SlideShare ist ein Scribd-Unternehmen logo
1 von 42
Downloaden Sie, um offline zu lesen
Tech Trends 2013:
Cloudy with constant change
Jerry Justice, MCSA, MCSE
JJustice@ssandg.com
Rhonda Miller, CPA. CITP
RMiller@ssandg.com
Five Technology Trends
•
•
•

Five Questions
Two Threads
One Challenge

•
•

Accounting in the Cloud
Q&A
Question:
How many of you directly influence the technology
used in your firm/company today?
Answer: You all do, knowingly or not
• Internal – influence colleagues, staff and clients
• External - personal use choices
People “read” your technology level as you interact
Tech Trend #1
1. Consumerization
• What it is
• The value to business
• iPad, YouTube (evolved into business)
• Still evolving – (Dropbox for Business)
• “Free”
• Business adds variables
•
•
•
•

Compliance
Security
Risk
Scope / Scale
Question:
How many cloud-based apps do you use today
(business or personal)?
Answer: Many (for many years)
• Bank Account, Credit Card
• Email, LinkedIn, Skype (Lync), Box, Zillow,
Flipboard, Spotify, Tango, Connect, Kindle
Tech Trend #2
2. Cloud Computing
• Been around for a long time but evolving
• Continues to be a transformative force for us
and our clients
• Office 365, Xero, Bill.com, Mint
• Changed delivery expectations
• collaborative, elastic, mobile
• Less transactional, more dynamic
• Many forms - private, public, hybrid
• "apples to oranges", must do homework
• Cost is only one decision point
lntacct
v PRODUCTS

BLOGI

"YOUR BUSINESS

v CUSTOMER SUCCESSES

mint

v SERVICE AND Sl

Your financial life, all in one place

~~.... te

W. ,..u.n _. fiuanol_....0 ..... pb« s.t. ~ cndt...,. _ , udtlo...,...
,,., C1W01e, ior IIW! Wak.h lw •Mn Vldto ..

your

pan~ls

~itb

Makes your life easier

fwture.

Al.Nmt. wt ~be.. Dl0D41')'•tor tn.-ana. So .-.em..a.b~thu:la
•lmrl• u4 •uwmlin«<. Sl,p up W... ._ dua 6•~ aWn.-.
'Tha1 Mint auloao~tic;Uh pul1a. &11 vtl.t &n..ncW inb~"~JUtioa into
t'lll'l! .laf'f'l,•tlllt•l mn ;n..lh,..CI.ror.ntn.rftctut'l'.

lfs time to see the whole financial picture.
WATCH VIDEO >

•

Online File Sharing

Security Leadership in the Cloud

Box lets you store al of your content online. so you
can access. manage and share it from anywhere
Integrate Box with Google Apps and Salesforce and
access Box on mobile devk;es leam More

Box pioneered a new level of content management
security with role-based access controls 99 9%
uptime guarantee. and high-grade SSL encryption on
transit and 256-bit AES encryption at rest Box has
also been issued an SSAE 16 Type II report •
Watch Video • leam More
Office for business

QuickBooks Online Works
Wherever You Are
. #1 in cloud accounting for small busmesst
. Organize your business all in one place
. iPad , iPhone, Android apps or the web
Start Now fot FREE
FREE for 30 days - no credit card required
COMPUTERWORLD
Topics -

Applications

App Oevelopmenl

Big oa:a

Emergong TeChnolOgieS

Busmess lnleUIQI!nce/Ailalytics

Enterpnse Areh:tedure

ERP

content/Ooan

Open Source

Reg

Unified Commumcnbons

Home Appkabcna

News

Backlash begins against Adobe's
subscription-only plan
Petrtton on Change org asks company to reconstder, collects 4 400
stgnatures 10 four days
By Gregg Keizet

''-v 10. 2013 oe 48 »I ET 0

C... p1 t~rw 1r' A pebt1on on Change org demanding that Adobe back
away from its subscriptiol'l-Only model for its creativity software, including
Photoshop, has collected over 4,400 s1gnatures by late Thursday .

- ~ ·

in
lome

P·dl=

l~':t .•.rl

J t:

' niPr~,· ~

~ Cloud-Powered Businesses

riiii1..tm

Discussions

MlrT·bon;

tlromotO'I£

.ob~

S001rth

"bra

Is It ok for your accountanlltooXkeeper to take commiSSions on c.oucl
accoonhng softwa1e?

Almost every COfllllll1)' seDing doud accoun6ng soflwatc pats cornmilSions lo accounlanl9 and
bookk~pers but it i$ nol always disclosed Some ildu~try experts suth as Matlheir Addi.3on
from tne lnslllute of Cenllled Bootteepers (see post) are concerned acall.litlng professJonals
will recommend ~ccoun:lng softw.u o to dian!& basad on personal benof~ ralhor th.an !he bosl fit

for the busineM.
Beneltscan eilher be a percentag~ of the retaft pnce or fret' use of ~ftware for a m•
nlmum
nurnller of 964es Comni~sions !lave been around for at least 13 ye-ss thouqh Are1hei recllv o
prDbiem?

lJO.t.fJ 91?iLlo...1T
L:Il1 ~•tt.com a•

l.Jie

t;:1 Comnenl
Question:
How many mobile devices does the average
person carry (2013)?
How many do you have?
note: your smartphone today has more compute power than all of
NASA in 1969 when it sent two astronauts to the moon
3 devices
Tech Trend #3
3. Mobility
• Smartphones
• Phablets
• Hybrids
• Simple access to high value information
• Growth of information aggregation
platforms that are mobile oriented
• Compliments Cloud computing
• “real estate” matters
• Form / Function varies by device
LAPTOPS

