Foreign Business Management Consultants, 512-338-1177 or [email protected]. Spice up your technical content eases l e r s Pres Succes s Stories Studies Case Techn Documical entati on tions a t n e s e r P Ad Cop y ures Broch S ure pictures often stave off the need for words. But they don’t replace them! Your technical differentiator still needs textual explanation. Editors and journalists urge you to eliminate the following buzzwords from your marcom lexicon and your next press releases: Best-of-breed ■ Leading ■ Seamless ■ Customer-centric ■ Leading provider ■ Solutions ■ Cutting edge ■ Mission critical ■ State-of-the-art ■ End-to-end ■ Robust ■ Value-added ■ First-mover ■ Scalable ■ Web-enabled So either pull out the thesaurus or find a pen to hire. The Iris Company facts with flair Emily Sopensky 512.452.2448 [email protected] 512.452.8950 fax The Leader Re-Careering in a Changing Economy Continued from page 1 well. The last product I helped launch, GoGoGadget, has been extremely profitable. Because I enjoyed the product management aspects of that project so much, I’ve decided I’d like to work toward a more product management type role….” Then tailor the ending to your audience. For instance, at a meeting of the American Marketing Association, you’d probably end with “Right now I’m trying to learn more about the product management field; I’d appreciate any insights or advice you could give me on pursuing opportunities in this area.” Stay away from vague titles or irrelevant details. Use language and reference points your audience understands. As one of my peers once told a more technical friend, “explain your job to me as though you were explaining it to your mother.” 3. How many and what resources should I use? The Techies.com survey also noted that technology workers use an average of nearly seven different employment resources, including professional associations, online job boards, headhunters, contract positions, newsgroups, and want ads. Most of the survey respondents posted their resumes to an average of 3.5 online sites. Many web services, such as AustinatWork.com or CruelWorld.com use “agent” technology—you submit a profile and they contact you with relevant jobs for which you have the option to apply. Also, major search engines such as the job database on Hoovers.com are a great way to search most of the major online job posting sites with just one search. But think carefully before releasing your resume and personal contact information to strangers. 4. Where do I find “hidden” jobs? Some estimate as many as three out of every five professional jobs are never advertised before they are filled. While your personal network is by far the best place to tap into these opportunities, there are other resources as well. Websites for local incubators and venture funds are a good place to see who’s doing what with what kind of funding and who is most likely in a growth mode. Read the Austin Business Journal to see who is buying new offices, another good indicator of growth. After all, they have to put someone in those offices; why not you? And don’t forget about the Austin Software Council’s events and activities! Why should they hire me? You must know the answer before you can approach a company to request a job. And your resume and cover letter should clearly state these reasons up front. Keep in mind that vague generalizations such as “self-starter” or “people person” don’t sell as well as accomplishments. Take some time to list all of your professional accomplishments over the past few years. Then, for each accomplishment, list all of the skills you used to reach that goal. Lastly, decide which of these skills you most want to use in your next job. Your cover letter, “sales pitch,” and resume should all highlight these accomplishments and skills. Whenever possible, attach numbers to your accomplishments to show just how effective you were. For example, you can either say “Created a webbased order form for an existing product line” or you can say, “Increased orders for existing product by 25% by creating a web-based order form.” Which person would you hire? The clearer you are on what you have to offer and what you want to do, the more likely you are to get what you want. ASC Communities Information Systems Forum partnered with AITP Executive Roundtables Keith Zimmerman [email protected] HR Peer Group Susan Sandberg [email protected] International Forum Deirdre Mendez [email protected] Product Management SIG Karen Wilson karenkwilson @hotmail.com Dan Barsness [email protected] Internet Appliance SIG Jeff Michalski [email protected] Sales & Marketing Forum Jean Anne Booth [email protected] ASC Networking eBusiness Forum Monthly Meetings Charlie Jackson [email protected] partnered with Central Texas eCommerce Users Group 10 Jamie King Belinne is Associate Director for MBA Career Services at the McCombs School of Business at the University of Texas at Austin. She has worked in work services and job placement for more than 12 years. She can be reached at [email protected]. 2Q01 Executive Roundtables: An Opportunity to Learn and Build Relationships Paul Toprac, Executive Director, Austin Software Council It can be lonely at the top. When the buck stops here, a CEO cannot afford to make a wrong decision for fear of losing to the competition. The same applies to a CFO, COO, CTO, CIO, and executives throughout the high ranks of sales, marketing, and human resources. To help executives avoid disastrous missteps, the Austin Software Council is revamping the Executive Peer Groups into the Executive Roundtables. The Council has created Executive Roundtables to allow members of the top management teams in Austin’s high tech companies to consult and strategize with their peers. These Executive Roundtables provide members with confidential, highly targeted ideas and advice from a group of successful peers. Participants of the roundtables are rewarded with competitive advantages derived through discussion and interaction. Groups were created to target members lems or ideas that pertain to that person of established companies, fast growing vendirectly. In addition to providing advice to ture-backed firms, and high the host, the remainder of the potential start-ups. Each roundmeeting is devoted to the most every session table consists of 12 individuals important topics identified by the provides…more group as a whole. These discus(all members of the Austin Software Council) in similar sions can prove invaluable as the than $3,000 positions from nonworth of advice information comes from successcompeting companies. An ful peers with proven track emphasis has been placed on records. If each person’s time is mixing groups to create a combination of worth $150 per hour, then every session prodiverse experiences as well as to provide eduvides a participant with more than $3,000 cational opportunities and competitive advan- worth of advice for a total of nearly $40,000 tages for all group members. of counseling throughout the year. Each The Executive Roundtables are held roundtable also includes a professional facilimonthly with a different member of the tator who is trained to keep the sessions on roundtable hosting the meeting. The host time and the discussions on target. chooses at least one topic for the group to Therefore, every meeting is sure to be both discuss. This allows each member to receive efficient and beneficial to all. This unique some specific advice and support for probopportunity offers its members tremendous value by allowing executives to learn and consult while building their relationships with peers in the Austin technology community. ASC“U” Deans Leadership Neal Kocurek [email protected] Charles Leadford [email protected] Jim Ronay [email protected] Led by Chancellor Chris John, the Austin Software Council “University” deans are the people who plan the seminars their departments present. ASC“U” deans welcome your ideas for future programs. You can reach them at the addresses listed below. Vice Chancellor Tony Thompson [email protected] Finance Dale Cox [email protected] Brad Keller [email protected] Human Resources Chris John [email protected] Nancy McIntire [email protected] Internationalization Deirdre Mendez [email