European Shareware Conference 2006 (Cambridge UK)

 


European Shareware Conference (ESWC) 2006

Over the weekend of the 4th to 5th November, I attended the European Shareware Conference. The conference is aimed at micro ISV's and Shareware Businesses, and is presented in the prestigious (and expensive!) Crowne Plaza hotel in Cambridge, UK. Here's a picture:

Crowne Plaza Hotel (expensive!)

The conference started with a discussion of Search Engine Optimization. According to Dave Collins the most important rule is that there are no rules that describe what to do to optimize your site! After presentations from Gary Elfring and Robert Martin, there was a very interesting panel session:

Bob Walsh, Gary Elfring, Dave Collins, Sharon Housley, Phil Schnyder, Robert Martin

From left to right, the panel consists of Bob Walsh (Moderator), Gary Elfring (Elfring fonts), Dave Collins (Shareware promotions), Sharon Housley (Notepage), Phil Schnyder (Avanquest), and Robert Martin (Infacta). The panel talked about the most important opportunities for micro ISVs in 2006 - 2007. These were:

  • Customer relationships are not just one-way - it's not just about making a sale and forgetting the customer. Instead, build a relationship with the customer by keeping them updated, asking for feedback and including their improvements in new versions.
  • Develop and test under Windows Vista. If you're quick to market with a Vista version, you may even steal a march on your competitors.
  • Create real-time feeds based on your name and company name using products like ego-search. You can be directly notified as soon as someone discusses you, allowing you to reply directly.

Bob Walsh then motivated everyone to direct action by asking what immediate things we would do as a result of the panel's suggestions. I won a prize of his book "From Micro-ISV to reality" for committing to test under Windows Vista - thanks Bob! So I have to make a Windows Vista tested version of Ubercode within the next few months, or Bob will ask for his book back!

Round about this time some of the power sockets failed because of overload, so I couldn't use my laptop for a while. The overload was because the room was cold so the hotel staff supplied extra heaters:

It gets cold in Cambridge!

After lunch (which I ducked out of) Tony Edgecombe talked about building customer trust. Some important lessons are: Always act in the best interests of your customers, offer a Money Back Guarantee, and use Authenticode to sign your EXE files. I am pleased to report Ubercode Software currently does at least two of these! Authenticode signing is even more important with Windows Vista, since unsigned EXEs cause Windows to pop up nasty warnings.

The next session is with Marcel Hartgerink (Wibu) who discussed software protection in detail. This is one of the more technical sessions and Marcel's product CodeMeter implements protection based on time, number of uses and number of simultaneous users. The CodeMeter is a hardware based device (dongle). This should be very secure, since it is based on an encrypted USB key or PCMCIA card:

AX protector hardware key

This was followed by the afternoon panel session:

Marck Pearlstone, Michael Lehman, Sinan Karaca, Thomas Wetzel, Marcel Hartgerink

This panel consists of Marck Pearlstone (Brainstorm software), Michael Lehman (Microsoft), Sinan Karaca (Installaware), Thomas Wetzel (Wisco) and Marcel Hartgerink (Wibu systems). Some interesting things emerged from this panel, including the statement that Dot Net v3 is primarily a marketing release based on Dot Net v2 plus Windows FX. Also Michael Lehman of Microsoft confirmed the Windows 32 / 64 bit API is still being implemented in the forthcoming Windows Vista release.

Sinan Karaca of InstallAware then showed us his new installer, which is intended for creating MSI (Microsoft Installer) files for Windows. MSI files are Microsoft's new installer technology which works under Windows 2000, XP and Vista. Sinan used to work at Install Shield and was part of a group that left to found their own business.

The final session on Saturday was from Thomas Wetzel (Wisco) who discussed Google ad-words. He pointed out it's easy to lose money with Google ad-words since these exist primarily to make money for Google, not for you. Careful use of ad-words requires techniques such as the following:

  • Use several words that accurately target your product.
  • Use negative words so your ad-words are not wasted on searches using words you don't want.
  • Make sure you include a "call to action" with your ad-word phrase.
  • Use different advert text and measure the response to different ad-words, as a way of measuring the effectiveness of the ad-words.
  • If you are number one on the ad-word list, you're spending too much money. Reduce the amount you bid for the ad-words to ensure you are number two or number three.
  • Be sure to measure the response to the ad-words, since you need to know whether they are earning money. If you are not measuring the response, you are wasting your money on ad-words.
  • When measuring the response, you should know what the most commonly used keywords are, you should know your click-through rate and the ultimate conversion rate. Monitor performance at least once a week.
  • Delete any ads with a low click-through rate.