DESKTOPS

TABLETS

PHONES

SOFlWARE

CAMERAS

' ' I

Samsung Galaxy Note II Tops 5 Million in Sales
Samsung is celebratwg worldide sales of more
than 5 million GalaX} Note TI d~icesjust t>1o
months after its release.
The electronics giant announced the milestone in a
translated news release less t:haJ130 days after the
South Korean company reported selling 3 million
of the super-sized smartphones.
A s=ung opokcowoman eonfL"l11ed in an email

that the Galaxy Note H has ~urpassed 5 million in
sales since its debut i n late September, adding that
the original Galaxy Note took about five months to
reach 5 million in global sales.
lbE Note 11 is now on sale in all regions, the release
said, including ~ia, Europe, North America, South America, the Middle East, and Africa.
The ~ice, which boasts a .>-s-ineh, 1,28o-i:J>-72o-pixel display is a·ailable on all major
U.S. carriers - Verizon Wueless,ATI':T, Sprint, T-Mobile, and U.S. Cellular, and runs on
Goog]e's Android 4 .1.1 Jelly Bean operating system. For 5299, cu..<tomerz also snag a 1.6GH z, quad-core Exyltos processor, cplimized for LTE networl.:s, as 11ell cs 2GB of RAM and
Hybrids

•

•
•
•

Touch Oriented
Multiple form factors
Windows 8, Android
Blended Apps
HP EllteBook Revolve
Overview

Features

....un,...,...UI.tiiY . . . . .

Specs

-
Question:
So what does one do with all these devices?
Tech Trend #4
4. BYOD (Bring Your Own Device)
•
•
•
•
•

Approaches vary widely
Mobile policies for “rules of the road”
Balance business value with risks
Data sharing - just because you can,
doesn’t mean you should
What has worked for our firm
• Smartphones / Tablets
• Remote desktops
Question:
Should I have concern over all the information I put
(or is gathered) in the “cloud”?
Answer:
Yes, you do need to be aware.
Tech Trend #5
5. Social (and other information use)
• Business value (CRM, LinkedIn, Twitter)
• Aggregators / Data mining
• Marketing & Customer Insights
• BIG DATA (data about data)
• Search - “profiles” you
• Information use concerns (NSA, IRS, Google)
• What is tracked/collected
• How it is used
• Who has access (legally / illegally)
• How long data lives
• Manage your “footprint”
~

DIGITAL TRENDS

Lojn

Jqnup

168K

73 '

2"1 r,

THE IRS MAY BE SNOOPING THROUGH FACEBOOK AND
TWITTER TO NAB TAX EVADERS
msn~
~

Franes 11M

us
_,..,. ..

news

Aprj 17 201 J

S7

f

/1

8 6

Cl 6

crime & justice

world science & tech

pop culture

B
MOSTCOMMENTEDST(

NSA: Inside the agency that

Is

a Cat IR1o,.< Til> ooomn~ o ~<tne%
iY1d tmerq1nq eUliiCS of tn~
a ClliJKtle lle p!OWGI Old &(Stem
Twrtler iyll~ bro, and
11

MoM.-.'s R~ Room s gone, bt.i t
ltvP~ ~n 11

a Fa<»><>de< t<><tng a 11t1lfh"'' 1•21U•
til re111110 YOU Will •
a lnslagram The diclalor's <h"'ce' l lo
~ocg~ m9dia 1
"-'ls us

~

0

6/9/13 I By K.mberly Dozter of Assoctated PrEss
SHARE
414

0

TWEET
19

0

'iii'

EMAIL

The notoriously secretive National Security Agency became
a little more familiar to Aner:cans after revelations that it
collected U.S. phone customers' data.

~
ICPA) Insights"
• Planntng Strate!!"''~ 1
n

Wak~

nf thE' New 'I R%

M<>d1~arP

Surt;ox

I

Ma1n

I

National MAP

Sur1ey P rovides Insight to CPA Rrms •

"Big Data" Presents Big Opportunities for Firms and
CFOs
It is drfficu lt to ignore the tremendous growth in

information technology tllat llas been occurring over
the last few years ar
business. Technolog
at a volume and pre'
social m edic sites, "'

August 5, 2013

profiles and purchas•

COW COVERAGE
Akron Beaco n Journal Online

I

Ryan l ewis

I Aug u s t

1, 2013

Bridgestone Invitational: Big Data Comes to PGA
Tour in Big Way; Numbers Show Fans the Way at
Firestone C.C.
This article highlights the advantage of the PGA Tour's big data franchise, Shotlink,
a sophisticated data analytical system that tracks each shot and several different
statistics at each course and event. For five years, Tour players and caddies have
had access to the mapping and statistical recording of every course and
tournament on the Tour, thanks to Shotlink and COW, which powers the technology
as the Tour's official technology partner.
t

guardian

Yours~

News US ·world Sports Comment Culture Business Money Environment Science
News

World news

New York

New York woman visited by police after
researching pressure cookers online
Long Island resident sa1d her web search history and 'trying to
learn how to cook lenUis' prompted a v1srt from authontres but
pollee say search was prompted by t1poff

+1

fmst1¥e
Email

Adam Gabbatt In New York

The Guard1an, Thursday 1 Auoust2013 16 59 EDT
~ Jump to comments (897)

rJ

Spouses of mamed people wllo •ke Ashley Madison

'"'""

1 - 1 1 1
IUJl'H{ Till~ UA.AOI

[mpiDyc.r

'What the heU IS QUIRoa?" poliCe asked when Catalano's husband told II
pressure cookers were used for mille.- household
A NPw Ynrlc wn~n ~v<: hPr tlm1lv'<: mtPrP<:t 1n thP

mlrrh;;~<:P

il. Q

.,
The convergence thread
Consumerization, Cloud, Mobile, BYOD and
Social trends…
• Are interrelated
• Have dependencies
• Compliment one another
• Where they converge = greatest value
The security thread
Consumerization, Cloud, Mobile, BYOD and Social
trends…
• All impact security
• Create a larger security “footprint”
• Have less direct control
• Access from anywhere (pro/con)
• Increases risks (& opportunities)
• Blur lines between professional & personal
• Be aware AND participate
•

Ex – two step for cloud properties like LinkedIn

“Efficiency and security are separate targets”
Ill lnfoWortd Home I Securrty I News I AP Twltter hack prompts fresh look at cyber..
APRIL 24, 20t3

AP Twitter ltack pro111pts fresltlo

cyber sec11rity 11eeds
Two-step identity verification and analysis of user
prevent attacks such as the hack on the AP's
security e.'-'J)erts say

Ifill ln foW0£1d Home / lnfoWorld Tech Watch I Know thy cyber enemy: Who's attacking and...

