Technology and Tools for Accounting Professionals

Joanie Mann Bunny FeetTechnology and Tools for Accounting Professionals

old_school_ledgerThere was a time not so long ago when accounting professionals focused more on tabulation and summarizing of information than on analysis.  Accounting for businesses, in particular, required collecting myriad papers and receipts and other transaction documents, summarizing the information, translating it into journal entries, and finally posting those numbers to the big bound book which represented the business general ledger.  With the work required to gather and enter all of the information, professionals necessarily focused their efforts on making the process as efficient as possible by attempting to structure the workflow and manage the paper.

When those efforts are compared to today’s approach which involves digital documents, intelligent data collection tools, automated workflow solutions, online accounting and data analysis, it is clear that the processes for accounting for business activities have not really become simpler.  In fact, much of the enabling technology has served to complicate certain processes, which drives users to find even more “solutions” to address these new problems.  It (IT) is a bit like the Wonka Everlasting Gobstopper, which never gets finished and never gets smaller.  IT simply changes things – regularly and often.

Back then – before the Internet and digital imaging, or even Personal Computers – high technology wasn’t the focus because it didn’t exist in the realm of business in general.  I suppose you could call business solutions at that time “low” technology, where mainly mechanical solutions were introduced to address various business problems.

old_school_filecabinet

As an example, prior to the advent of digital imaging and electronic documents, one of the primary requirements of the business was to organize and store paper documents.  Over time, a wide variety of filing, foldering and labeling solutions have been developed, all oriented towards making the storage and later retrieval of paper documents easier.  For some businesses, letting go of the paper is a hard thing to do.  Years and years of training in keeping paper files has left many business owners and managers wary of working without physical paper documents.  Investments in office space, filing cabinets, storage folders and personnel to organize, file and retrieve all of the documents is only a partial measurement of the cost of managing paper, and large numbers of businesses continue to operate in this manner.

old_school_desk

The technology applied to processing the work has also changed, in many ways even more dramatically than the technology applied to collecting and storing the information.  Take the simple processes of tabulation (to arrange in tabular form; condense and list) and summing (adding up) information, for example.  Previous generations didn’t have computers and spreadsheet software to perform the work.  Rather, individuals would painstakingly handwrite each transaction entry into a ledger or on a columnar worksheet, and would then have to manually add each column and then cross check footer totals to ensure accuracy.  Back then, the machines used to perform the addition/subtraction were mechanical devices and could not perform multiplication or division.   These adding machines were first hand-cranked devices, later replaced with shiny new electrical ones (weighing approximately 20 lbs each).

old_school_telephone

Even voice communications have changed dramatically over the years.  Many people don’t remember a time when having multiple phone lines in the business meant having multiple telephones, and the concept of a PBX (Private Branch eXchange) didn’t exist.  Every phone would be hard-wired to an incoming line; if you wanted to answer a call, you had to use the right phone.  This became difficult in an office with many people, so solutions such as the “fabulous extendo-phone” was invented to allow anyone in the office to access the phone from their desk.

The technology available to businesses today is astounding, and offers amazing potential and benefit.  On the other hand, technology rarely (truly) makes things simple or easy – it more frequently serves to shelter certain users from the complexity while delivering new workloads and concerns to others.  It’s rather like energy – it isn’t created or destroyed, it just changes form [law of conservation of energy].  Business is like that, particularly where information technology is involved.  The underlying requirement doesn’t go away, just like a business’s requirement to account for financial transactions and activities,  and the need for the business to capture and retain documents isn’t changed.  How the process is managed, and which tools or mechanisms are applied to the task is what changes.

Make Sense?

J

onewrite-accountant_apparatusOne-Write System Revolutionizes Accounting.  These guys had the right idea, they just didn’t have the cloud.

Cloud IT: Hiding Complexity and Risk

jmbunnyfeet

Cloud IT: Hiding Complexity and Risk

Cloud computing and Internet technologies have delivered previously unimagined capability for even the smallest of businesses – capability to compete, build brand recognition, and reach markets in remote geographies.  The mantra for businesses used to be “location, location, location”, but it’s become connectivity – perhaps even more than location – which now delivers business opportunity.  As technology has evolved, allowing businesses and consumers to connect regardless of time or place, the complexity of the systems and networks have also increased dramatically.  Where a business could once easily identify their various vendors or business service providers, the identification of those involved in the service ‘delivery chain’ are no longer so easily recognized.   Among the benefits of cloud computing technologies is the ability to reach beyond traditional boundaries.  The risk for many businesses is in not fully understanding how, and with whom, those boundaries are being crossed.