protected] Brenda Hall [email protected] For more information or to receive an application, contact Paul Toprac by email at [email protected] or at 512-305-0032. Legal Gail Taylor Russell [email protected] Marketing Cheryl Seeman [email protected] Steve Farrer [email protected] Software Development Kent Hemingson [email protected] Watch the Council’s website for details about upcoming seminars. We are looking for more volunteers. www.austinsoftwarecouncil.org 11 The Leader Technology Assessment Technology Assessment in Today’s Ever-Changing Market Charles Cole Selecting the “right” technology has never been as important as it is today. No longer relegated to support functions, technology now plays a critical role in a company’s success or failure. However, the growing myriad of innovative solutions and business models makes choosing increasingly difficult. Not only must IT solution providers and their customers understand the technology, they must also understand how it will impact their businesses. The bottom line: following a comprehensive, fact-based technology assessment process is a strategic imperative. To succeed, vendors, strategic partners, and customers must understand and follow the three-phase process involved in technology assessment: l Phase I: Internal Needs Assessment l Phase II: Vendor Analysis l Phase III: Negotiation and Selection Phase I: Internal Needs Assessment. The process begins by assessing internal needs and defining requirements, thereby identifying what specific problems need to be solved. Often the needs and corresponding requirements are then prioritized into categories such as “must haves, nice to haves, and future items.” Depending on the project’s size and scope, the initial phase can be fairly timeconsuming. It can be performed either by a team from a customer’s IT and business units or with an outside professional services firm. Although many net-savvy companies prefer to go it alone, other high-tech heavies such as Dell rely on third-party experts. Still, no matter who is involved, this phase is vital to laying the foundation for the ultimate success or failure of the project—the implementation of the chosen software solution. By aggressively keeping up with market trends and individual customer needs, solution providers can stay ahead of the competition and win market share by carefully choosing strategic partnerships. For example, leading broadband solutions provider, BroadJump, relies on its customers to help identify gaps in its current products. Says Jon Green, BroadJump’s director of partner marketing, “What is really critical is that we try to bring solutions to market that fit the needs of our customers. We can’t do it alone.” Phase II: Vendor Analysis. Based on business needs and software requirements, the project team can then identify potential software candidates. John Christ, VP of Client Services for divine, Inc., a leading professional services firm whose clients include American Airlines, Walgreens, and others, says that to Austin Software Council software vendor(s), must determine how well save time divine will often recommend that a given solution maps to the existing skill sets this phase be performed in parallel with the of its user and support base and current infraneeds assessment. They first come up with a structure. If there is any shortfall, the actual “big list” of possible candidates and narrow it cost can be much higher as the company may down based on specific requirements as they need a lot of consulting support as well as are identified and prioritized. new equipment. According to Gartner, many of their Based on the above criteria, a “short list” clients spend six to 15 months debating over of two to four alternatives is then selected. which product or vendor to use. Much of this Now either the buyer or its consultant can pertime is devoted to determining which criteria form technical analysis on the various soluare more important for the evaluation and in tions. This may include onsite product demos, collecting data on the alternatives. In fact, scripted scenarios, or limited-time trials (especlients spend upwards of 60% of their decision cially useful when it comes to prototyping). effort attempting to achieve management buyPhase III: Negotiation and Selection. in. To shorten the process, corporations often After selecting one or two software vendors, rely on outside support from consultants such the product selection team can then proceed as Devine as well as reports from leading anato contract negotiation and product selection. lysts such as Forrester, Gartner, and IDC. Key criteria for any technology assessment During this phase, the team establishes its negotiation strategy, develops contract terms should include both product attributes (funcand conditions, and enters into negotiations tion, technical architecture, cost) and vendor with the selected vendor(s). Consultant supcapabilities (services, viability, vision). To sucport can be extremely valuable in providing cessfully market to savvy enterprise customers, insight into deal structures and vendors’ agreesoftware companies must score high marks ments with clients. Occasionally, the selection across the board. According to John Christ, in process can break down at this stage, forcing addition to function and performance, compathe project team to review their previous steps ny viability plays a major role in evaluations. and make any necessary revisions. However, Christ adds that his team wants a software according to Gartner, in 90% of all selections, company to demonstrate success and be able the negotiation phase leads to a contract and to point to having implementation experience that has led to superior levels of production for the customer can move onto the next phase— implementation. One key to success, notes a client’s web site. Scalability is also a critical divine’s Christ, is the consultant working closeissue for large-scale customers. For example, ly with the client to ensure an equal ownership website clients will want to know that a soluof critical decisions throughout the entire tion can handle “x number” of transactions assessment process. without affecting site performance. Another important consideration is Likewise, when it comes to choosing a whether to buy or build. Today, with the strategic partner, both “hard” and “soft” growing number of proven alternatives, buying issues must also be examined. At BroadJump, is clearly the industry trend. once the need for an outside partner is identified, the …include both product Customers understand there is more implementation risk with company then investigates attributes…and a custom-built solution. who offers a given solution vendor capabilities However, notes Christ, “you and narrows the field to can’t buy competitive advan“best-of-breed” candidates— tage.” Either a customer must achieve it an important consideration in keeping with through a unique business process or the softBroadJump’s reputation as a market leader. In ware selected must somehow be customized. fact, BroadJump devotes an entire CTO team One way to gain this advantage is through to assess each candidate’s technology as they partnerships. Not only can they relieve cusperform their evaluations. Still, technology leadership is not the sole criterion. BroadJump’s tomers from having to build a piecemeal solution, they can ease the inevitable tweaking to Green also stresses the importance of cultural provide a unique offering for each client. fit: “We need to be able to work with our partners, to be able to move forward, and not Charles Cole provides brand strategy, strategic get hung up on any particular issue.” marketing, and business development advisory Cost is also an important factor. To services to high-tech companies based in Austin reflect the total cost of ownership (TCO), the and throughout the Southwest. He can be buyer, with the help of a consultant and/or reached at [email protected]. Special Supplement S•1 The Leader Effective Technology Selection Through the Use of a Technology Roadmap Patrick R. Flanagan, Athens Group, Inc. Introduction A downturn in the economy often creates additional challenges as businesses balance the use of new technologies to gain efficiencies