By Zach Miners IDG News Service

IEb Print

INFOWORLD TECH WATCH
APRIL2t, 2013

Getting hacked on Twitter is fast becomtng a rite of passage for big corporation
attack on the Assodated Press could be a tipping point and shows lhat social r
more to keep !heir users safe, security experts said
Wider use of two-faclor authentication, which can involve an access code bein!
secon d device such as a smartphone, is one possible solution. Such a mechan
introduced selectively, some experts said, for high profHe accounts such as cel1
corporations.

KI1ow tl1y cyber ene111y: 'W11o 's attacking
ru1d what tl1ey want
.
Verizon security study shows most attacks made b y ex1:ernal
parties, primarily based in China and Romania, using wi de
variety of threat actions
By Ted Samson l lnfoWorld

£l Follow @tsamson_IW

~ Print

l1 uke

China and Romanta spawned the most cyber attacks last year according to an in-depth study
released ttus week by Vertzon Notably, whereas Romanian attackers were primanly prowling for
financial data to score a big payday, Chinese perpetrators were engaged in esptonage focused on
swiping trade secrets and Internal data Much of the responsibility for successful data breaches ln
2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication. Seventysix. percent of networ1< intrusi.ons in 2012 exploited weak or stolen credentials.
One Challenge:
To effectively leverage these 5 trends.
Accounting in the Cloud
The neV generation thinks and
coininunicates differently.
Definition of "Cloud Computing"

A model for delivering information technology services in
which resources are retrieved from the internet through
web-based tools and applications, rather than a direct
connection to a server. Data and software packages are
stored in servers. However, cloud computing structure
allows access to information as long as an electronic
device has access to the web.
Definition from lnvestopedia.com
Benefits of Cloud Accounting
Services
 No upfront cost
 No servers or programs to maintain including
upgrades
 Access to accounting information anywhere
 View bank account and credit card balances in one
place
 Integration with banks to get daily bank feeds
 Integration with other business systems
 Real time collaboration with your clients
 Exchange data and documents faster and easier
 Security of data and regular backups
 More time for value added services
2 Cloud Options

 Data Hosting
 On-line Accounting Products
Data Hosting
• Data Hosting (Such as Right Networks)
- The Hosting center houses your
applications and data on their network
- Value - they worry about data so you
can concentrate on your clients
• Maintain the systems
• Back up the data
• Apply server updates
• Security testing I firewalls

Right Netw rks
On-Line Services
Their platform - their software and servers. We
pay a subscription to use their product.

• Examples:
- Xero

- lntacct
- QuickBooks Online
(Harmony)
- FreshBooks

r, lntacct

FR BOOKS
cloud accounting
C0llaboration
 The importance –
– The data is sorted, standardized, analyzed
and reported in real-time therefore, you are
able to focus on a different set of more
high-value priorities.
• Explain the numbers instead of just reporting
them
• Identifying opportunities in addition to ensuring
compliance
• strategize for the future rather than just review
the past

 Various Collaboration Tools
– E-mail, IM, Skype, Built-In options
Integration
 Integration is an important factor when choosing the
accounting product
 Create efficiencies
– It can eliminate duplicate data entry and minimize
conflicting versions of the same data when the various
systems you use integrate – CRM,
– It can add so much more capabilities to an accounting
system than what is built in to the program.
 Caution: The is a need to evaluate if the add-on
integration will be around for a while.
– If it’s an add on product that your business will depend
on, you don’t want to that integration to cease working.
– (for example if the accounting software decides to disable
the integration or the Add On product goes belly up.)
Integration
 2 things to evaluate when reviewing an
accounting program in regards to
Integration:
– API: Does the software have an API
(Application Programming Interface),
which is a way for software developers
and advanced users to interact with the
software’s data via custom applications?
– Number of add-ons: How many public
add-ons does the software have?
Other Examples of Web
Based Applications
 Tax
– GoSystemTax RS, ProSystem fx Tax (Saas)

 Financial Statement
– Xero, FreshBooks

 ERP
– Intacct, QuickBooks On-line

 Workflow
– SurePrep, GruntWorx

 Audit Confirmation
– Capital Confirmation

 Customer Relationship Management (CRM)
– NetSuite, Sage CRM

 Document Management
– GoFileRoom, Smart Vault
Journal of Accountancy October 2010, Cloud Computing: What accountants Need to Know
Security and Reliability
Considerations

# 1 Concern
Is your data safe / secure?
Security and Reliability
Considerations, con’t
 SOC Compliant
Be sure the Vendor is using a data center that an AICPA Service
Organization Controls Report (SOC), formerly known as a SAS 70
report.
SOC2 / SSAE-16


Other Factors
– Where is my data being hosted
– Who has access

Journal of Accountancy “What Accountants Need to Know”
SOC Controls Tested
–
–
–
–
–

Infrastructure - hardware
Software - programs and operating software
People - users
Procedures - automated and manual
Data - transaction streams, files, databases
and tables
Accounting in the Cloud Factors
 Evaluate
– What cloud options make sense for your
company?
• Data Hosting, On-Line Services, Private Cloud.
o Hint: It may be a hybrid approach where some services are
utilized in a data hosting arena and others are purely on-line.