For many an enterprise, the convenience and efficiency introduced with cloud computing models overshadows the increased risk potential.  Service level agreements and vendor contracts are assumed to be sufficient to protect the business and its information assets, yet recent events (such as the recent reveals of PRISM and the actions of the National Security Agency) should cause businesses to look a little deeper at their entire provider network.  It’s not that the average business should be concerned about government snooping of their emails, but they should be aware of who has access to their systems and data, and which entities are responsible for which parts of the system.  It’s only prudent to know the details, and it is the best first step to mitigate business risk.

Enterprise Clouds are complex, sophisticated entities which invariably rely on a daisy-chain of third parties and contractors to help build, run and maintain their Cloud provider’s systems. The organizational and technical complexities are additive, resulting in increased systemic risk. Systemic risk is the least visible and hardest to eliminate, and those risks become real when the providers’ systemic risks become [yours].

The question is, how well does your Cloud provider manage the ecosystem of contractors and third parties that are farther down the food chain? This is even more relevant in the globalized workforce, where, paradoxically, Cloud and related technologies have greatly facilitated the outsourcing and offshoring of work to low-cost countrieshttp://www3.cfo.com/article/2013/6/data-security_prism-national-security-agency-edward-snowden-cloud-implications-vendor-management

Before executing a service agreement with an outsourced provider, make certain that the details of facility, connectivity, network, equipment, and other elements of the delivery and system are spelled out.  Business subscribers should know where the various points of failure exist, and which company is responsible for dealing with each.  If a carrier fails and connectivity to the data center is lost, the hosting service provider may be powerless to impact the situation, even though access to service is part of the SLA and requirement.  If a hosted software product has a vulnerability or fails to perform, the developer of the product is likely responsible, rather than a hosting service provider.  The point is that there are often multiple players in the delivery chain, and customers should be aware of this reality prior to engaging with the service.

Ultimately, the business with mission critical data in the possession of a 3rd party service provider should have a healthy helping of doubt as to whether the provider has full control over their environment.  Business owners, managers and CFOs should recognize the increased necessity of evaluating risk within their provider systems and in provider/vendor relationships, to keep trade secrets secret and prevent intellectual property from becoming the property of others.

Joanie Mann Bunny Feet

Make Sense?

J

Cloud Computing and Online Accounting for All? Some Markets Are Still Waiting for Broadband

Cloud Computing and Online Accounting for All? Some Markets Are Still Waiting on Broadband

As the information technology industry espouses the benefits of the “paradigm shift” in computing and the move to cloud computing platforms and models, there are folks out there in the world who just aren’t seeing it happen like that.  Not everybody’s working online. For many, the Internet and online working models simply haven’t intruded into their lives and businesses as it has for others.  While this may be partially rooted in conservative mentalities and beliefs which are resistant to change, the more likely reality is that options for high-quality and affordable broadband service is simply not available to them.  Without choices for affordable and useful connectivity to the Internet, online just doesn’t have the attraction it does for those who are “connected”.

When businesses look at cloud solutions and the Internet dependency that comes along with them, having more than one connection to the outside world becomes the imperative rather than a luxury.  Unfortunately, some markets are still waiting for broadband (or have very limited options for service), rendering the cloud nearly unreachable.

It may come as a surprise to some, particularly to those in East and West coastal regions, that high speed broadband just isn’t as available in other zones.  In fact, the *National Broadband Map clearly reveals limited availability and choice in numerous regions of the US.  Broadband Internet access is a necessity to support the IT industry’s shift from localized IT to “cloud” IT.  But the shift is only evident to those who are involved in it or who have that option.  For those who the industry is beginning to refer to as the technology “have-nots”, this lack of available and affordable access will ultimately create more than simply an inability to participate in broadband-reliant IT solutions.  The fast pace of innovation and evolution in IT almost guarantees that the technology have-nots will fall even further behind, possibly to the point of not being able to catch up.

 “A Growing Gap Between IT Haves, Have-Nots. There will be a growing gap between the IT haves and have-nots in 2013. The latter will fall behind the former on a wide range of business technology fronts such as mobile, cloud, social, virtualization, and analytics…” 7 SMB Technology Predictions for 2013 | InformationWeek.com

As business (and personal) technology models continue to evolve, and as new solutions and services begin to displace the old, those who remain disconnected will begin to directly experience much more impact.