or market share with tighter investment budgets. Whether choosing a new software package to help run the business, investing in manufacturing capability, training people to develop new capabilities, or revamping your website, having a clear understanding of how each initiative fits into your overall technology strategy is vital to achieving a return on your investment (ROI). One proven technique is the Technology Roadmap. What Is A Technology Roadmap? A Technology Roadmap is a structured method of describing your current a…roadmap can state in terms of maximize your technology and the competitiveness… goal state or what you want your capabilities to be. Moreover, it is a set of instructions on how to get from one to the other and a schedule to help you do it. The process of developing a roadmap forces you to spend time assessing the current state of your organization. This step can be difficult. In fact, it is not uncommon for executives to have heated discussions about their organization’s technology, processes, people, products, etc. However, working through the process results in a common vision about what will happen and when. It facilitates coordination and cooperation across departments and allows people to prepare for their role in the transition. Developing a Technology Roadmap Like any set of directions, the Technology Roadmap helps you plan your journey from “here” to “there.” First, define the key criteria by which you will describe your organization. At Athens Group, for example, we have found it useful to consider the following: people, leadership, organizational structure, processes, applications, networks, computing, and information technology. Second, describe your current organization in terms of the key criteria to create a capabilities profile. Third, describe your vision of your company or future capabilities profile. (A good reference point is your existing business plan.) Create a future capabilities profile using the key criteria to describe what resources—technical and human—your organization will need to be able to support your vision. Finally, build the roadmap that will enable you to transition from your current capabilities profile to the future. There are a variety of benefits to choosing a facilitator for your roadmap development. As others who have gone through similar processes will agree, a facilitator can help with both defining technology requirements and reaching agreement. Products of a Roadmap Action Output Define Criteria Describe Current State Review Business Plan Describe Future State Build the Roadmap Roadmap Framework Current Capabilities Profile Gap Analysis Future Capabilities Profile The Technology Roadmap When you build the roadmap, you create a series of planned improvements. With the description of your current capabilities and those required for the future, you highlight the differences between what you have and what you need in each of the key categories. Based on these differences, you can define specific initiatives to close the gaps. The final output of the roadmap is the schedule by which the projects get accomplished. In working out the schedule, some sequence issues will be easily resolved. For example, if your network is a bottleneck because of reliability or capacity, it needs to be upgraded before additional loads are placed on it by new applications. Barring other dependencies, the ROI expected from the change is often used to define the sequence in which projects are done. Keep in mind, however, that no plan is ever complete or remains unchanged during execution. Changes in the organization’s vision, the business environment, technology developments, and the organization itself are just a few of the factors that will trigger a need to update the plan. Periodically review the roadmap and modify it accordingly. Overall, though, creating a Technology Roadmap can maximize your competitiveness now and convert the stress of uncertainty into a clear blueprint for competitive advantage. Pat Flanagan is a senior consultant with Athens Group, an employee-owned consulting firm integrating technology strategy and software solutions. His expertise is in strategic business planning, systems implementation, process analysis and improvement, and information systems design. His email address is [email protected]. Techno Asses Implementation of the ASC Member Cards Program Raj Sundra, Embrace Software In the last issue of The Leader, we talked about customer relationship management using employee cards for companies. In this issue, we present the issues involved in designing and implementing a member ID S•2 card system for the Austin Software Council. The Council wanted to implement a member ID card system in an effort to l Reduce registration times and streamline the events registration process l Improve fee collection efforts by authenticating members vs. non-members l Adopt an innovative solution that would differentiate them from other associations The Council contracted with Embrace Software1 to develop and implement this sys- 1Embrace (formerly Keycash) and Microsoft Corp. are co-sponsors of the Member Card program. Special Supplement tem. Embrace explored smartcards first and then decided it was too expensive and cumbersome to implement a smartcard-based solution. Also smartcards were somewhat slow due to 1 to 2-second latency in recognizing cards presented to the reader. Embrace decided to explore barcodes instead and found that it was not only more cost effective (since no personalization, etc. is needed and the barcodes can be printed directly from a standard printer onto cardstock, which could then be laminated), but it was contactless and faster than smartcards. Each of the more than 2500 members Austin Software Council The Leader A Structured Approach to Technology Assessment Bill Kleinebecker, Technology Futures, Inc. So you’ve just created a new advanced technology that is superior to anything else you’ve seen. But will people pay enough to justify its commercialization? What is the best course of action to take advantage of this new technology? These questions need to be answered in a structured manner to avoid inaction and/or wheel spinning on the way to market. In working with its clients to assess a technology, Technology Futures uses an approach it calls Technology Advantage Management (TAM). TAM is not a fixed process, but a guideline to be adapted to the culture, structure, and abilities of the business. It has evolved out of numerous technology assessment engagements with organizations in industries ranging from beauty products to semiconductors to telecommunications to national security. An assessment project starts with a list of the salient features of the target technology. These are non-generic but high level, for example “the ability to provide removable data storage at 5 times the density of then current DVD technology.” The goal of this list is to give assessment participants an idea of the technology without limiting their creativity. A knowledge-gathering phase follows that looks at the changing environment— geopolitical, economic, social, and regulatory—surrounding the technology. It includes the evaluation of three important areas: market pull, technology push, and competitive clash. A rich toolbox of methodologies is available to enable a future vision. One’s selection of the most appropriate methodology needs firm foundation for your technology impleto be based on the five ways people view the mentation planning. future: quantitative extrapolation, fitted patThe TAM approach has been adapted to terns, personal interplays, a series of events to organizations of various types, business size, be prepared to react to, and a and maturity. It helps to identify subconscious (intuitive) vision. emerging advances in technology; it …create a By selecting methodologies that provides methodologies to analyze forecast of have an affinity to each of these the importance, implications, and views, the quality of the assessthe potential timing of these advances; and it ment will be improved. Also helps match these advances with the markets… different managers view the mission, objectives, and capabilities future in each of these ways, thus of the organization and determines