– Value Add
• Think of the value add you can bring to your
clients when the data entry is minimized and the
date is centralized.

 Do your homework
– Research the products for fit
– Research the reliability and security.
MY ~E~o~,- CoNE5 ,-o ,.HE
CoNCLUSioN ,-HA,- CLout> ,-ECHNoLoGY
15 of No use
,.HIS CONI>ANY.
I'LL- UI>LoAt> 1,- ,-o b~OI> Bo>< 5o
you CAN ,.A<E A LooK A,. 1,-.

,.0

)
Contact Info:
Jerry Justice, MCSA, MCSE
JJustice@ssandg.com
Rhonda Miller, CPA. CITP
RMiller@ssandg.com

Weitere ähnliche Inhalte

Was ist angesagt?

Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceNANDI AYANA
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013Craig Rispin
 
How can I get rid of paper in my business processes?
How can I get rid of paper in my business processes?How can I get rid of paper in my business processes?
How can I get rid of paper in my business processes?John Mancini
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip NyborgIBM Danmark
 
Flagstaff chamber keynote presentation
Flagstaff chamber keynote presentationFlagstaff chamber keynote presentation
Flagstaff chamber keynote presentationData Doctors
 
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014Deborah Weinswig
 
The Social Life of the Internet of Things
The Social Life of the Internet of ThingsThe Social Life of the Internet of Things
The Social Life of the Internet of ThingsStephen Cox
 
The Future of Communication Technology in 2022 A.D. By Lydia Mato
The Future of Communication Technology in 2022 A.D. By Lydia MatoThe Future of Communication Technology in 2022 A.D. By Lydia Mato
The Future of Communication Technology in 2022 A.D. By Lydia Matolydia mato
 
how we use technology
how we use technologyhow we use technology
how we use technologydannibailey
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information OpportunityJohn Mancini
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsJason Hong
 
How consumers use technology and the impact it has on their lives
How consumers use technology and the impact it has on their lives How consumers use technology and the impact it has on their lives
How consumers use technology and the impact it has on their lives BebeDyl
 
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...John Mancini
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
 

Was ist angesagt? (20)

Clarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillanceClarke. nb. PRIVATE EYES. privacy and suveillance
Clarke. nb. PRIVATE EYES. privacy and suveillance
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
The Future of IT
The Future of ITThe Future of IT
The Future of IT
 
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
ALPMA - Craig Rispin's Keynote & Workshop 18 Oct 2013
 
Tuli eServices Dotnet portfolio
Tuli eServices Dotnet portfolioTuli eServices Dotnet portfolio
Tuli eServices Dotnet portfolio
 
How can I get rid of paper in my business processes?
How can I get rid of paper in my business processes?How can I get rid of paper in my business processes?
How can I get rid of paper in my business processes?
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Mobile, Philip Nyborg
Mobile, Philip NyborgMobile, Philip Nyborg
Mobile, Philip Nyborg
 
Flagstaff chamber keynote presentation
Flagstaff chamber keynote presentationFlagstaff chamber keynote presentation
Flagstaff chamber keynote presentation
 
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014
FBIC Global Deborah Weinswig New Tech Presentation Dec. 3 2014
 
The Social Life of the Internet of Things
The Social Life of the Internet of ThingsThe Social Life of the Internet of Things
The Social Life of the Internet of Things
 
The Future of Communication Technology in 2022 A.D. By Lydia Mato
The Future of Communication Technology in 2022 A.D. By Lydia MatoThe Future of Communication Technology in 2022 A.D. By Lydia Mato
The Future of Communication Technology in 2022 A.D. By Lydia Mato
 
The Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the FutureThe Impact of the Internet on Institutions in the Future
The Impact of the Internet on Institutions in the Future
 
how we use technology
how we use technologyhow we use technology
how we use technology
 
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
#AIIM14 keynote -- Turning Information Chaos into Information Opportunity
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
 
How consumers use technology and the impact it has on their lives
How consumers use technology and the impact it has on their lives How consumers use technology and the impact it has on their lives
How consumers use technology and the impact it has on their lives
 
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
Updated! -- #AIIM16 keynote -- Why the H**** Should You Care About Informatio...
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
 
The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?The Internet of Things and Future Shock: Too Much Change Too Fast?
The Internet of Things and Future Shock: Too Much Change Too Fast?
 

Andere mochten auch

การตั้งค่า Windows เบื้องต้น
การตั้งค่า Windows เบื้องต้นการตั้งค่า Windows เบื้องต้น
การตั้งค่า Windows เบื้องต้นOngarj Ritthongpitak
 
จุดเน้นที่ 9
จุดเน้นที่ 9จุดเน้นที่ 9
จุดเน้นที่ 9Suwakhon Phus
 
จุดเน้นที่ 3
จุดเน้นที่ 3จุดเน้นที่ 3
จุดเน้นที่ 3Suwakhon Phus
 
จุดเน้นที่ 7
จุดเน้นที่ 7จุดเน้นที่ 7
จุดเน้นที่ 7Suwakhon Phus
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012jerryjustice
 
จุดเน้นที่ 8
จุดเน้นที่ 8จุดเน้นที่ 8
จุดเน้นที่ 8Suwakhon Phus
 
จุดเน้นที่ 2
จุดเน้นที่ 2จุดเน้นที่ 2
จุดเน้นที่ 2Suwakhon Phus
 
จุดเน้นที่ 1
จุดเน้นที่ 1จุดเน้นที่ 1
จุดเน้นที่ 1Suwakhon Phus
 
จุดเน้นที่ 4
จุดเน้นที่ 4จุดเน้นที่ 4
จุดเน้นที่ 4Suwakhon Phus
 
จุดเน้นที่ 6
จุดเน้นที่ 6จุดเน้นที่ 6
จุดเน้นที่ 6Suwakhon Phus
 
Model model+pembelajaran+tiaw
Model model+pembelajaran+tiawModel model+pembelajaran+tiaw
Model model+pembelajaran+tiawAhow Lowcostsmile
 
