3. Question:
How many of you directly influence the technology
used in your firm/company today?
Answer: You all do, knowingly or not
• Internal – influence colleagues, staff and clients
• External - personal use choices
People “read” your technology level as you interact
4. Tech Trend #1
1. Consumerization
• What it is
• The value to business
• iPad, YouTube (evolved into business)
• Still evolving – (Dropbox for Business)
• “Free”
• Business adds variables
•
•
•
•
Compliance
Security
Risk
Scope / Scale
5. Question:
How many cloud-based apps do you use today
(business or personal)?
Answer: Many (for many years)
• Bank Account, Credit Card
• Email, LinkedIn, Skype (Lync), Box, Zillow,
Flipboard, Spotify, Tango, Connect, Kindle
6. Tech Trend #2
2. Cloud Computing
• Been around for a long time but evolving
• Continues to be a transformative force for us
and our clients
• Office 365, Xero, Bill.com, Mint
• Changed delivery expectations
• collaborative, elastic, mobile
• Less transactional, more dynamic
• Many forms - private, public, hybrid
• "apples to oranges", must do homework
• Cost is only one decision point
7. lntacct
v PRODUCTS
BLOGI
"YOUR BUSINESS
v CUSTOMER SUCCESSES
mint
v SERVICE AND Sl
Your financial life, all in one place
~~.... te
W. ,..u.n _. fiuanol_....0 ..... pb« s.t. ~ cndt...,. _ , udtlo...,...
,,., C1W01e, ior IIW! Wak.h lw •Mn Vldto ..
your
pan~ls
~itb
Makes your life easier
fwture.
Al.Nmt. wt ~be.. Dl0D41')'•tor tn.-ana. So .-.em..a.b~thu:la
•lmrl• u4 •uwmlin«<. Sl,p up W... ._ dua 6•~ aWn.-.
'Tha1 Mint auloao~tic;Uh pul1a. &11 vtl.t &n..ncW inb~"~JUtioa into
t'lll'l! .laf'f'l,•tlllt•l mn ;n..lh,..CI.ror.ntn.rftctut'l'.
lfs time to see the whole financial picture.
WATCH VIDEO >
•
Online File Sharing
Security Leadership in the Cloud
Box lets you store al of your content online. so you
can access. manage and share it from anywhere
Integrate Box with Google Apps and Salesforce and
access Box on mobile devk;es leam More
Box pioneered a new level of content management
security with role-based access controls 99 9%
uptime guarantee. and high-grade SSL encryption on
transit and 256-bit AES encryption at rest Box has
also been issued an SSAE 16 Type II report •
Watch Video • leam More
8. Office for business
QuickBooks Online Works
Wherever You Are
. #1 in cloud accounting for small busmesst
. Organize your business all in one place
. iPad , iPhone, Android apps or the web
Start Now fot FREE
FREE for 30 days - no credit card required
9. COMPUTERWORLD
Topics -
Applications
App Oevelopmenl
Big oa:a
Emergong TeChnolOgieS
Busmess lnleUIQI!nce/Ailalytics
Enterpnse Areh:tedure
ERP
content/Ooan
Open Source
Reg
Unified Commumcnbons
Home Appkabcna
News
Backlash begins against Adobe's
subscription-only plan
Petrtton on Change org asks company to reconstder, collects 4 400
stgnatures 10 four days
By Gregg Keizet
''-v 10. 2013 oe 48 »I ET 0
C... p1 t~rw 1r' A pebt1on on Change org demanding that Adobe back
away from its subscriptiol'l-Only model for its creativity software, including
Photoshop, has collected over 4,400 s1gnatures by late Thursday .
- ~ ·
in
lome
P·dl=
l~':t .•.rl
J t:
' niPr~,· ~
~ Cloud-Powered Businesses
riiii1..tm
Discussions
MlrT·bon;
tlromotO'I£
.ob~
S001rth
"bra
Is It ok for your accountanlltooXkeeper to take commiSSions on c.oucl
accoonhng softwa1e?
Almost every COfllllll1)' seDing doud accoun6ng soflwatc pats cornmilSions lo accounlanl9 and
bookk~pers but it i$ nol always disclosed Some ildu~try experts suth as Matlheir Addi.3on
from tne lnslllute of Cenllled Bootteepers (see post) are concerned acall.litlng professJonals
will recommend ~ccoun:lng softw.u o to dian!& basad on personal benof~ ralhor th.an !he bosl fit
for the busineM.