making your findings more likely be accepted the actions to ensure that competitive advanby management. tage is achieved. The societal, market, competitive, and technology findings are used to create a fore- Bill Kleinebecker is senior consultant at Technology Futures, Inc., a technology managecast of the potential markets for the technolment, forecasting, and planning consultancy ogy. This forecast, along with the supporting headquartered in Austin. Kleinebecker is a evidence from the assessment, is used to crelongtime Council volunteer. He can be reached ate a Technology Advantage Opportunity document. In companies that deal in multiple at [email protected]. technologies, several such documents may be prepared simultaneously. At this point, you have defined and captured in a document the overall opportunity for your organization. This documentation can be referred to in later steps and used as the basis for modification when newer knowledge is acquired. You are now ready for strategic planning. Using the documentation from the previous steps, you look at your organization’s ability to address the opportunity. This includes your vision/goals/mission; your capabilities; and your current focus in R&D, finance, and marketing. From this activity comes the Technology Advantage Strategy that documents the strategy that will best serve your organization. This will provide a from nearly 400 companies in the Council database are expected to carry the member cards and use them to register at the meetings. The cards will also simplify and speed up the registration process for Council members at events. The cards also offer the opportunity for members to get discounts on products and services in the future. In designing and implementing the member cards, we had to obtain and test laptop-compatible barcode scanners; insert Council and sponsor logos; print barcodes using merged data; and finally have the cards laminated. The pilot implementation is now underway. Once the pilot program is completed, the Council plans to implement sturdier ID cards with affixed barcodes in lieu of the laminated cards. Barcoding is a rugged technology that is cheap, yet incredibly effective. Examples of barcoding applications are ubiquitous. UPS and Fedex could not conduct their operations without barcoded package tracking, and the airline industry could not track passenger baggage without barcoding. While materials handling is a natural application for barcoding, ology ssment Austin Software Council Special Supplement barcodes can also be used for employee administration and network security as well as document management. The biggest advantage of barcodes are that practically every program on any OS is barcode-compatible, since there are no special drivers needed to integrate barcodes into software. This is a technology that can provide a very real return on investment and holds significant promise for software and hardware companies. Raj Sundra can be reached at [email protected]. S•3 The Leader SOAP—A Viable Option? Kannan Kaliyur, President and CEO, ConnectTel SOAP, one of the hottest new technologies, has been gaining a lot of momentum in the web software development community. Let’s take a look at what it is and how it can help you. What is SOAP? SOAP—Simple Object Access Protocol—is an open standard that allows applications over different platforms to share data. Its goal is to provide a seamless, webenabled integration of services across traditional hardware and software barriers. What’s so great about SOAP? Briefly, l Simplicity l Flexibility l Compatibility with existing infrastructure l Extensibility The biggest advantages of SOAP, which is completely platform-independent, are its simplicity and extensibility. SOAP can theoretically be used in combination with different protocols. Let’s take an example of SOAP used with HTTP. Currently, HyperText Transfer Protocol (HTTP) is the most prevalent application protocol. Firewalls block most non-HTTP requests, which has caused enormous problems for executing remote procedures. Yet, HTTP is limited in its ability to handle complex processing needs. SOAP, on the other hand, is built on top of HTTP and addresses some of the protocol’s limitations. By adding a set of HTTP headers and an XML payload to allow for complex communication needs, SOAP uses HTTP for transport and XML for data encoding. This allows SOAP to work with the current existing Internet infrastructure. Firewalls and proxy servers that have been a limiting factor for a lot of technologies do not affect SOAP. The simplicity of SOAP coupled with its interoperability is itself a tremendous advantage. Because SOAP-compliant applications running on different platforms can communicate with each other, very powerful systems can be developed. Imagine that a point-ofsale system written in Visual Basic and running on a Windows NT platform can talk to SOAP-compliant UNIX boxes or mainframes for credit card validations. The ease with which this can be done can actually save months of development time. Similarly, code running on Linux platforms can make calls to services on NT boxes, and so on. How will SOAP help? SOAP allows for the easy interaction among different systems irrespective of the hardware and software platforms. Since it can potentially be built in conjunction with dif- ferent protocols, SOAP does not require any changes in the communication mechanism. The other alternatives to SOAP, such as DCOM, are more complex and closed in their implementation. They are more difficult to implement, and the resource demands are significantly higher. Where can you use SOAP? SOAP can be used for both specialized and generic applications. It is especially useful for systems requiring interaction with several external third-party tools and services. ConnectTel, Inc. and Technopoint International have jointly developed a SOAP toolkit geared towards embedded systems. This toolkit allows embedded devices to have a seamless web-enabled interface. More details needed? For an evaluation of your system to make it SOAP-compliant, contact us at [email protected]. Kannan Kaliyur is president, CEO, and co-founder of ConnectTel, an outsourcing partner to companies such as Wayne Dresser, Sears, Motorola, and EMC Automation. He can be reached at [email protected] or 512-338-1111. Technology Assessment S•4 Special Supplement Austin Software Council The Leader March Meeting Summary Final Jeopardy—Are You Betting Your Business on Your Sales Force? Howard Nirken, Jenkens & Gilchrist, PC Sell, Sell, Sell—such was the topic of the March meeting of the Austin Software Council. The panel featured Randy Watson, Vice President of Corporate Development for Confiniti; Joyce Scott, Senior Sales Representative for Vitessa; Marc Lurie, Chief Executive Officer of @hand; Steve Basile, Director of Sales and Marketing for Works.com; and Mike Phelan and Wendy Choate of Deloitte & Touche. Phelan, the panel’s moderator, asked the audience to consider recent changes in the software sales industry: l The transition from a product-oriented sales force model to a solutionsoriented system l The rapid emergence of strategic alliances and partnerships and their profound and unanticipated effects on a company’s sales force l Changes in recruiting tactics given that some companies are now cash poor and stock options are no longer incentives l The failure of CRM technology to “wrap around a company’s old processes for doing business” To address the question of how you sell a solution when all you really have is a product, Choate reminded that it is important to know your own skill set and not be everything to everybody. You should help the client understand what the solution is and how your product can help and then think about what strategic alliance you can make with other companies to help your client reach a solution. Lurie echoed these comments by noting @hand’s success at providing a quality product to its customers and then aligning the customer with one of its bigger name strategic partners. Lurie stressed the importance of having a big name company, such as an IBM, as a partner, because it not only gives you credibility, it also allows you to find the total solution in the most cost-effective