HYPOTHYROIDISM.& MYXEDEMA CRISIS
HYPOTHYROIDISM.& MYXEDEMA CRISISHYPOTHYROIDISM.& MYXEDEMA CRISIS
HYPOTHYROIDISM.& MYXEDEMA CRISISDr.sajid Nomani
 

Andere mochten auch (14)

การตั้งค่า Windows เบื้องต้น
การตั้งค่า Windows เบื้องต้นการตั้งค่า Windows เบื้องต้น
การตั้งค่า Windows เบื้องต้น
 
จุดเน้นที่ 9
จุดเน้นที่ 9จุดเน้นที่ 9
จุดเน้นที่ 9
 
จุดเน้นที่ 3
จุดเน้นที่ 3จุดเน้นที่ 3
จุดเน้นที่ 3
 
จุดเน้นที่ 7
จุดเน้นที่ 7จุดเน้นที่ 7
จุดเน้นที่ 7
 
IMA Meeting 03222012
IMA Meeting 03222012IMA Meeting 03222012
IMA Meeting 03222012
 
จุดเน้นที่ 8
จุดเน้นที่ 8จุดเน้นที่ 8
จุดเน้นที่ 8
 
จุดเน้นที่ 2
จุดเน้นที่ 2จุดเน้นที่ 2
จุดเน้นที่ 2
 
จุดเน้นที่ 1
จุดเน้นที่ 1จุดเน้นที่ 1
จุดเน้นที่ 1
 
จุดเน้นที่ 4
จุดเน้นที่ 4จุดเน้นที่ 4
จุดเน้นที่ 4
 
จุดเน้นที่ 6
จุดเน้นที่ 6จุดเน้นที่ 6
จุดเน้นที่ 6
 
Model model+pembelajaran+tiaw
Model model+pembelajaran+tiawModel model+pembelajaran+tiaw
Model model+pembelajaran+tiaw
 
Cough.accp
Cough.accpCough.accp
Cough.accp
 
Transfusion therapy
Transfusion therapyTransfusion therapy
Transfusion therapy
 
HYPOTHYROIDISM.& MYXEDEMA CRISIS
HYPOTHYROIDISM.& MYXEDEMA CRISISHYPOTHYROIDISM.& MYXEDEMA CRISIS
HYPOTHYROIDISM.& MYXEDEMA CRISIS
 

Ähnlich wie Oscpa sept 2013

Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?Nicole Aidney
 
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile DevicesA Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile DevicesYael Garten
 
Law Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig RispinLaw Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig RispinCraig Rispin
 
Shoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet, a Spredfast Company
 
Big Data
Big DataBig Data
Big DataBBDO
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-dataglittaz
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013Brian Crotty
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementVelrada
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business
 
Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution gngeorge
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Diego Oppenheimer
 
Internetofthings - A review
Internetofthings - A reviewInternetofthings - A review
Internetofthings - A reviewGrabOn
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World SpeaksSimplify360
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsEDR
 
Emerging web technologies 2014
Emerging web technologies 2014Emerging web technologies 2014
Emerging web technologies 2014bthat
 

Ähnlich wie Oscpa sept 2013 (20)

Big data - What is It?
Big data - What is It?Big data - What is It?
Big data - What is It?
 
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile DevicesA Perspective from the intersection Data Science, Mobility, and Mobile Devices
A Perspective from the intersection Data Science, Mobility, and Mobile Devices
 
Law Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig RispinLaw Australasia Bali Conference - Craig Rispin
Law Australasia Bali Conference - Craig Rispin
 
Shoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing SummitShoutlet and IBM's Executive Social Marketing Summit
Shoutlet and IBM's Executive Social Marketing Summit
 
Big Data
Big DataBig Data
Big Data
 
141900791 big-data
141900791 big-data141900791 big-data
141900791 big-data
 
BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013BBDO Proximity: Big-data May 2013
BBDO Proximity: Big-data May 2013
 
The top trends changing the landscape of Information Management
The top trends changing the landscape of Information ManagementThe top trends changing the landscape of Information Management
The top trends changing the landscape of Information Management
 
Big Data - CRM's Promise Land
Big Data - CRM's Promise LandBig Data - CRM's Promise Land
Big Data - CRM's Promise Land
 
Data science
Data scienceData science
Data science
 
Superfast Business - Technology Trends for Business
Superfast Business - Technology Trends for BusinessSuperfast Business - Technology Trends for Business
Superfast Business - Technology Trends for Business
 
Datascience
DatascienceDatascience
Datascience
 
GITA April 2015 Newsletter
GITA April 2015 NewsletterGITA April 2015 Newsletter
GITA April 2015 Newsletter
 
Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution Notes from the Observation Deck // A Data Revolution
Notes from the Observation Deck // A Data Revolution
 
Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"Algorithm Marketplace and the new "Algorithm Economy"
Algorithm Marketplace and the new "Algorithm Economy"
 
Internetofthings - A review
Internetofthings - A reviewInternetofthings - A review
Internetofthings - A review
 
Internet of Things: The World Speaks
Internet of Things: The World SpeaksInternet of Things: The World Speaks
Internet of Things: The World Speaks
 
How Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property AssessmentsHow Technology is Revolutionizing Property Assessments
How Technology is Revolutionizing Property Assessments
 
Emerging web technologies 2014
Emerging web technologies 2014Emerging web technologies 2014
Emerging web technologies 2014
 