Beneltscan eilher be a percentag~ of the retaft pnce or fret' use of ~ftware for a m•
nlmum
nurnller of 964es Comni~sions !lave been around for at least 13 ye-ss thouqh Are1hei recllv o
prDbiem?
lJO.t.fJ 91?iLlo...1T
L:Il1 ~•tt.com a•
l.Jie
t;:1 Comnenl
10. Question:
How many mobile devices does the average
person carry (2013)?
How many do you have?
note: your smartphone today has more compute power than all of
NASA in 1969 when it sent two astronauts to the moon
12. Tech Trend #3
3. Mobility
• Smartphones
• Phablets
• Hybrids
• Simple access to high value information
• Growth of information aggregation
platforms that are mobile oriented
• Compliments Cloud computing
• “real estate” matters
• Form / Function varies by device
13. LAPTOPS
DESKTOPS
TABLETS
PHONES
SOFlWARE
CAMERAS
' ' I
Samsung Galaxy Note II Tops 5 Million in Sales
Samsung is celebratwg worldide sales of more
than 5 million GalaX} Note TI d~icesjust t>1o
months after its release.
The electronics giant announced the milestone in a
translated news release less t:haJ130 days after the
South Korean company reported selling 3 million
of the super-sized smartphones.
A s=ung opokcowoman eonfL"l11ed in an email
that the Galaxy Note H has ~urpassed 5 million in
sales since its debut i n late September, adding that
the original Galaxy Note took about five months to
reach 5 million in global sales.
lbE Note 11 is now on sale in all regions, the release
said, including ~ia, Europe, North America, South America, the Middle East, and Africa.
The ~ice, which boasts a .>-s-ineh, 1,28o-i:J>-72o-pixel display is a·ailable on all major
U.S. carriers - Verizon Wueless,ATI':T, Sprint, T-Mobile, and U.S. Cellular, and runs on
Goog]e's Android 4 .1.1 Jelly Bean operating system. For 5299, cu..<tomerz also snag a 1.6GH z, quad-core Exyltos processor, cplimized for LTE networl.:s, as 11ell cs 2GB of RAM and
16. Tech Trend #4
4. BYOD (Bring Your Own Device)
•
•
•
•
•
Approaches vary widely
Mobile policies for “rules of the road”
Balance business value with risks
Data sharing - just because you can,
doesn’t mean you should
What has worked for our firm
• Smartphones / Tablets
• Remote desktops
17. Question:
Should I have concern over all the information I put
(or is gathered) in the “cloud”?
Answer:
Yes, you do need to be aware.
18. Tech Trend #5
5. Social (and other information use)
• Business value (CRM, LinkedIn, Twitter)
• Aggregators / Data mining
• Marketing & Customer Insights
• BIG DATA (data about data)
• Search - “profiles” you
• Information use concerns (NSA, IRS, Google)
• What is tracked/collected
• How it is used
• Who has access (legally / illegally)
• How long data lives
• Manage your “footprint”
19. ~
DIGITAL TRENDS
Lojn
Jqnup
168K
73 '
2"1 r,
THE IRS MAY BE SNOOPING THROUGH FACEBOOK AND
TWITTER TO NAB TAX EVADERS
msn~
~
Franes 11M
us
_,..,. ..
news
Aprj 17 201 J
S7
f
/1
8 6
Cl 6
crime & justice
world science & tech
pop culture
B
MOSTCOMMENTEDST(
NSA: Inside the agency that
Is
a Cat IR1o,.< Til> ooomn~ o ~<tne%
iY1d tmerq1nq eUliiCS of tn~
a ClliJKtle lle p!OWGI Old &(Stem
Twrtler iyll~ bro, and
11
MoM.-.'s R~ Room s gone, bt.i t
ltvP~ ~n 11
a Fa<»><>de< t<><tng a 11t1lfh"'' 1•21U•
til re111110 YOU Will •
a lnslagram The diclalor's <h"'ce' l lo
~ocg~ m9dia 1
"-'ls us
~
0
6/9/13 I By K.mberly Dozter of Assoctated PrEss
SHARE
414
0
TWEET
19
0
'iii'
EMAIL
The notoriously secretive National Security Agency became
a little more familiar to Aner:cans after revelations that it
collected U.S. phone customers' data.