Sunday 5th November - European Shareware Conference

To the surprise of Dave Collins (Shareware Promotions), most people made it to the 9am Sunday morning session! During this session Dave gave a list of do's and don'ts for websites. Here's the list of things you should do:

  • Customers need confidence that you are trustworthy. The site should include terms and conditions and money back guarantees.
  • Make sure testimonials that can be backed up. Testimonials should not be limited to a separate page that no-one reads, instead they should be inserted inline with page content.
  • Reassure customers by providing a current phone number and address.
  • Use product photos, screen shots and photos of real people. This gives credibility and reassures customers that you have a real business.
  • Make sure there are site links on the bottom of a page. If a customer is dedicated enough to read to the bottom of the page, don't abandon them!
  • Explain what you are and what you do, and make sure your site focuses on your product. Speak to your customers in the language they understand.
  • Your website is your main selling tool - if necessary spend money to make it look good.
  • Use log file analysis programs to monitor your site.

... and here's the list of things you shouldn't do:

  • Don't have too many links per page and don't use tiny fonts.
  • Don't use home-designed graphics and don't use the clip-art included with Microsoft office.
  • Don't let your site get out of date and make sure copyright dates are current. "Last updated July 1997" does not inspire confidence so you should update monthly or more frequently.
  • Don't use too much text on a page. Keep pages as clear and as short as possible by removing fluff words and unnecessary sentences.
  • Don't make people hunt around for information about your products. Make sure the website is clear and focused.
  • If visitors want to download a trial copy, don't make their life difficult by asking for information you don't need.

In the next session Thomas Wetzer (Wisco) discussed software protection. I don't understand why German software developers are so interested in this subject, but anyway here is Thomas discussing what to do about software pirates:

What to do about pirates

By offering them a discount he converts about 20% of them into legitimate users! Here are Thomas's suggestions for software protection:

  • No protection. This is the model used by Winzip up to version 8.1, which allows unregistered users to continue using the product.
  • Make the full version available only after purchase. This can be bypassed by the publication of the full version by hackers, although this is less likely.
  • Offer protection via licence keys. This can be bypassed by hackers posting valid keys, or by hackers disassembling your licence key validation code and creating their own key generator.
  • Partial key validation. To offer defence against key generators, you can have a longer key and only validate against part of it at one time.
  • Continued use after refunds. To protect against this, Thomas suggests keys are time limited.
  • Hardware locking. Using this technique, an application can be locked to a particular hard disk serial number or network card MAC address. This method causes an extra support burden because computer configurations change over time.
  • Product activation. This is the same model used by Microsoft with Windows XP and Office 2003, where the application "phones home" and validates its details against a central server. Thomas suggested the application only phoned home during a regular update check, to avoid the annoyance of making the customer's computer connect across the internet without asking.
  • Software protection packages such as Armadillo. During the question session several people said they found Armadillo's protection was limited, as determined hackers find ways around it.
  • Hardware based protection. Use of dongles and hardware locks is about the only way of making hacker proof applications. But most applications do not justify the expense or customer inconvenience of hardware protection devices.

A lively discussion then took place about what information could be sent back when an application "phones home". Thomas said it was OK to send back personally identifiable information, whereas other people had the view this information should not be sent without customer approval.

My personal views on protection are: (1) The only reliable methods are product activation and hardware locks (2) it doesn't matter anyway since the only purpose of protection is to keep honest folks honest, and you shouldn't spend too long in a war against hackers who have nothing creative to do.

At 11.00 the e-commerce panel kicked off:

Jessy Jex, Phil Schnyder, Edward Leigh, Daniel Kleinburg, Guy Wilnai, Sharon Housley, Dave Collins, David Boventer

From left to right, the panel consists of: Jessy Jex (not visible), Phil Schnyder (Avanquest), Edward Leigh (Osolis), Daniel Kleinburg (Plimus), Guy Wilnai (Plimus), Sharon Housley (Notepage), Dave Collins (Shareware promotions) and David Boventer (ESWC). David thanked everyone for turning up, then questions took place about secure ordering. People are frustrated at having to re-enter credit card details each time when visiting different sites and having to keep track of different passwords and login details. The panel made the point that Microsoft offered the Microsoft Passport / Wallet service which retained credit card details, but Passport had met a lot of opposition. Another useful suggestion was for developers to have several different prices, for example there could be a Lite version and a Professional version, or there could be monthly payment options for more expensive products.