Iot ppt
Iot pptIot ppt
Iot ppt
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Oscpa sept 2013

  • 1. Tech Trends 2013: Cloudy with constant change Jerry Justice, MCSA, MCSE JJustice@ssandg.com Rhonda Miller, CPA. CITP RMiller@ssandg.com
  • 2. Five Technology Trends • • • Five Questions Two Threads One Challenge • • Accounting in the Cloud Q&A
  • 3. Question: How many of you directly influence the technology used in your firm/company today? Answer: You all do, knowingly or not • Internal – influence colleagues, staff and clients • External - personal use choices People “read” your technology level as you interact
  • 4. Tech Trend #1 1. Consumerization • What it is • The value to business • iPad, YouTube (evolved into business) • Still evolving – (Dropbox for Business) • “Free” • Business adds variables • • • • Compliance Security Risk Scope / Scale
  • 5. Question: How many cloud-based apps do you use today (business or personal)? Answer: Many (for many years) • Bank Account, Credit Card • Email, LinkedIn, Skype (Lync), Box, Zillow, Flipboard, Spotify, Tango, Connect, Kindle
  • 6. Tech Trend #2 2. Cloud Computing • Been around for a long time but evolving • Continues to be a transformative force for us and our clients • Office 365, Xero, Bill.com, Mint • Changed delivery expectations • collaborative, elastic, mobile • Less transactional, more dynamic • Many forms - private, public, hybrid • "apples to oranges", must do homework • Cost is only one decision point
  • 7. lntacct v PRODUCTS BLOGI "YOUR BUSINESS v CUSTOMER SUCCESSES mint v SERVICE AND Sl Your financial life, all in one place ~~.... te W. ,..u.n _. fiuanol_....0 ..... pb« s.t. ~ cndt...,. _ , udtlo...,... ,,., C1W01e, ior IIW! Wak.h lw •Mn Vldto .. your pan~ls ~itb Makes your life easier fwture. Al.Nmt. wt ~be.. Dl0D41')'•tor tn.-ana. So .-.em..a.b~thu:la •lmrl• u4 •uwmlin«<. Sl,p up W... ._ dua 6•~ aWn.-. 'Tha1 Mint auloao~tic;Uh pul1a. &11 vtl.t &n..ncW inb~"~JUtioa into t'lll'l! .laf'f'l,•tlllt•l mn ;n..lh,..CI.ror.ntn.rftctut'l'. lfs time to see the whole financial picture. WATCH VIDEO > • Online File Sharing Security Leadership in the Cloud Box lets you store al of your content online. so you can access. manage and share it from anywhere Integrate Box with Google Apps and Salesforce and access Box on mobile devk;es leam More Box pioneered a new level of content management security with role-based access controls 99 9% uptime guarantee. and high-grade SSL encryption on transit and 256-bit AES encryption at rest Box has also been issued an SSAE 16 Type II report • Watch Video • leam More
  • 8. Office for business QuickBooks Online Works Wherever You Are . #1 in cloud accounting for small busmesst . Organize your business all in one place . iPad , iPhone, Android apps or the web Start Now fot FREE FREE for 30 days - no credit card required
  • 9. COMPUTERWORLD Topics - Applications App Oevelopmenl Big oa:a Emergong TeChnolOgieS Busmess lnleUIQI!nce/Ailalytics Enterpnse Areh:tedure ERP content/Ooan Open Source Reg Unified Commumcnbons Home Appkabcna News Backlash begins against Adobe's subscription-only plan Petrtton on Change org asks company to reconstder, collects 4 400 stgnatures 10 four days By Gregg Keizet ''-v 10. 2013 oe 48 »I ET 0 C... p1 t~rw 1r' A pebt1on on Change org demanding that Adobe back away from its subscriptiol'l-Only model for its creativity software, including Photoshop, has collected over 4,400 s1gnatures by late Thursday . - ~ · in lome P·dl= l~':t .•.rl J t: ' niPr~,· ~ ~ Cloud-Powered Businesses riiii1..tm Discussions MlrT·bon; tlromotO'I£ .ob~ S001rth "bra Is It ok for your accountanlltooXkeeper to take commiSSions on c.oucl accoonhng softwa1e? Almost every COfllllll1)' seDing doud accoun6ng soflwatc pats cornmilSions lo accounlanl9 and bookk~pers but it i$ nol always disclosed Some ildu~try experts suth as Matlheir Addi.3on from tne lnslllute of Cenllled Bootteepers (see post) are concerned acall.litlng professJonals will recommend ~ccoun:lng softw.u o to dian!& basad on personal benof~ ralhor th.an !he bosl fit for the busineM. Beneltscan eilher be a percentag~ of the retaft pnce or fret' use of ~ftware for a m• nlmum nurnller of 964es Comni~sions !lave been around for at least 13 ye-ss thouqh Are1hei recllv o prDbiem? lJO.t.fJ 91?iLlo...1T L:Il1 ~•tt.com a• l.Jie t;:1 Comnenl
  • 10. Question: How many mobile devices does the average person carry (2013)? How many do you have? note: your smartphone today has more compute power than all of NASA in 1969 when it sent two astronauts to the moon
  • 12. Tech Trend #3 3. Mobility • Smartphones • Phablets • Hybrids • Simple access to high value information • Growth of information aggregation platforms that are mobile oriented • Compliments Cloud computing • “real estate” matters • Form / Function varies by device
  • 13. LAPTOPS DESKTOPS TABLETS PHONES SOFlWARE CAMERAS ' ' I Samsung Galaxy Note II Tops 5 Million in Sales Samsung is celebratwg worldide sales of more than 5 million GalaX} Note TI d~icesjust t>1o months after its release. The electronics giant announced the milestone in a translated news release less t:haJ130 days after the South Korean company reported selling 3 million of the super-sized smartphones. A s=ung opokcowoman eonfL"l11ed in an email that the Galaxy Note H has ~urpassed 5 million in sales since its debut i n late September, adding that the original Galaxy Note took about five months to reach 5 million in global sales. lbE Note 11 is now on sale in all regions, the release said, including ~ia, Europe, North America, South America, the Middle East, and Africa. The ~ice, which boasts a .>-s-ineh, 1,28o-i:J>-72o-pixel display is a·ailable on all major U.S. carriers - Verizon Wueless,ATI':T, Sprint, T-Mobile, and U.S. Cellular, and runs on Goog]e's Android 4 .1.1 Jelly Bean operating system. For 5299, cu..<tomerz also snag a 1.6GH z, quad-core Exyltos processor, cplimized for LTE networl.:s, as 11ell cs 2GB of RAM and