~
20. ICPA) Insights"
• Planntng Strate!!"''~ 1
n
Wak~
nf thE' New 'I R%
M<>d1~arP
Surt;ox
I
Ma1n
I
National MAP
Sur1ey P rovides Insight to CPA Rrms •
"Big Data" Presents Big Opportunities for Firms and
CFOs
It is drfficu lt to ignore the tremendous growth in
information technology tllat llas been occurring over
the last few years ar
business. Technolog
at a volume and pre'
social m edic sites, "'
August 5, 2013
profiles and purchas•
COW COVERAGE
Akron Beaco n Journal Online
I
Ryan l ewis
I Aug u s t
1, 2013
Bridgestone Invitational: Big Data Comes to PGA
Tour in Big Way; Numbers Show Fans the Way at
Firestone C.C.
This article highlights the advantage of the PGA Tour's big data franchise, Shotlink,
a sophisticated data analytical system that tracks each shot and several different
statistics at each course and event. For five years, Tour players and caddies have
had access to the mapping and statistical recording of every course and
tournament on the Tour, thanks to Shotlink and COW, which powers the technology
as the Tour's official technology partner.
21. t
guardian
Yours~
News US ·world Sports Comment Culture Business Money Environment Science
News
World news
New York
New York woman visited by police after
researching pressure cookers online
Long Island resident sa1d her web search history and 'trying to
learn how to cook lenUis' prompted a v1srt from authontres but
pollee say search was prompted by t1poff
+1
fmst1¥e
Email
Adam Gabbatt In New York
The Guard1an, Thursday 1 Auoust2013 16 59 EDT
~ Jump to comments (897)
rJ
Spouses of mamed people wllo •ke Ashley Madison
'"'""
1 - 1 1 1
IUJl'H{ Till~ UA.AOI
[mpiDyc.r
'What the heU IS QUIRoa?" poliCe asked when Catalano's husband told II
pressure cookers were used for mille.- household
A NPw Ynrlc wn~n ~v<: hPr tlm1lv'<: mtPrP<:t 1n thP
mlrrh;;~<:P
il. Q
.,
22. The convergence thread
Consumerization, Cloud, Mobile, BYOD and
Social trends…
• Are interrelated
• Have dependencies
• Compliment one another
• Where they converge = greatest value
23. The security thread
Consumerization, Cloud, Mobile, BYOD and Social
trends…
• All impact security
• Create a larger security “footprint”
• Have less direct control
• Access from anywhere (pro/con)
• Increases risks (& opportunities)
• Blur lines between professional & personal
• Be aware AND participate
•
Ex – two step for cloud properties like LinkedIn
“Efficiency and security are separate targets”
24. Ill lnfoWortd Home I Securrty I News I AP Twltter hack prompts fresh look at cyber..
APRIL 24, 20t3
AP Twitter ltack pro111pts fresltlo
cyber sec11rity 11eeds
Two-step identity verification and analysis of user
prevent attacks such as the hack on the AP's
security e.'-'J)erts say
Ifill ln foW0£1d Home / lnfoWorld Tech Watch I Know thy cyber enemy: Who's attacking and...
By Zach Miners IDG News Service
IEb Print
INFOWORLD TECH WATCH
APRIL2t, 2013
Getting hacked on Twitter is fast becomtng a rite of passage for big corporation
attack on the Assodated Press could be a tipping point and shows lhat social r
more to keep !heir users safe, security experts said
Wider use of two-faclor authentication, which can involve an access code bein!
secon d device such as a smartphone, is one possible solution. Such a mechan
introduced selectively, some experts said, for high profHe accounts such as cel1
corporations.
KI1ow tl1y cyber ene111y: 'W11o 's attacking
ru1d what tl1ey want
.
Verizon security study shows most attacks made b y ex1:ernal
parties, primarily based in China and Romania, using wi de
variety of threat actions
By Ted Samson l lnfoWorld
£l Follow @tsamson_IW
~ Print
l1 uke
China and Romanta spawned the most cyber attacks last year according to an in-depth study
released ttus week by Vertzon Notably, whereas Romanian attackers were primanly prowling for
financial data to score a big payday, Chinese perpetrators were engaged in esptonage focused on
swiping trade secrets and Internal data Much of the responsibility for successful data breaches ln
2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication. Seventysix. percent of networ1< intrusi.ons in 2012 exploited weak or stolen credentials.