manner. Scott stated that the notion of “coopitition”—don’t provide the entire solution to a client, use your competitors to help—was started by the founder of IBM, T. J. Watson, Sr. She instructed the audience to use what she called the “logical selling process”— understand the customer’s business and understand what they need to keep their job, do their job, and advance in their company. Gain this knowledge by talking to them and not at them, and win their trust with honesty and integrity. Watson wholeheartedly agreed, adding that “until you have a sales force focused on the buyer side of a transaction, it is really hard to do solution-selling.” Basile cited the three reasons why people buy in the software industry: “it saves them time, it saves them money, and eventually it will make them more money.” The next question concerned the best way a company could leverage a sales person’s skill set. Scott emphasized the importance of allowing a junior sales person the opportunity to mirror or shadow a more senior sales employee. She stated that practice runs and “ruthless role plays” in front of the entire sales team were instrumental in gaining confidence to do a sales pitch. She further noted that junior sales representatives gain a lot by not only watching a practice pitch by a senior sales rep, but understanding that even the more senior people get nervous and that making a mistake in a presentation is not uncommon. Being able to accept criticism, being “totally egoless” is the make-up of a good sales person. Basile reiterated the success of the “ruthless role play.” Such forums have allowed his The panel: Randy Watson, Vice President of Corporate Development for Cofiniti; Joyce Scott, Senior Sales Representative for Vitessa; Marc Lurie, Chief Executive Officer of @hand; Steve Basile, Director of Sales and Marketing for Works.com; and Mike Phelan and Wendy Choate of Deloitte & Touche 14 Ron Miller, Business Development Manager, ASC company to figure out which sales people are going to “cut it” because they have the requisite leadership skills and which lack the foundational skills to succeed. As restated by Choate, it allows the company to assess whether the employee is “the right fit” for the job. Finally, Scott concluded that in leveraging a sales person’s skill set, the company itself needs to ensure that it has provided an environment for the sales representative to succeed. As a threshold, she noted the importance of having all employees of the company—from the receptionist to the account manager—understand the process of making the sale and the presentation necessary to accomplish that task. An audience member asked why the vice president of sales is targeted when sales are down, not the vice president of marketing. Watson answered that sales and marketing have to work as a unit. With a strategic sales process, sales becomes the responsibility of the company and not just one individual. Throughout the company, everyone must understand what the company is selling, why the company solves a particular problem for its potential customers, and how you market what the company is selling to the customer who needs it. In identifying where a problem lies, Basile advised asking whether the message about what the company is selling is clear. Marketing is the unit that enables the sales team to sell. As Lurie observed, if the message is clear and sales are down, the CEO can quickly figure out where the problem lies. The final question from the audience focused on how to provide incentives if you are a cash poor company in today’s market. Scott suggested that while cash is king, there are plenty of incentives to offer young and talented sales people. One is the opportunity to learn and be challenged. Basile agreed that a company’s environment and the manner in which it treats its employees can also substitute for cash. Companies should not underestimate how little things, like providing snacks in the break rooms, go a long way. Finally, Phelan ended the meeting by cautioning that when providing non-cash incentives, it is always important to consult with counsel to ensure compliance with rules and regulations governing employee compensation. Howard Nirken, is a corporate/securities lawyer with an emphasis on representing emerging high growth companies in M&A transactions, venture capital transactions, software licensing agreements, and other Internet and e-commerce issues at Jenkens & Gilchrist, PC. He can be reached at [email protected]. 2Q01 April Meeting Summary E-Care—The Convergence of Software, Internet Services and Call Centers John A. Menchaca, Jenkens & Gilchrist, PC The Council’s April meeting was a panel discussion among leading e-care specialists on leveraging technology and e-business solutions for Internet-based clients. In a departure from the usual monthly meeting, it was held at IBM’s north Austin facility. The meeting kicked off with a presentation to IBM for its years of service to the Austin Software Council and the Austin technology community. The panelists—Anna Clepper, Motive Labs, VPMarketing; Mike Betzer, Ineto, President; Tim Kalbas, Trilogy, Business Development Manager; and John Wolpert, IBM Extreme Blue Team, Senior Manager—explained their respective businesses and e-care solutions. Motive builds “customer care” into the service, which allows for a proactive relationship with customers. The company provides “a hightouch [solution] that leverages the Internet.” Ineto, on the other hand, bundles hardware and software. The Ineto solution is middleware that sits above email, etc., to provide a world class customer service platform for its clients. Because multiple channels touch the customers, it is necessary to provide this solution to mid-market companies using the web. Ineto has built an e-care service solution through a data center, allowing Ineto’s customers, without expensive hardware or software, to select a channel and use the service through the infrastructure Ineto provides. Trilogy’s mission is to solve very difficult problems for Fortune 500 companies. It captures data at the various touch points and allows its clients to conduct transactions by averaging this data. The Trilogy solution puts the right product and service data in the hands of the client to touch its customers. Lastly, Wolpert described his “Extreme Blue” section of IBM as an incubator lab (which is one of three within IBM) that focuses talent and product to provide e-care solutions for customers. Said Wolpert, “It takes a rethinking of how we get to market with the new technologies that are currently in development and the merging of various technologies to provide a single e-care solution.” Moderator Farouk Hadeed, from the “Alphaworks” division of IBM in California, asked the panelists how e-care solutions apply to companies. Hadeed cited that in the past 18 months the application service provider (ASP) model, particularly in the customer relationship management (CRM) space, has generated a lot of interest. Based on this interest, how has this ASP delivery model changed or modified the delivery mechanism for technology? Betzer noted that the model has not changed much. In fact, migration to ASP on the Internet has been slow. Siebel, the foremost CRM software provider, is a large implementation that can be, at times, difficult to manage. A significant change will be necessary to migrate to such a model. Said Betzer, we are “5% in to the way of fixing it.” The ASP delivery mechanism must be much more than a hosting software in a data center, and e-care solutions must be very broad, encompassing email, messaging, voice, and other forms of data in various media. According to Clepper, until ASPs offer a full spectrum solution, the company needs contracts with two or three ASPs with data integrity issues that naturally flow from such a relationship. We still have a ways to go in pulling these disparate technologies together for one integrated solution. Hadeed next asked about the “ultimate” e-care solution—using a broad roadmap. As an initial answer, Betzer observed that we are not very far in the evolution of e-care solutions. According to Betzer, “e-care is all about communication.” This includes phone, email, etc. Most companies are not