  • 14. Hybrids • • • • Touch Oriented Multiple form factors Windows 8, Android Blended Apps HP EllteBook Revolve Overview Features ....un,...,...UI.tiiY . . . . . Specs -
  • 15. Question: So what does one do with all these devices?
  • 16. Tech Trend #4 4. BYOD (Bring Your Own Device) • • • • • Approaches vary widely Mobile policies for “rules of the road” Balance business value with risks Data sharing - just because you can, doesn’t mean you should What has worked for our firm • Smartphones / Tablets • Remote desktops
  • 17. Question: Should I have concern over all the information I put (or is gathered) in the “cloud”? Answer: Yes, you do need to be aware.
  • 18. Tech Trend #5 5. Social (and other information use) • Business value (CRM, LinkedIn, Twitter) • Aggregators / Data mining • Marketing & Customer Insights • BIG DATA (data about data) • Search - “profiles” you • Information use concerns (NSA, IRS, Google) • What is tracked/collected • How it is used • Who has access (legally / illegally) • How long data lives • Manage your “footprint”
  • 19. ~ DIGITAL TRENDS Lojn Jqnup 168K 73 ' 2"1 r, THE IRS MAY BE SNOOPING THROUGH FACEBOOK AND TWITTER TO NAB TAX EVADERS msn~ ~ Franes 11M us _,..,. .. news Aprj 17 201 J S7 f /1 8 6 Cl 6 crime & justice world science & tech pop culture B MOSTCOMMENTEDST( NSA: Inside the agency that Is a Cat IR1o,.< Til> ooomn~ o ~<tne% iY1d tmerq1nq eUliiCS of tn~ a ClliJKtle lle p!OWGI Old &(Stem Twrtler iyll~ bro, and 11 MoM.-.'s R~ Room s gone, bt.i t ltvP~ ~n 11 a Fa<»><>de< t<><tng a 11t1lfh"'' 1•21U• til re111110 YOU Will • a lnslagram The diclalor's <h"'ce' l lo ~ocg~ m9dia 1 "-'ls us ~ 0 6/9/13 I By K.mberly Dozter of Assoctated PrEss SHARE 414 0 TWEET 19 0 'iii' EMAIL The notoriously secretive National Security Agency became a little more familiar to Aner:cans after revelations that it collected U.S. phone customers' data. ~
  • 20. ICPA) Insights" • Planntng Strate!!"''~ 1 n Wak~ nf thE' New 'I R% M<>d1~arP Surt;ox I Ma1n I National MAP Sur1ey P rovides Insight to CPA Rrms • "Big Data" Presents Big Opportunities for Firms and CFOs It is drfficu lt to ignore the tremendous growth in information technology tllat llas been occurring over the last few years ar business. Technolog at a volume and pre' social m edic sites, "' August 5, 2013 profiles and purchas• COW COVERAGE Akron Beaco n Journal Online I Ryan l ewis I Aug u s t 1, 2013 Bridgestone Invitational: Big Data Comes to PGA Tour in Big Way; Numbers Show Fans the Way at Firestone C.C. This article highlights the advantage of the PGA Tour's big data franchise, Shotlink, a sophisticated data analytical system that tracks each shot and several different statistics at each course and event. For five years, Tour players and caddies have had access to the mapping and statistical recording of every course and tournament on the Tour, thanks to Shotlink and COW, which powers the technology as the Tour's official technology partner.
  • 21. t guardian Yours~ News US ·world Sports Comment Culture Business Money Environment Science News World news New York New York woman visited by police after researching pressure cookers online Long Island resident sa1d her web search history and 'trying to learn how to cook lenUis' prompted a v1srt from authontres but pollee say search was prompted by t1poff +1 fmst1¥e Email Adam Gabbatt In New York The Guard1an, Thursday 1 Auoust2013 16 59 EDT ~ Jump to comments (897) rJ Spouses of mamed people wllo •ke Ashley Madison '"'"" 1 - 1 1 1 IUJl'H{ Till~ UA.AOI [mpiDyc.r 'What the heU IS QUIRoa?" poliCe asked when Catalano's husband told II pressure cookers were used for mille.- household A NPw Ynrlc wn~n ~v<: hPr tlm1lv'<: mtPrP<:t 1n thP mlrrh;;~<:P il. Q .,
  • 22. The convergence thread Consumerization, Cloud, Mobile, BYOD and Social trends… • Are interrelated • Have dependencies • Compliment one another • Where they converge = greatest value
  • 23. The security thread Consumerization, Cloud, Mobile, BYOD and Social trends… • All impact security • Create a larger security “footprint” • Have less direct control • Access from anywhere (pro/con) • Increases risks (& opportunities) • Blur lines between professional & personal • Be aware AND participate • Ex – two step for cloud properties like LinkedIn “Efficiency and security are separate targets”
  • 24. Ill lnfoWortd Home I Securrty I News I AP Twltter hack prompts fresh look at cyber.. APRIL 24, 20t3 AP Twitter ltack pro111pts fresltlo cyber sec11rity 11eeds Two-step identity verification and analysis of user prevent attacks such as the hack on the AP's security e.'