During the lunch break, I spoke to Bob Gibson at Tucows software. He helped fix a problem I had with getting the Ubercode download listed on Tucows. Many thanks Bob, and here are the Tucows mascots:

Tucows

After the lunch break, Dave Collins (Shareware promotions) kicked off at 1.30pm by discussing Google adwords. He made some intersting points:

  • Adwords are all about making for money for Google, not for the advertiser.
  • The adwords system is made deliberately complicated with defaults that are biased in Google's favor. For example it defaults to wide matching, and it hides away options that you can use to target your adwords.
  • It is critical to monitor the success of the adwords, so that you can know which adwords are generating the most income. It is likely that a small number of ads are generating most of your income, so you have to know the effectiveness of each adword.
  • Make sure you set a realistic daily budget as a safety net.
  • Use multiple landing pages, Google doesn't like single landing pages.
  • Run a campaign or adwords for at least a week, so you can accurately measure how effective the ads are.

Following Dave's presentation, the Sunday afternoon panel answered questions on supporting your users:

Gary Elfring, Tony Edgecombe, Marck Pearlstone, Bob Walsh, Thomas Wetzel, Marcel Hartgerink

This panel consists of Gary Elfring (Elfring fonts), Tony Edgecombe (Frogmore), Marck Pearlstone (Brainstorm software), Bob Walsh (My Micro ISV), Thomas Wetzel (Wisco), and Marcel Hartgerink (Wibu systems). Some interesting facts that emerged were:

  • One person in the audience with about 20,000 customers reported they had about 100 support emails per week. This is equivalent to about 5000 emails per year and means each customer is 25% likely to contact you per year (very approximately!)
  • There was a general consensus that phone support was a luxury for most shareware authors selling packages in the $100 range. Developers were concerned their time would be used up in simple support issues. However it's important to have a phone number and to pick up calls from this number, in case a customer phones up to check you exist.
  • This led to a related issue - how much support should users get? There is a viewpoint that any support issue is a problem in your software, so all support issues are important and should be addressed. According to Bob Walsh, a request for technical support is a sales opportunity and a chance to establish contact with a user and show the credibility of your business. I agree with this, and all licenced Ubercode customers are entitled to full technical support.

After the mid-afternoon coffee break, Michael Lehman of Microsoft presented Project Glidepath. This project is aimed at micro ISVs to help them move forwards to Windows Vista. Here we have Michael at the start of his talk:

Michael Lehman, Project Glidepath

Project Glidepath helps developers with the following:

  • It offers documentation and help files to assist developers using the classic Windows API to port to Vista.
  • There is a Project Glidepath community which discusses Vista development issues. Also the Project Glidepath spotlight focuses on particular ISVs who are porting their code to Vista. Spotlight requires developers to be using the new dot net v3 libraries, also it requires developers to use the new task based dialogs (instead of MessageBox) and to use the new Open file dialogs.
  • Windows Vista developers can be listed in the Windows marketplace, which is an on-line collection of Windows applications that can be downloaded. Also Microsoft have a regular micro ISV spotlight, where a particular product is given focus for a few days.
  • The Windows Vista Logo is available at two levels. The "Works with Windows Vista" self-certification is free, and external certification is available for a fee from external agencies.
  • It offers extension packages to Visual Studio 2005 Standard Edition. These extensions help Borland Delphi and Visual Basic v6 developers adapt their programs to work under Windows Vista. As far as I can tell, extensions are blocks of managed code that implement the new parts of Windows that work differently in Vista.

The final session for the day is a website critique offered by Dave Collins (Shareware Promotions) and Bob Walsh (My Micro ISV). Here's a picture of Dave warming up to rip someone's site to shreds:

Dave about to rip some site to shreds

Several people (including me) volunteered to have our sites critiqued. Dave offered useful suggestions to everyone prepared to volunteer their sites, and I think he was disappointed that none of the sites were truly terrible!

Sunday evening - ESWC Awards

After the conference was over, the Epsilon Award was given to the author of the best shareware program. Here is David Boventer, the efficient and friendly ESWC chairman, deep in conversation with the Lord Mayor of Cambridge:

David Boventer (ESWC) chats to the Lord Mayor of Cambridge

The Epsilon Award was then presented to Alcohol-Soft.com for their useful CD / DVD backup software. Here is a picture of the presentation of the award:

Epsilon award is presented to Alcohol-Soft.com for their backup software

Well, that's enough about the conference. I learnt a lot during this conference, and would like to say a big Thank You! to everyone who helped me and who gave me feedback. If I have missed anything out or got any details wrong, contact me and I will fix it.