Email a colleague    

June 2012

High Touch Networking meets High Tech Partnering:  How to Leverage a Software User Conference

High Touch Networking meets High Tech Partnering:  How to Leverage a Software User Conference

“High-tech/high-touch.  This principle symbolizes the need for balance between our physical and spiritual realities.”

John Naisbitt, MegaTrends,1982


Our LinkedIn world provides many “high-tech” ways of exchanging ideas and gathering industry knowledge.  But 28 years before Facebook, futurist John Naisbitt brilliantly anticipated that more virtual interaction would need to be offset by greater “high-touch” personal contact.

It’s no surprise then that private user conferences sponsored by software firms have become a great way to put a handshake to a Google+ profile.

I just returned from two well-organized user conferences.  One was a U.S. event put on by Razorsight in Washington DC and the second was a global conference sponsored by WeDo Technologies and held in Portugal.  So with the lessons of these events fresh in mind, here are some tips on how users and software vendors can best leverage these events.

A Marketing & Branding Opportunity for the Software Vendor

Because a user conference is highly targeted at customers and prospects, it’s one of the most cost effective and personal ways for a software vendor to spread positive industry buzz and pave the way for sales.  It also becomes a great way to please the vendor’s consulting and other partners who present in sessions at the event.

WeDo pulled out all stops.  The venue in Portugal was a 5-star beach-side hotel surrounded by a golf course.  Users who hailed from operators in 40 countries paid for their own air fare, but WeDo picked up all costs once they arrived in Portugal.  WeDo even had a branded welcoming booth in the Lisbon airport to greet users and get them on vans for the one-hour ride to the hotel.

Razorsight spent much less money, but still pulled off a good conference.  Of particular note was its skill in including partners such as IBM and GCS in the event.

A Chance to See the Software Supplier Up-Close

If you’re planning to buy new RA or fraud management software solution, attending a user group meeting is a great way to see your potential software supplier in action.  And if you’re negotiating a new purchase from the firm, they can hardly refuse your request to attend.

For the prospective customer, the beauty of an event like this is that you can informally meet customers and discuss the pros and cons of working with the supplier.

And customer loyalty being the way it is in our industry, even current customers need to be periodically reassured that their software supplier is financially stable, has a good product roadmap, and continues to  attract quality customers.  The user event is an excellent way to evaluate these virtues.

For the software vendor, of course, the risks are high.  It’s akin to getting a full body scan from airport security.  The software vendor opens itself up to either criticism or praise depending on how well it organized the event and satisfied user needs.

I would have loved to have been the printing shop that supported the WeDo conference.  WeDo’s branded banners, signage, postcards and welcome bags were displayed everywhere around the hotel and it was tastefully done.  With all the orange and black colors you would have thought a Halloween party was going on.

OK, so why is handling these details so important?  Because they point to a software vendor’s ability to execute.  Did they anticipate my needs at the conference?  If they made a mistake, did they recover quickly?  All of these are indicators of the kind of service you are likely to get as a customer.

Keeping the Sales Hounds at Bay

For the software vendor, it’s always tempting to get the salespeople actively involved at user events.  But if salespeople play too active a role, the user event will suffer.  Five years ago a software user event I attended turned into a circus because two-thirds of the people attending were the vendor’s salespeople and partners.  The vendor also played loud music during coffee breaks and cocktail hours — a great way to muzzle user-to-user conversations.

Spending too much time soliciting user feedback or discussing company roadmaps is another downer for most users.  Feedback is better handled via a well-designed survey instrument after the event.

Wrapping some Fun Around the Event

Telecom software can be a pretty mundane subject.  That’s why it’s important to get people smiling and laughing early and often.  On the first day, Razorsight accomplished this by planting a few hundred dollar bills and asked people to stand up and see if there happened to be any Benjamin Franklins under their chairs.  In the evening, it hosted a popular “casino night” cruise on the Potomac River.

WeDo hired TMForum’s Tony Poulos to act as its master of ceremonies.  Tony was the perfect choice because he’s a great stand-up entertainer and industry expert in one package.  An ability to fill both roles came in handy during a panel discussion where Tony served as both moderator and active participant.

Pre- and Post-Event Promotions and PR

Before the event takes place, it’s wise for the software vendor to court its users much like a lover sends his beloved flowers and chocolates.  Remember: a  good 80% of the people invited will not actually attend, yet with good upfront promotion, the brand is enhanced for these people at a fraction of the cost it would require to have them actually attend.