Consider something as simple as using QuickBooks desktop software for small business bookkeeping.  As Intuit continues to remove elements from the installed software product, turning them into web services instead, customers with limited or no broadband access will find themselves without the features and functionality they need in the software.  And the only possibly comparable alternatives to QuickBooks desktop accounting products are Internet-based alternatives, making them not really alternative options at all.

It is also likely that lack of sufficient broadband is one of the factors motivating many solution providers to seek clients in other markets – outside of the United States, and in regions where broadband availability is more prevalent and service speed and quality is higher.  Yes, it’s true.  The United States is not the leader in broadband availability, or even in quality.

“For many people, their broadband connections are their lifelines. So what is the state of broadband in the U.S.? Well, when it comes to speed and price and adoption, we’re certainly not a leader — “middling” is a better way to describe our position.

Currently 119 million people that live in the U.S. don’t have broadband connections (for many reasons, including not wanting it or not being able to afford it) while 19 million don’t even have the option to get it. Our rate of broadband adoption (62 percent) lags behind countries such as South Korea, the U.K.,and Germany, according this year’s Federal Communication Commission report. (We’re closer to the penetration rates to Japan, Finland, and Canada.) These numbers are not likely to change soon, given that broadband growth is slowing and providers are moving away from wireline infrastructure. “ GIGAOM:The state of broadband in the U.S. [infographic]

Accountants and other professional service providers serving clients in regions lacking sufficient choices for access must recognize that their approaches to doing business will not necessarily match their peers in more fully connected areas.  Certainly, accounting and legal professionals are dealing with this reality as practice coaches and industry leaders push for IT- and cloud-enabled models for improving practice performance and creating differentiation, even as their proven applications and business solutions morph into or are replaced with SaaS applications and online service.

The take away from this is that there are still large numbers of businesses and individuals doing things with legacy tools, managing spreadsheets on standalone PCs, or writing with pens and using paper – even in areas where broadband access is plentiful.  Regardless of how forward moving the rest of the world may be there remains a need to provide service and support these IT have-nots.  Perhaps this becomes a means for differentiation, finding ways to work with businesses who are connected and those who are not, and leveraging the firm’s access and capability to deliver what the client cannot obtain directly.

Make Sense?

J

*The National Broadband Map is a tool to search, analyze and map broadband availability across the United States

Accounting Professionals, Software as Service, and DIY

Joanie Mann Bunny Feet

The question begs to be asked “how did we get here?” (with “here” being the current state of information technology and the accounting industry). There is confusion in the market; there is still significant debate as to the underlying value of Internet technologies and online application services, and the “managed enterprise approach” has yet to return the benefit and cost-efficiency that is expected.

The accounting industry is experiencing continued change, and understanding the progression of events and technology developments can provide significant insight into where the industry is today and where it will likely be tomorrow. Most professional accounting firms recognize the need to implement technology and solutions that will help the firm and its clients compete in today’s market. Understanding the options available and imperatives that drive the need is key to making the right choices

Technology to manage general business and financial processes has evolved tremendously in the past 20 years, and history clearly reveals that those who have successfully adopted such technologies have done so in stages. Bridge technologies and services (which I fondly refer to as “tweeners”, like cloud hosting of legacy applications) provide a means for safe and low-risk adoption of online working models and managed IT services.

Application hosting solutions have achieved a high level of acceptance in the market, and these are the services that have assisted in garnering online users for the purely Web-based (SaaS and cloud) applications. Providers delivering their “legacy” applications using terminal servers, Quest, Citrix and similar technologies offer the full capability of the Windows application along with the rich Windows interface, as well as the benefits of ASP service and Internet accessibility similar to the Web- app (e.g., the “software as a service” model). This familiarity in functionality and presentation has made adoption of hosted deliveries of these applications a harmless and often seamless transition from localized IT models.

Once a business has adjusted to working online and outsourcing the management of the general IT service, taking the step towards a “true” SaaS solution is much less of a step.

However, trends in the software industry indicate that the concept of “software as a service” has been taken several steps beyond simply providing online access to applications, and are offering outsourced support and finished product deliverables rather than just the software application. For example – an accounting professional may obtain a “finished client tax return” rather than simply purchasing the tax preparation software.