answering emails within five days or using chat because it is so labor-intensive. He believes it will probably be about three years before we have significant progress in this area. Clepper seconded this opinion. Every customer might want to switch among the various methods of e-care such as wireless, home PCs, email, etc., and it will take time for this solution to respond to the different delivery solutions. Every e-care solution provider must be proactive to build the functionality to help the customer. Additionally, it is necessary to know the drivers for each of these customers. Kalbas cited an example with Lands End, which has various divisions within its corporate structure, including a catalog division, a corporate sales division, online company sales, and others. In this environment, customer data are developed among these various divisions at different times and in different formats, Continued on page 19 Mike Betzer, Ineto Anna Clepper, Motive Labs Farouk Hadeed, Alphaworks (moderator) 15 The Leader May Meeting Summary Funding Sources Howard Nirken, Jenkens & Gilchrist, PC The May meeting of the Austin Software Council highlighted a challenging issue for numerous companies in 2001—raising capital. The panel, moderated by Chad Huston of Thompson & Knight, P.C., featured John Thompson, Director of Marketing for Dell Ventures; Mickie Wright, Director of Corporate Development for Compaq Computer Corporation; Richard Sorenson, Chairman of Point One Telecommunications, Inc.; and Jay Shreiner of Tmanage. They were asked for their unique perspectives on what companies should look for in a corporate investor and what a corporate investor looks for in a company. Representing the company’s perspective, Sorenson commented that a company should look for a corporate partner that it can “work exceedingly well with.” In addition, that corporate investor should also be one that validates a company’s business model, thus increasing its credibility, as well as one that provides a potential exit strategy. Shreiner similarly noted that assessing the strategic relationship of a corporate investor cannot be overstated. Looking for the corporate investor that fits within a company’s business model provides the opportunity for not only a great investor relationship, but also numerous customer relationships, including the actual corporate investor. From the investor’s side, Thompson offered three reasons why corporations enter into venture finance: 1) strategic desire or need, 2) financial return, and 3) commercial opportunity. For Dell, strategic desire is generally what brings Dell Ventures to the table to invest. In fact, important factors in a Dell Venture investment are 1) the potential of the asked how corporate investors view the valuation process of a start-up and whether they technology, 2) its ability to make money, and simply piggy-back off a venture capitalist’s val3) the value it brings to a Dell customer. uation of a company. Thompson responded Dell Ventures, like other corporate investors, that Dell Ventures does not always piggy-back tends to be sector-focused. He noted that off a valuation; he cautioned entrepreneurs in Dell Ventures is currently concentrating its the audience to seriously consider valuation in investments in service and storage and wiregoing forward with their companies. He less communication. noted that Dell Ventures has passed on a Compaq takes a different approach in its number of good companies because their curinvestment strategy. Compaq does not have a rent valuations were out of sync with reality or “fund”; instead, it uses its corporate development group to look for potential investments. their previous valuations in earlier rounds have made the transaction too difficult to structure. As such, Compaq looks for companies with The second question dealt with the products and/or solutions that it may want to degree of control corporate investors seek use or sell. If a company has such a product or solution, the corporate development group when investing in companies. Sorenson quickly pointed out that a puts the company in front of the business unit that “fits” the [assess] the strategic company must keep in mind that when it takes money particular product. The business relationship of a from a corporate investor, it unit then recommends whether usually precludes itself from or not an investment is advanta- corporate investor other potential players in the geous to Compaq. Currently, market. He noted that although difficult, disCompaq is focused on streaming media, concussing the accompanying restrictions with a tent delivery, wireless privacy, enterprise secucorporate investment should be a priority. rity, and enterprise software integration. Wright agreed, acknowledging that some Moreover, because of Compaq’s recent restrictions generally accompany a Compaq involvement with the human genome investment. Thompson noted, however, that project, Compaq has increased its attention while there might be restrictions, corporate to bio-technology. investors do want their portfolio companies The first question from the audience Above: Jay Shreiner, Tmanage, Richard Sorenson, Point One Telecommunications, Inc., and Chad Huston of Thompson & Knight (moderator) Mickie Wright, Compaq Computer Corp. with Robin Curle, CEO Partnerships 16 2Q01 to succeed; therefore, the restrictions are generally reasonable. The third question sought advice on how to deal with managing a situation in which the business unit for which a corporate investor made an investment later fails. Thompson underscored the importance of communicating each party’s respective goals and expectations before the investment to minimize misunderstandings and surprises if such an event occurs. Compaq, for example, has begun structuring milestones into their investments. Such milestones are not only geared to the company’s production, but some trigger obligations by Compaq. Wright observed that the milestones have been a successful way of keeping both parties engaged and focused on productivity. The final question asked how a company should go about determining due diligence of a corporate investor. Besides collecting references from people inside the corporate investor or from people who work for companies that have received an investment from the investor, Shreiner suggested that a company discuss internally why they actually want that particular investor; that is, find out about the corporate investor’s culture and map out how that investor can help be a “value add” to one’s own company. Howard Nirken, is a corporate/securities lawyer with an emphasis on representing emerging high growth companies in M&A transactions, venture capital transactions, software licensing agreements, and other Internet and e-commerce issues at Jenkens & Gilchrist, PC. He can be reached at [email protected]. Richard Sorenson, Point One Telecommunications, Inc., John Thompson, Dell Ventures, and Mickie Wright, Compaq Computer Corp. “ . . . providing places that work.” –New & Used Office Furniture –Moving & Reconfiguration Services –Specs Planning & Design Services –Storage & Inventory Management –Rental & Leasing Solutions –Fabric Cleaning & Protection Services 512.442.0703 211 E. Riverside Drive Austin, TX 78704 “Customer Satisfaction is Our Daily Commitment” 17 The Leader Why Implement a B-to-B e-Loyalty Program? Ellen Reid Smith, Reid Smith & Associates more real life experience. Your website can act like a human or even be a human through email or instant messaging. The fact is, sales reps aren’t as interactive as you might think. They normally spend little time with customers, relying instead on sales “leave 1. The web is always OPEN! The web behinds.” And while sales reps can’t be offers a virtual sales and training room 24 knowledgeable on all aspects of a product, hours a day. Without physical limitations, it the web can. can be much more accessible than sales reps 5. Brand advertising doesn’t build or your company conferences. And customers relationships. Branding is about awareness, can train on their own time, even at home but loyalty goes much deeper, forging an (a trend that’s increasing). emotional bond to your product that will 2. An e-loyalty program offers training in