If the event costs $100,000 to pull off, spending $5,000 in pre-event promotion is well worth the investment.  And this can come in the form of formal invitations, postcards, event calendars, brochures, even surveys.

WeDo had its event covered with a crew of video pros and photographers.  These guys not only recorded the sessions but filmed users as they attended informal events such as the tour of the local medieval castle and town.

The effect of having photographers gave the happy illusion that we were all getting awards at Cannes.  Likewise, the spotlight glitter and cameras made the customers who gave presentations look like industry stars.  Another key benefit for the vendor sponsor, of course, is the ability to use videos as sales props after the event.

The Professional Conference Program at the Event

Vendors have different goals when it comes to the conference program at these events.  Razorsight had it easier for the simple reason that almost everyone attending was from North America, a common culture and market.  The conference program was much harder for WeDo to pull off because the people attending were from all over the world and all had different English accents.

I’ve attended user conferences where the vendor only selected speakers who would say great things about the vendor’s software.  Users see through this bias pretty easily.

Often the best speakers come from outside the telecom industry.  Razorsight invited a retired Marine Corps general, a former commander of U.S. forces in the Iraq Desert Storm campaign.  The general gave an inspirational talk about leadership, whose message was subtle, powerful and relevant to anybody in the room who manages people.

Likewise, other subjects off the software management path also get good reviews at user conferences.  On the first training day, WeDo gave a talk explaining many of the fraud and security dangers that LTE networks will eventually bring to telecom.  It’s was a highly interesting session that informed many minds in the room.

In addition to the formal presentations, surveys and roundtable discussions are effective at getting people involved and promote professional learning at the same time.

Making the Best Use of Time at the Event

When I was in the U.S.  Navy, we used talk about the 6 P’s -- Prior Proper Planning Prevents Poor Performance.  The 6 P’s lesson applies equally to user conferences.  Users who want to meet other users should get a list of people likely to attend the event.  With that list you can begin to explore LinkedIn to check their bios.  At the welcome dinner, if you would like to sit near people from a certain operator, you can let the organizer know in advance.

Bring a stack of business cards, but remember that it’s not the number of cards you exchange, but the relatively few quality interactions you have.  These are the people you are most likely to share professional advice with for a long time to come.


Business assurance is a small enough niche in telecom that private user events will probably grow in the sector.  “High touch” private events are the perfect complement to “high tech” social media.  So plan for your next event wisely.

Copyright 2012 Black Swan Telecom Journal

Dan Baker

Dan Baker

Dan Baker is research director of Technology Research Institute (TRI) and editor of the on-line magazines Black Swan Telecom Journal.

Technology Research Institute (TRI) has been writing and researching telecom software and systems markets since 1994.  Its industry reports have covered the gamut of telecom systems from billing and service assurance... to customer care and provisioning.  In recent years, TRI has authored major reports on Fraud Management, Revenue Assurance and Telecom Analytics/Big Data solutions.   Contact Dan via

Black Swan Solution Guides & Papers

cSwans of a Feather

  • High Touch Networking meets High Tech Partnering:  How to Leverage a Software User Conference by Dan Baker — Because a user conference is highly targeted at customers and prospects, it’s one of the most cost effective and personal ways for a software vendor to spread positive industry buzz and pave the way for sales.
  • Telecom Software: Should I Buy or Should I Build? by David West — Build custom systems in-house vs. buying commercial software is a critical issue for service providers.  This article make a strong case for why commercial software is best in most situations.  Discussion points include: cost tradeoffs, the illusion of in-house control, and staying current in a dynamic market like fraud assurance.