For many emerging Web-based applications, this is the positioning and model which is selected to bolster adoption of the solution.  There has been a great deal of success in offering business users access to a solution, and then providing the actual business service behind it as users find it easier and more efficient than doing the work themselves. This activity has focused on the direct customer and consuming market, where business applications are not sold separately, but as a function of getting the business process facilitated. CRM and helpdesk services are frequently offered this way, as are HR administration and payroll services. The technology has matured to a point where the outsourcer can facilitate the internal business process on behalf of a business fairly transparently, including business bookkeeping and accounting.

All of this serves to devalue the knowledge required to perform the business and accounting processes. There is a belief that has been marketed very well to the small business sector – “if you can write a check, then you can do your own books”. This concept has not proven as realistic as many would choose to believe. But it earned – and continues to earn –  market share. With the trend in software becoming the transparent outsourcing of the processes, is the consuming market likely to recognize the expertise required to manage the outcome?  Retail providers of accounting, tax preparation, and other services (H&R Block, as an example) have quite successfully marketed against the need for businesses to engage with a skilled credentialed professional.  Accounting professionals who do not view this as a threat to their value are simply not paying attention.

Today’s accounting professional must address the realities of Internet technologies, outsourcing, and retail or consumer-direct competition, and the potential impact it will have on the businesses (the client business as well as the professional practice). Recognizing that accountants (by trade) are not typically technologists, it is important to understand that involvement with the financial processes causes a necessary level of involvement with the technology, as well. Professionals who understand and embrace the appropriate use of technology and outsource models are the professionals who will continue to demonstrate their value and expertise to their client businesses and to the market.

With the industry generally moving towards an online, enabling model, those who do not embrace such technologies will rapidly find themselves attempting to compete. As the trend continues to devalue the backoffice processes by essentially hiding them from the consumer (the client business), the position of the accounting services provider is also devalued.

By embracing the technology/enabling model now, the professional service organization positions itself to function as seamlessly with the market as the online service. A clear example of such activity is the emergence of free e-filing of tax returns and the prevalence of low-cost do-it-yourself business bookkeeping and accounting solutions online. Reports indicate that there continues to be a marked decrease in the number of returns prepared by professional organizations as compared to the significant increase in volumes of online do-it-yourself return processing. This has clearly devalued the tax preparation service in the eyes of the consuming market, bringing it down to a level where price is the sole differentiation.

The solution is to fully “enable” the professional services organization, and provide the foundation for seamless delivery of services to the consumer. Once an online working model is adopted within the professional service organization, it gains the opportunity to change and reconstruct internal systems without concern for direct client impacts.

Just as the online application can render the computing platform irrelevant, so can the professional service delivery render the supporting applications irrelevant. This offers the professional service provider the flexibility and freedom to use or develop systems that create differentiation through the underlying process rather than forcing frequent change upon the client.

Make Sense?

Joanie Mann Bunny Feet

J

Have questions about hosting business applications (like QuickBooks)?Are you looking for help developing your IT-enabling model?  Need assistance convincing clients to use the cloud, or onboarding clients to cloud services?

We can help.

Cloud Computing Evolved: Disruptive Technology Goes Mainstream

jmbunnyfeetCloud Computing Evolved: Disruptive Technology Goes Mainstream

A 2010 information technology report by IDC (International Data Corporation, a global provider of market intelligence) provided a few interesting predictions for Information Technology in these changing times.  Not surprisingly, many of the predictions centered around the same “ingredients of IT industry transformation” which were identified in past years as being disruptive technologies including cloud computing, mobile devices and applications, wireless broadband, virtualized infrastructure, social networking, and smart devices being among those listed.  The subsequent 2011 report suggested a continuing trend of spending and innovation in cloud technologies and mobile computing and in collecting and analyzing the huge volumes of data being generated.  It is clear that cloud computing is evolving from being disruptive technology to mainstream IT.

Everyone must by now recognize the significant growth in use of online and mobile applications and services.  If you haven’t noticed that just about everyone has a smart phone or tablet computer, then you’ve got your head buried deep in the sand.  What this clearly indicates, and IDC supported the position with quantifiable evidence, is that the “disruptive technologies” of yesterday have transitioned from early adoption to mainstream adoption.   This means that use of these technologies had pushed “well beyond” the first 10 to 15% of the market through 2010, and that customers were ready to integrate these new solutions as core parts of their overall IT strategy.