multiple formats. Customers’ product stand the test of time, price, and competition. Branding can be accomplished by advertising, or industry knowledge and preferred learning but loyalty is a two-way street and styles differ dramatically. requires a relationship of interacBut an e-loyalty program Loyalty…requires… tion, trust, and mutual respect. can take the guesswork interaction, trust, 6. More bang for your buck. out of choosing a style that best persuades or and mutual respect. At any given time, a company probably has multiple promotions trains customers by letting hosted by multiple product divithem navigate to their presions, customer support centers, and sales ferred format. For a more targeted sales message, positioning a product can be tailored by teams. A loyalty program centralizes all cusindustry or product use. While your best sales tomer communications into “one voice” that remembers and recognizes their needs. This staff won’t choose the right approach with means that only promotions that directly meet your customers 100% of the time, a good a customer’s needs are sent and where multiple e-loyalty program may. promotions, benefits, or rewards are appropri3. The web allows better feedback. ate, they are combined into one concise mesTypically if it doesn’t help their commissions, sage that is more effectively communicated. sales people will not put customer feedback 7. High value customers are targeted. on the top of their to-do list. An e-loyalty program, however, provides realtime feedback An e-loyalty program helps you identify each through web logs, tracking software, and cus- customer’s value by giving customers a reason to be profiled and tracked. This allows tomer feedback prompts. This can help you identify problems faster as well as better com- you to treat best customers better as well as identify potentially high value customers and pare feedback across industries. provide them with incentives that increase 4. An e-loyalty program can be more their spending. Not only will you reward cusinteractive than a sales rep. Because the web is interactive, it can more closely mimic a tomers based on value, your thank-you’s will be more effective. human relationship through intelligent, twoway dialogs. Customers can conduct research rather than wait for the product rep’s return call and or use creative product demos for a e-loyalty programs can build relationships easily and cost effectively. Following are nine reasons to implement a B-to-B e-loyalty program: 8. The web saves money. Web relationships can be started and maintained at a fraction of the cost of offline relationships. This doesn’t mean companies will never use sales reps, the phone, or postal system again, but it means they can use the web to start relationships and reserve more expensive offline tactics for only high value customers where the payback is more sure. 9. If you don’t do it, your competition will. The web makes building and maintaining relationships affordable, even for your smallest competitor. In fact, they might even be better at building relationships online because they are closer to the customers they serve. NOT building an e-loyalty program won’t be an option much longer for profitable companies. Ellen Reid Smith is CEO of Reid Smith & Associates, a consulting firm specializing in loyalty marketing strategies. She can be reached at 512-342-1768 or via email at [email protected]. Austin Software Council The Leader Ad Rates B&W 2-Color Member Non- Member NonMember Member Size Fullpage Half Page Quarter Page Business Card 375 225 150 75 Single Sheet Insert 750 450 300 150 510 310 205 na 1,020 620 400 na 1125 2250 10% discount on one year in advance For further information please contact Catherine Bartlett at 512-305-0010 or [email protected] 18 2Q01 April Meeting Summary: E-Care Continued from page 15 presenting Trilogy with a unique set of problems to solve. Panelists also were asked about the utopia for e-care solutions. According to Kalbas, every customer touch point will share the same data in a utopian e-care solution. Betzer responded that you have to “know thy customer,” a common theme throughout the discussion. Wolpert explained that the solution must empower individuals within the corporate structure to solve these customer issues and to integrate all the solutions. Clepper concluded that the e-care customer solution must encompass the concept of a five-star hotel— you don’t necessarily see the service providers, but you feel them. In other words, you must empower the customer to provide a solution for all of the customer’s problems. In this market, the panelists noted that most technology purchases of this magnitude require CFO approval. The e-care solution, therefore, must be tied to “value” and a resulting return on investment for the current fiscal year (not many years down the line). S A F E G U A R D Y O U R S O F T WA R E INVESTMENTS WITH THE LEADER I N I N T E L L E C T U A L P R O P E RT Y P R O T E C T I O N S E RV I C E S . John A. Menchaca is a corporate/technology lawyer with an emphasis on representing emerging high growth companies in venture capital transactions, M&A transactions, software licensing agreements, and other Internet and e-commerce issues at Jenkens & Gilchrist, PC. He can be reached at 512-404-3587 or [email protected]. Discover why two-thirds of the Fortune 500 have turned to DSI as their trusted third party for software escrow and intellectual Services Offered Include: Source Code Escrow Technical Verification Domain Name Transfers Trade Secret Protection SEC Compliance property protection services. And DSI’s recent acquisitions of Fort Knox Escrow Services and SourceFile will further enhance our ability to serve you. A t l a n t a B o s to n C h ic a g o D a lla s London Lo s A n g e l e s S a n D ie g o S a n F r a n cis c o Toronto 800.875.5669 www.d siescrow.com 19 The Leader It’s Hard (and Dangerous) to Say Goodbye... Continued from page 1 next regularly scheduled payday if voluntary). Deductions may not be taken from employee paychecks without written authorization by the employee or where required or authorized by law. Overtime, minimum wage, and commission payments are also regulated by both state and federal law. Paying employees according to specific legal requirements is a basic, but critical step that is often overlooked at the end of an employment relationship. Take the time to regularly review your payroll procedures. 3. Know the difference between a reduction in force and a performance-related termination. Companies often attempt to disguise a termination of an employee who is not performing to company standards as a “lay off” or a “reduction in force.” Although this euphemism may be applied out of sensitivity to the employee, it is not advisable to mischaracterize terminations. True reductions in force typically eliminate positions or departments, not individuals. If an individual is “laid off” and his former position is subsequently refilled, he will likely be able to prove that the employer’s stated reason for the termination was false, a crucial part of an employment plaintiff’s case. If an employee has performance problems and termination is inevitable, the company may employ softening strategies such as offering the opportunity to resign instead. Hiding behind the all-too-common layoff label will only cause greater problems for the company. 4. Review benefits issues and employment agreement obligations. Before any termination decision (group or individual) is communicated to employees, the company should review any applicable benefits and stock issues. Make sure that insurance benefit continuance (COBRA) forms are prepared and provided on time and that no other retirement or other benefit issues lurk in the background. Additionally, terminating an employee shortly before her stock options vest can be problematic. If unfortunate timing is unavoidable, make sure that the company’s actions are justifiable and will appear so to an outsider. Employment juries often base their decisions on a perception of fairness. If a company appears to be acting in bad faith, the jury will go out of its way to find liability and/or award punitive damages. 