Related Articles

  • Black Swan Guide: Araxxe’s Revenue Assurance Consulting, Testing, and High Definition Billing Analysis Service by Dan Baker — How Araxxe’s end-to-end revenue assurance complements switch-to-bill RA  through telescope RA (external and partner data) and microscope RA (high-definition analysis of complex services like bundling and digital services).
  • Subex’s IDcentral Monetizes Telco & Enterprise Data to Deliver Digital ID & Risk Metric Services for Financing, KYC & More interview with Shankar Roddam — A new digital intelligence service that monetizes the idle data of telecoms and enterprises while also earning a good return for the owner of the data.
  • Opportunities & Obstacles: Consultant Luke Taylor Muses on the State of the Telecom Risk Assurance Business interview with Luke Taylor — A rambling discussion on the state of the risk assurance business with Luke Taylor, independent consultant in telecom revenue/fraud assurance and solution requirements and marketing.
  • LATRO’s Tips for Launching a Successful Revenue & Fraud Assurance Program for Mobile Money Operations in Developing Countries interview with Don Reinhart — A company building mobile money RA/FM tools and  managed services gives a concise, but detailed tutorial on how the Mobile Money Ecosystem works.  Revenue assurance pros will get tips on  what to look for in analytics/assurance tools, controls, and professional services.
  • A WeDo Conference Talk: Consulting & Analytics: Improving your Business Today, Enhancing it Tomorrow interview with Carla Cardoso & Bernado Lucas & Thomas Steagall — Leading risk management consultants explain their mission and walk-through RA, subscription fraud, and collections cases.  They also explain how analytics and machine learning can supplement process optimization.
  • PrologMobile’s Simple and Brilliant Plan to Save US MNOs Billions a Year in Recovered Phones & Retained Customers interview with Seth Heine — An expert in the mobile phone reverse supply chain explains how MNOs — via a neutral third party information exchange — can recover their original phones on the used market and save huge sums in multi-year customer retention.
  • WeDo Explores the IoT Ecosystem in Search of Tomorrow’s Pivotal Fraud & Business Assurance Solutions interview with Carlos Marques — A veteran product manager scans the IoT terrain, discusses key fraud and assurance challenges, and explains the preparatory steps WeDo is taking to become a key player in this emerging market.
  • New Report: Telecom Fraud & Business Assurance Solutions, Services & Strategies by Dan Baker & Luke Taylor & Colin Yates — TRI publishes a new market research report, Telecom Fraud & Business Assurance Solutions, Services & Strategies.  Free executive summary available.
  • Subex Juggles a Wide Variety of Business Assurance and Big Data Analytics Use Cases interview with Rohit Maheshwari — A expert in business assurance solutions explains top use cases such as: IoT security, big data analytics/AI, network asset optimization, multi-player gaming assurance, onboarding mobile subs, and AI customer analytics.
  • MTN Agility: Mastering Exponential Technologies in Revenue/Fraud Assurance and Beyond interview with Danie Maritz & Tony Sani & Luke Taylor — An in-depth look at RAFM operations and innovation at the MTN Group.  Topics discussed include RA/fraud control challenges, strategies, and MTN’s journey to exploit exponential tech (AI, robotics, and ML) in its RAFM program and support of internal non-telco businesses.
  • From Byzantine Software Contracts to Simple & Flexible RA Managed Services interview with Philippe Orsini — Is the way B2B/enterprise software is sold and delivered today progressive — or is it Byzantine in the age of cloud?  An expert lays out the case for managed services in RA and billing verification.
  • Premiere Experts Set to Speak at Summer RAG Conference in London, July 7th and 8th by Dan Baker — The Risk and Assurance Group (RAG) has announced that its 2016 summer conference will expand into a two-day event and feature many premiere experts. 
  • WeDo Hosts Revenue Assurance & Fraud Management Conference in Washington DC by Dan Baker — Black Swan is pleased to announce what looks to be a first class revenue assurance and fraud management conference being put on by WeDo Technologies, on October 1st and 2nd in beautiful Washington DC.
  • Test Call Generators: An Essential Test & Debugging Tool in Mobile Billing Assurance interview with Steffen Öftring — An “active” test call generator (TCG) can see problems that a “passive” revenue assurance system is blind to.  Here’s a discussion on the test call RA  process, over-the-air calls versus core call injection, and test call networks in global roaming RA.
  • The Revenue Assurance Game: How the Rules Change in the Era of IoT & Mobile Broadband interview with Rene Felber & Gadi Solotorevsky — Revenue assurance is perhaps the hardest of telecom functions to define because the term is used in so many different senses.  This discussion on the evolving role of revenue assurance was catalyzed by a survey of experts in the profession.