If you don’t believe that cloud computing, virtualization, and mobile access are becoming (have become?) mainstream, consider the staggering number and variety of mobile devices and networks available today.  The adoption of these devices is driven by the availability of broadband wireless service, and their use is fueled by applications offering “social business” and “pervasive analytics”.  No longer limited as a voice communications device, the mobile phone has now become the mobile workstation, capable of supporting a wide variety of business and personal interactions and functions intended to help users generate and analyze “unprecedented volumes of information” – and the 2011 report indicates that mobile computing is continuing to fuel the trend.

“Mobility wins” will be the top theme of the year as mobile devices outship PCs by more than 2 to 1 and generate more revenue than PCs for the first time. 85 billion mobile apps will be downloaded, and mobile data network spending will exceed fixed data network spending for the first time.

IDC’s 2010 report placed an interesting focus on the impact of this new era of IT, believing that it would be a launchpad for  the creation of “intelligent industry” with an IT-enabled “intelligent economy”.  This doesn’t apply only to those very large multinational corporations, like the IBM commercials about a smarter planet and the commercials where the box tells us where it (and the delivery truck) is.  This new-found intelligence would allow businesses of all sizes to offer better and more customized services locally while dramatically expanding their market reach beyond geographic boundaries, and positioning themselves for accelerated growth.

As the number of intelligent communicating devices on the network will outnumber “traditional computing” devices by almost 2 to 1, the way people think about interacting with each other, and with devices on the network, will change. Look for the use of social networking to follow not just people but smart things.”

Business owners who find a way to leverage this new capability through innovative applications of cloud computing and mobile device access will almost certainly find that their businesses are better suited to addressing the needs of their current market, but are also poised to take advantage of emerging opportunities in emerging markets as well.

In 2010 IDC predicted that by 2012 we would begin to see the “slow death” of cloud computing – the term, not the technology model.  Even though cloud computing is one of the hottest buzzwords in tech today, the model is becoming mainstream to the point where it is no longer considered a bleeding-edge method of computing requiring its own descriptive name. While IDC may have been a bit off in terms of forecasting the slow death of “cloud” terminology, their finding that the evolution of cloud computing models is rapidly progressing from disruptive to mainstream appears to be spot on.

Joanie Mann Bunny FeetMake Sense?
J

updated from original post in 2010

Many Companies Are Negligent About SAP Security, Researchers Say – CIO.com

Is your hosting service provider helping to keep your critical business applications secure?  It is not enough to simply harden machine images and develop policy-driven access; application hosting providers need to understand the vulnerabilities introduced by each and every application in the environment.  Otherwise, the system could be exposed to threats directed specifically at the application environment and opportunities it presents.

Many hosting providers will offer customers service for any business application they have, and often provide those services with no significant experience or expertise in dealing with configuration or security issues specific to those applications or environments.  Consider the following report from IDC which indicates that numerous SAP deployments remain vulnerable to attack or intrusion, even though SAP has improved security of the products. The problem rests not exclusively with the SAP applications, but also with the approach to implementation of systems and security around those applications.  Understanding the various vulnerabilities introduced with SAP products is the first step to securing them.  Certainly a skilled IT solution provider is likely to offer a high level of service and capability, but there may be issues presented by various products (like SAP) which introduce additional or unique considerations, and it is important for the service provider to be aware of and address them.

Joanie Mann Bunny FeetMake Sense?

J

IDG News Service — SAP has significantly improved the security of its products over the past few years but many of its customers are negligent with their deployments, which exposes them to potential attacks that could cripple their businesses, according to security researchers.

The biggest issue is that companies expose insecure SAP services to the Internet — not only HTTP services, but also critical administrative interfaces, Alexander Polyakov, chief technology officer at ERPScan, a developer of security monitoring products for SAP systems, said Tuesday.

Between 5 percent and 10 percent of companies that use SAP products expose critical services to the Internet that shouldn’t be publicly accessible, Polyakov said. This happens because they want to enable remote management or because of improper configurations, he said.

Most of the services have vulnerabilities that can be easily attacked, Polyakov said.

Publicly available exploits exist for many SAP vulnerabilities, including some that are part of Metasploit, a popular security testing tool.

The percentage of companies with exposed SAP services differs from country to country. The situation is better in North America and Europe and worse in the Asia-Pacific region, Africa and Latin America, Polyakov said. However, even 5 percent translates to a very large number of companies, he said.

via Many Companies Are Negligent About SAP Security, Researchers Say – CIO.com.