20 Before any employee termination meeting, company executives should review the status and enforceability of any employment agreement by which the employee will be bound after the end of the employment relationship. Determine how the employee will be reminded of continuing obligations. Consider providing a copy of any pertinent confidentiality, non-disclosure, non-solicitation, or other agreement to the employee at or near the time of termination. 5. Handle terminations with sensitivity. Employment lawsuits may be triggered by a terminated employee’s desire to punish a former employer. A sensitive approach to terminations will help diffuse some of the inevitable emotions involved in losing one’s job and reduce anger-based lawsuits. Conduct termination conferences behind closed doors, remain calm, provide clear and concise reasons for the termination decision, and use good judgment. Decide how to handle references in advance. Your company may have policies governing the provision of information to a former employee’s potential employers. Review these policies and practices before any termination conference and determine how you will respond to an employee’s request for a reference. Particularly where the termination decision was performance-based, an employee should be informed that the company has a neutral reference policy (if this is the case) and will provide only certain information in response to inquiries from potential employers. 6. Give a little, get a release. The best insurance against post-termination employment lawsuits is an enforceable release of all claims. Consider offering the terminated employee(s) additional consideration beyond what the employee would be entitled to receive according to contract or policy in exchange for a release of all claims against the company. Keep in mind that claims relating to the administration of retirement plans may not be waived and that federal law mandates certain release elements and waiting periods when the individual is age 40 or above, and/or where the consideration is being offered as part of a “group” termination (i.e., a reduction in force). 7. Think twice before contesting unemployment claims. Terminated employees are more likely to file lawsuits if they have been denied unemployment benefits by the Texas Workforce Commission (TWC) or if they perceive their former employer is attempting to prevent them from receiving benefits to which they believe they are entitled. While you may be legally justified in resisting a particular unemployment claim, consider the specific circumstances of each situation. Providing honest answers to the TWC’s inquiries is a must, but how hard your company fights to deny benefits is a matter of degree and discretion. 8. Pay attention to current/remaining employee concerns. Former employees are not the only individuals who bring employment lawsuits against companies. For example, a current employee whose sexual harassment complaint is not investigated could have a cause of action against the company. Employees who are not being paid overtime to which they are entitled may also bring a claim before the Department of Labor or file a lawsuit. An employee who resigns as a result of egregious actions by the employer may be able to bring a variety of claims based on the concept of “constructive discharge.” Regular employment practice audits will help ensure compliance and will reduce the likelihood of such lawsuits. Laura Merritt is an attorney in the Austin office of Bracewell & Patterson, LLP, where she provides labor & employment law representation, counseling, and training exclusively to employers. Merritt is board-certified in Labor and Employment Law by the Texas Board of Legal Specialization. She can be reached at [email protected]. 2Q01 New and Renewing Corporate Members The Austin Software Council welcomes new corporate members (in boldface) and thanks those who have renewed their membership during January 15 to April 14, 2001. 212 Studios GKMB Investments PricewaterhouseCoopers LLP 2ndWave Inc. Gray Cary Ware & Freidenrich Primus Associates L.C. 2Uplift Inc. Growth Partners Inc. Purple Mountain Software Advent Networks Inc. Haynes & Boone LLP Q-Media Services AFK Strategies Inc. Hoak Breedlove Wesneski & Company Quidditas Alliant IT-Group ALPNET Inc. Andersen Austin Community College Austin PMPro Inc. Austin Usability Inc. B2G Source Inc. Baker Botts LLP BigLever Software Inc. Blanc & Otus Bracewell & Patterson LLP Catapult Systems Corporation Commercial Texas LLC Commtouch Inc. Corporate Technology Communications David Powell Inc. Dazel An HP Software Company Diginis Internet Solutions Docent Inc. EG & G Technical Services Elibrium Software Embrace Software EPSM LLC EriQa Labs ExpertEyes Inc. FG Squared Flanders Foreign Investment Office Fort Knox Escrow Services Inc. G51 Capital Management LLC Imperial Bank Inflow Inc. Interactive Clarity Jenkens & Gilchrist P.C. JumpStart Revenue Kaemark Inc. Knowledge Beam Inc. Liaison Technology Inc. Lynx Consulting Mahindra Consulting Inc. Market Reach International Inc. MasterWord Services Inc. MaterialNetwork Maxwell Locke & Ritter LLP McKinsey & Company Inc. Merinta Inc. Miller and Demyan Bruetsch LLC Namestormers NeTraverse NetSpend Corporation Neurosurgery Associates of Austin OfficeDomain Inc. One Realm Inc. Oridian Inc. Partnerware Inc. PDS Technical Services Reactivity Reciprocal Software Reid Smith & Associates Scrutable Systems Inc. SDL International Shapiro Consulting Group Inc. SiberLink Inc. Sigma Information Group Inc. Soaring Eagle Solutions Socket Public Relations SRM Systems Software Storage Networks Storage Provider Technology Futures Inc. Techxas Ventures The Adea Group The Barcode Exchange The Business Advantage The Kernel Group TiPS Inc. Tokyo Electron America Inc. Vapor Werks Inc. VCON Inc. Vibrant Internet Solutions Inc. VTEL Corporation WCM Solutions Inc. PlanView Inc. Woodruff-Sawyer & Company California PR 21 Zero Wait-State 21 Jump.netCUad222.QXP 3/5/01 2:33 PM D S L Page 1 | C o l o c a t i o n | W e b h o s t i n g n early America, wooden stocks were commonly used for public punishment. The victim would be placed in an immobilizing device and subjected to public ridicule. We at Jump.Net have noticed many ISPs use a similar technique, producing the same effect on your company. When your internet service goes down your company is Get T1 speeds with Jump.Net's HDSL! Installation is guaranteed within 10 full business days* or your 1st month is free. immobilized, and thus subject to public ridicule... but on a worldwide basis. Prices start at $299.95 per month. Call today to begin your countdown to bandwidth satisfaction! Proud host of the Austin Software Council's Website. 877-JUMP.NET *some restrictions may apply. Make the right connections for your software needs ConnectTel’s software engineers have extensive and diverse experience in significant technology development, including: ■ Java, C/C++, Delphi ■ Windows NT, Windows 95/98 ■ Embedded systems ■ Retail point-of-sale systems ■ Device drivers ■ Distributed computing For detailed information on our products and services, please visit www.connecttel.com or call ConnectTel 512-338-1111. For sales inquiries and company information, please send an email to [email protected] ConnectTel S O F T WA R E DEVELOPMENT www.connecttel.com Upcoming Events The Leader Editor Laurie Modrey August “Fun Night” Monthly Meeting Director of Publications Emily Sopensky [email protected] Casino Night Exit Strategies Funding In 2001, Part 2 Contributing Writers Jamie King Belinne W. Stephen Benesh Charles Cole Craig Eissler Patrick Flanagan Kannan Kaliyur Bill Kleinebecker John A. Menchaca Deirdre Mendez Laura Merritt Howard Nirken Ellen Reid Smith Emily Sopensky Raj Sundra John Symington Paul Toprac Publisher The Austin Software Council Partnering Conference For more information contact 3925 West Braker Lane, Suite 400 Austin, Texas 78759 Tel: 512-305-0023 Fax: 512-305-0220 www.austinsoftwarecouncil.org Please check our website www.austinsoftwarecouncil.org periodically for current information. Newsletter Design Copy Craft Printers, Inc. Feedback: email [email protected] PRESORTED STANDARD U.S. POSTAGE PAID AUSTIN, TX PERMIT NO. 964 3925 West Braker Lane, Suite 400 Austin, Texas 78759-5321