-'J)erts say Ifill ln foW0£1d Home / lnfoWorld Tech Watch I Know thy cyber enemy: Who's attacking and... By Zach Miners IDG News Service IEb Print INFOWORLD TECH WATCH APRIL2t, 2013 Getting hacked on Twitter is fast becomtng a rite of passage for big corporation attack on the Assodated Press could be a tipping point and shows lhat social r more to keep !heir users safe, security experts said Wider use of two-faclor authentication, which can involve an access code bein! secon d device such as a smartphone, is one possible solution. Such a mechan introduced selectively, some experts said, for high profHe accounts such as cel1 corporations. KI1ow tl1y cyber ene111y: 'W11o 's attacking ru1d what tl1ey want . Verizon security study shows most attacks made b y ex1:ernal parties, primarily based in China and Romania, using wi de variety of threat actions By Ted Samson l lnfoWorld £l Follow @tsamson_IW ~ Print l1 uke China and Romanta spawned the most cyber attacks last year according to an in-depth study released ttus week by Vertzon Notably, whereas Romanian attackers were primanly prowling for financial data to score a big payday, Chinese perpetrators were engaged in esptonage focused on swiping trade secrets and Internal data Much of the responsibility for successful data breaches ln 2012, however, can be pinned on IT's long-standing nemesis: single-factor authentication. Seventysix. percent of networ1< intrusi.ons in 2012 exploited weak or stolen credentials.
  • 25. One Challenge: To effectively leverage these 5 trends.
  • 27. The neV generation thinks and coininunicates differently.
  • 28. Definition of "Cloud Computing" A model for delivering information technology services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as an electronic device has access to the web. Definition from lnvestopedia.com
  • 29. Benefits of Cloud Accounting Services  No upfront cost  No servers or programs to maintain including upgrades  Access to accounting information anywhere  View bank account and credit card balances in one place  Integration with banks to get daily bank feeds  Integration with other business systems  Real time collaboration with your clients  Exchange data and documents faster and easier  Security of data and regular backups  More time for value added services
  • 30. 2 Cloud Options  Data Hosting  On-line Accounting Products
  • 31. Data Hosting • Data Hosting (Such as Right Networks) - The Hosting center houses your applications and data on their network - Value - they worry about data so you can concentrate on your clients • Maintain the systems • Back up the data • Apply server updates • Security testing I firewalls Right Netw rks
  • 32. On-Line Services Their platform - their software and servers. We pay a subscription to use their product. • Examples: - Xero - lntacct - QuickBooks Online (Harmony) - FreshBooks r, lntacct FR BOOKS cloud accounting
  • 33. C0llaboration  The importance – – The data is sorted, standardized, analyzed and reported in real-time therefore, you are able to focus on a different set of more high-value priorities. • Explain the numbers instead of just reporting them • Identifying opportunities in addition to ensuring compliance • strategize for the future rather than just review the past  Various Collaboration Tools – E-mail, IM, Skype, Built-In options
  • 34. Integration  Integration is an important factor when choosing the accounting product  Create efficiencies – It can eliminate duplicate data entry and minimize conflicting versions of the same data when the various systems you use integrate – CRM, – It can add so much more capabilities to an accounting system than what is built in to the program.  Caution: The is a need to evaluate if the add-on integration will be around for a while. – If it’s an add on product that your business will depend on, you don’t want to that integration to cease working. – (for example if the accounting software decides to disable the integration or the Add On product goes belly up.)
  • 35. Integration  2 things to evaluate when reviewing an accounting program in regards to Integration: – API: Does the software have an API (Application Programming Interface), which is a way for software developers and advanced users to interact with the software’s data via custom applications? – Number of add-ons: How many public add-ons does the software have?
  • 36. Other Examples of Web Based Applications  Tax – GoSystemTax RS, ProSystem fx Tax (Saas)  Financial Statement – Xero, FreshBooks  ERP – Intacct, QuickBooks On-line  Workflow – SurePrep, GruntWorx  Audit Confirmation – Capital Confirmation  Customer Relationship Management (CRM) – NetSuite, Sage CRM  Document Management – GoFileRoom, Smart Vault Journal of Accountancy October 2010, Cloud Computing: What accountants Need to Know
  • 37. Security and Reliability Considerations # 1 Concern Is your data safe / secure?
  • 38. Security and Reliability Considerations, con’t  SOC Compliant Be sure the Vendor is using a data center that an AICPA Service Organization Controls Report (SOC), formerly known as a SAS 70 report. SOC2 / SSAE-16  Other Factors – Where is my data being hosted – Who has access Journal of Accountancy “What Accountants Need to Know”
  • 39. SOC Controls Tested – – – – – Infrastructure - hardware Software - programs and operating software People - users Procedures - automated and manual Data - transaction streams, files, databases and tables
  • 40. Accounting in the Cloud Factors  Evaluate – What cloud options make sense for your company? • Data Hosting, On-Line Services, Private Cloud. o Hint: It may be a hybrid approach where some services are utilized in a data hosting arena and others are purely on-line. – Value Add • Think of the value add you can bring to your clients when the data entry is minimized and the date is centralized.  Do your homework – Research the products for fit – Research the reliability and security.
  • 41. MY ~E~o~,- CoNE5 ,-o ,.HE CoNCLUSioN ,-HA,- CLout> ,-ECHNoLoGY 15 of No use ,.HIS CONI>ANY. I'LL- UI>LoAt> 1,- ,-o b~OI> Bo>< 5o you CAN ,.A<E A LooK A,. 1,-. ,.0 )
  • 42. Contact Info: Jerry Justice, MCSA, MCSE JJustice@ssandg.com Rhonda Miller, CPA. CITP RMiller@ssandg.com