28. Definition of "Cloud Computing"
A model for delivering information technology services in
which resources are retrieved from the internet through
web-based tools and applications, rather than a direct
connection to a server. Data and software packages are
stored in servers. However, cloud computing structure
allows access to information as long as an electronic
device has access to the web.
Definition from lnvestopedia.com
29. Benefits of Cloud Accounting
Services
No upfront cost
No servers or programs to maintain including
upgrades
Access to accounting information anywhere
View bank account and credit card balances in one
place
Integration with banks to get daily bank feeds
Integration with other business systems
Real time collaboration with your clients
Exchange data and documents faster and easier
Security of data and regular backups
More time for value added services
31. Data Hosting
• Data Hosting (Such as Right Networks)
- The Hosting center houses your
applications and data on their network
- Value - they worry about data so you
can concentrate on your clients
• Maintain the systems
• Back up the data
• Apply server updates
• Security testing I firewalls
Right Netw rks
32. On-Line Services
Their platform - their software and servers. We
pay a subscription to use their product.
• Examples:
- Xero
- lntacct
- QuickBooks Online
(Harmony)
- FreshBooks
r, lntacct
FR BOOKS
cloud accounting
33. C0llaboration
The importance –
– The data is sorted, standardized, analyzed
and reported in real-time therefore, you are
able to focus on a different set of more
high-value priorities.
• Explain the numbers instead of just reporting
them
• Identifying opportunities in addition to ensuring
compliance
• strategize for the future rather than just review
the past
Various Collaboration Tools
– E-mail, IM, Skype, Built-In options
34. Integration
Integration is an important factor when choosing the
accounting product
Create efficiencies
– It can eliminate duplicate data entry and minimize
conflicting versions of the same data when the various
systems you use integrate – CRM,
– It can add so much more capabilities to an accounting
system than what is built in to the program.
Caution: The is a need to evaluate if the add-on
integration will be around for a while.
– If it’s an add on product that your business will depend
on, you don’t want to that integration to cease working.
– (for example if the accounting software decides to disable
the integration or the Add On product goes belly up.)
35. Integration
2 things to evaluate when reviewing an
accounting program in regards to
Integration:
– API: Does the software have an API
(Application Programming Interface),
which is a way for software developers
and advanced users to interact with the
software’s data via custom applications?
– Number of add-ons: How many public
add-ons does the software have?
36. Other Examples of Web
Based Applications
Tax
– GoSystemTax RS, ProSystem fx Tax (Saas)
Financial Statement
– Xero, FreshBooks
ERP
– Intacct, QuickBooks On-line
Workflow
– SurePrep, GruntWorx
Audit Confirmation
– Capital Confirmation
Customer Relationship Management (CRM)
– NetSuite, Sage CRM
Document Management
– GoFileRoom, Smart Vault
Journal of Accountancy October 2010, Cloud Computing: What accountants Need to Know
38. Security and Reliability
Considerations, con’t
SOC Compliant
Be sure the Vendor is using a data center that an AICPA Service
Organization Controls Report (SOC), formerly known as a SAS 70
report.
SOC2 / SSAE-16
Other Factors
– Where is my data being hosted
– Who has access
Journal of Accountancy “What Accountants Need to Know”
39. SOC Controls Tested
–
–
–
–
–
Infrastructure - hardware
Software - programs and operating software
People - users
Procedures - automated and manual
Data - transaction streams, files, databases
and tables
40. Accounting in the Cloud Factors
Evaluate
– What cloud options make sense for your
company?
• Data Hosting, On-Line Services, Private Cloud.
o Hint: It may be a hybrid approach where some services are
utilized in a data hosting arena and others are purely on-line.
– Value Add
• Think of the value add you can bring to your
clients when the data entry is minimized and the
date is centralized.
Do your homework
– Research the products for fit
– Research the reliability and security.
41. MY ~E~o~,- CoNE5 ,-o ,.HE
CoNCLUSioN ,-HA,- CLout> ,-ECHNoLoGY
15 of No use
,.HIS CONI>ANY.
I'LL- UI>LoAt> 1,- ,-o b~OI> Bo>< 5o
you CAN ,.A<E A LooK A,. 1,-.
,.0
)