  • Day in the Life of a Revenue Assurance Analyst interview with Michael Lazarou — Revenue assurance is much more than a software category.  It’s individual analysts struggling to help their larger organizations get a handle on system errors and coordination problems.  In this interview, an analyst reveals the many challenges of getting the revenue assurance job done at a small GSM operator in Europe.
  • Revenue Assurance: History and New Beginnings in RA Maturity interview with Daniela Giacomantonio & Gadi Solotorevsky — The Roman Forum was the center of commercial life in ancient Rome.  Now, two millennia later, the Forum lives on in the exchange of ideas across countless professions and  media.  In this interview, two Revenue Assurance experts discuss both the new RA Maturity initiative of the TM Forum and the value of telco/solution vendor collaboration.
  • Migrating systems or launching LTE next year?  Don‘t forget transformation assurance & optimisation by Efrat Nissimov — System transformations and network migrations are major  revenue impacting events and they should raise a big red flag.  Why?  Because data integrity issues are bound to crop up as CSPs move vital data from a legacy system to something new.  It’s time for transformation assurance.
  • How can Cable/DSL Internet Providers Meet the Usage-Based Billing Mandate? interview with Ryan Guthrie — The popularity of YouTube, Netflix, and Hulu other video outlets has turned the tables on service profitability for cable/DSL service providers.  Many are moving to usage-based billing, but that largely unprepared for the revenue assurance aspects of this move.  This interview explains the technical challenge and points to solutions in billing, speed caps, and traffic revenue monitoring.
  • CABS Revenue Assurance: How Rural LECs can Recover $284 Million in Revenue Shortfalls interview with Kelly Cannon & Darrell Merschak — Independent rural LECs in the U.S. still rely on the AMA/EMI billing formats for CABS billing, even as that format has proven to be highly inaccurate as a source of inter-carrier records.  This interview includes an analysis and discussion of revenue recovery techniques ILECs can use by leveraging SS7 probes.  Also discussed are billing strategies, traffic dumping threats, and the possible fallout from the FCC’s bill-and-keep mandate.
  • Make Business Assurance Progress Every Day: How to Set Goals, Automate, and Energize Your Team interview with Kathleen Romano — Business assurance (BA) skills have wide applicability outside the revenue assurance and fraud mangement domains.  In this article, a telecom executive explains how she’s applying her BA skills in the Payments area.  In addition to discussing the key operational challenges in Payments, the interview also provides keen insights on setting goals in business assurance, leading a team, and making critical decisions.
  • LTE Rollout: Make it a Smashing Success with Risk Assessment, Controls, and Marketing Offer Analytics by Gadi Solotorevsky — LTE brings splendid new capabilities to mobile users.  But like 2G and 3G deployments before, operators can only make money if they successfuly plan, coordinate, deploy fast, and pay attention to pricing plans and the customer experience.  This article lays out a 3-phase tactical guide on  how revenue analytics professionals can add value in LTE service risk assessment, controls, and marketing offer analytics.
  • RA Prevention: How to Manage Revenue Risks and Communicate RA’s Value to Senior Execs by Shaul Moav — The era of revenue assurance prevention and risk assessment is here.  Several of the mature operators of the world have developed their own methodologies and tools.  Using firefighting and fire prevention as a metaphor, the article details a new commercial software approach explaining the goals, method of risk evaluation, and senior executive dashboards developed for the process.
  • Precision Clockworks: How Revenue Assurance Synchronizes with the Business at Swisscom interview with Marco Pollinger — An expert revenue assurance department is one whose work dovetails well with the lines of businesses it supports.  In this interview you’ll learn how Swisscom manages its revenue assurance function for maximum effect.  The article discusses: the operator’s innovative RA organization, the screening and RA approval of new services, its pre-production bill audits, and its coordination with corporate risk management.
  • Versatile, Portable & Corrections-Savvy: Quest for the Swiss Army Knife of Revenue Assurance Software by Mark Yelland — Revenue assurance maturity models are not cast in stone.  Since  best practices will change over time, it’s healthy to explore moving maturity models forward.  For example, great gains have been made in leakage detection, but RA corrections has been harder to master.  The author dreams about seven functions that should ideally come together in a single all-purpose revenue assurance software tool.
  • Bringing Strategic Planning & Value Engineering to Revenue Assurance interview with Maged Fawzy — Engineering and architectural techniques have a role in revenue assurance.  This interview with a top Egyptian RA consultant explains how continuous risk assessment and long range — yet flexible — RA planning can sharpen a carrier’s RA program and lead to better use of revenue assurance software and integration services.
  • Forensic Fossils: Is Your Revenue Assurance Shop Fit for Display at a Natural History Museum? interview with Jim Marsh — Without the continuous guiding light of seasoned revenue assurance leaders, even the best teams of RA professionals, technology, and business processes can fossilize and lose their vitality.
  • Revenue Assurance: The Magical Market Cap Multiplier by Van Howard & Curtis Mills — Many operators today consider revenue assurance yesterday’s opportunity.  But this article shows why significant revenue and cost leakage can still go undetected, even in companies with dedicated RA departments.  Also discussed are the benefits of a broader or more “forensic” approach to revenue assurance, an approach that boosts the bottom line regardless of the automated tools already in place.
  • From Risk to Robust: Turning the Big Picture Into a Real Agenda for Change in Telecoms by Eric Priezkalns — Inspired by a Financial Times article written by Nassim Taleb, author of “The Black Swan”, here is an insightful and entertaining primer on telecom risk management.  The article takes ten risk management lessons from Taleb and applies them specifically to the communications industry.  You’ll learn about the value of small scale trials, organization accountability, cures for a blame culture, incentives that work, the power of simplicity, and more.
  • Synthesizing the Telecom Business Assurance Practice With the Analytics World by Dan Baker — Business assurance is a wrapper term that allows you to draw a circle around various telecom assurance, control, and optimization activities.  This article maps business assurance as a subset of telecom analytics, constrasting it with marketing analytics while a diagram shows where biz assurance fits in the larger B/OSS world.
  • CABS Revenue Assurance Disputes: May the Carrier With the Best Data Win by Cheryl Smith Rardin & David West — Revenue assurance innovation is far easier when partners cooperate to make it happen.  This articles shows how a U.S. operator, software vendor, and consultant teamed to develop a breakthrough in Carrier Access Billing (CABS) assurance.  Learn about: the dispute resolution data gap that needed to be filled, the partnering strategy, the implementation challenges, and payback results.
  • Revenue Assurance vs.  Business Assurance: Who’s the Rightful King of Controls Software? interview with Sergio Luis Silvestre — Business controls software, originally developed for RA, is finding application in other areas of the business such as internal audit, collections, security and risk management.  This article argues that “business assurance” is the best term to describe this broader set of  controls software that can find a home in numerous departments or functions of a CSP’s business.
  • PwC on the Business of Revenue Assurance Consulting & Mentoring interview with Tim Banks & Dan Stevens — Revenue assurance consulting firms offer a broad range of services to clients these days.  The article explains the practice of mentoring RA mangers and providing a CFO with visibility on the status of an operator’s business controls.  Perspective is also offered on the value of RA software and the opportunity to broaden the RA practice scope.
  • Robots for Hire: Verifying Accuracy In the Age of Complex Mobile Billing/Charging interview with Xavier Lesage — As real-time charging and complex lifestyle calling plans gain credence across the globe in wireless, billing quality issues will rise in importance.  This article discusses a unique managed services approach to invoice testing and roaming fraud protection that checks results against advertised or published source data for the utmost accuracy.
  • Ericsson: Revenue Assurance Consulting With an NGN Flavor interview with Thomas Steagall — Helping operators detect billing and provisioning problem is merely table stakes in the RA services business these days.  The article discuss why operators need to ramp up their RA function with service experience and group-wide financial health monitoring.  Advise is also offered on: key RA maturity questions, risk-and-reward contracts, and how to extract greater value from software investments.
  • Do-It-Yourself RA for Small Operators and MVNOs interview with Mark Yelland — Budget-minded small operators and MVNOs are no longer hamstrung in RA capability anymore.  This article offers high-leverage strategies for operators who cannot afford expensive RA software tools.  With  data access, brains, and a DIY philosophy, any small operator can map a  path to greater RA savings, maturity, and program growth.
  • Revenue Assurance Maturity: Report From the Arena interview with Eric Nelson — Revenue assurance maturity can‘t be easily computed.  How do you  compare the KPIs of Comcast billing with that of mobile money RA in Western Africa?  Even still, this article offers some universal RA wisdom from a straight-shooting veteran of carriers large and small.  Topics discussed include: dashboard or process, COTS vs. inhouse solutions, and tips on gaining internal support for the RA practice.