PowerBI, Data Warehouses and Combining QuickBooks Enterprise Data with Other Data

Businesses of all types are looking for ways to discover more useful information hidden in their systems. With a desire to implement business intelligence tools such as Microsoft PowerBI, companies need the ability to combine and analyze data coming from a variety of sources. The data can help businesses inform their conclusions rather than leaving it up to “gut”, supporting decision making in all areas of the company.

The tools for exposing and combining data are many. Enterprise ETL (Extract/Transform/Load) products have been available for many years. When it comes to SMBs and the applications they utilize, the options aren’t quite as prevalent nor as powerful. In most cases, businesses are left to working with data exports and a bunch of linked Excel worksheets.

Noobeh understands that businesses need their data available for integration, analysis and reporting. Noobeh are experts in deploying SMB applications such as QuickBooks Enterprise desktop, Acctivate Inventory, Sage ERP, MISys Manufacturing and more, all on the Microsoft Azure platform, positioning the applications and their data perfectly for use in business analytics and data warehouses.

Data warehouses and data lakes are growing in popularity because there is simply too much disparate data present in any growing business to effectively analyze it one data silo at a time. The number and variety of data sources in a single small business can be far larger than the company realizes until it attempts to capture and report on that data.

Any approach to data warehousing should consider the potential number and variety of data sources involved. This is among the reasons for Noobeh electing to work with Microsoft Azure and PowerBI. The Azure platform provides the infrastructure services and platform tools to enable data connections needed, powering the data warehouse and exposing the data to PowerBI and other reporting and analysis tools.

Even QuickBooks Enterprise desktop data can be extracted into its own standalone data warehouse, connected to a broader data warehouse and then combined with other business data. When businesses can combine data from their various solutions, even those which may still be desktop-bound, the power of the information and intelligence contained in it can be revealed.

Whether the purpose is process improvement, performance monitoring, management reporting or combined operational intelligence, collecting and storing the data is the first step. Noobeh is there to help make it happen.

jm bunny feetMake sense?

J

A Hurricane and the Port Workers Strike Force Conversation About Business Resilience and Continuity

Hurricane Helene is one of the biggest storms to have hit the Gulf Coast in years. An analysis done by a scientist at Colorado State University, Helene was larger than almost every storm that has hit the gulf since 1988. Only Opal and Irma were bigger than Helene. The toll in life and property is not small, nor is the disruption of services. There are troubles enough getting help and supplies to impacted areas, so the focus on doing everyday business just isn’t a thing.

To make matters worse, there is a strike going on right now. A big strike that is already impacting supply chains nationwide, and things will only get more strained the longer it lasts.

“The 2024 United States port strike is a labor strike involving over 45,000 port workers who are part of the International Longshoremen’s Association (ILA), impacting 36 ports across the United States primarily along the East Coast and the Gulf Coast.” (Wikipedia)

While there are many people currently facing larger life issues, the entire nation is forced to consider what happens now, and if they weren’t directly impacted by these events, what would they do if they were? It is a bit of a wake-up call for many business owners, because business interruptions can come from all angles, and it is always best to have made at least some attempt at a set of plans for when things happen.

One critical type of plan is about making the business more resilient and better able to recover or adapt. It’s a broad strategic plan that focuses on overcoming unexpected disruptions and adapting to changing conditions or circumstances. This includes addressing business continuity, which is about how operations may be maintained during a crisis. Business continuity planning is part of what makes a business resilient.

The Importance of Business Resiliency

Business resiliency has become a critical factor for success. In today’s rapidly changing world, the ability to stand up to or quickly recover from disruptions is no longer a luxury but an imperative. Resilience means being able to adapt to changes and challenges swiftly, maintaining continuity and minimizing losses. Customers want reliability, so a business that can continue to deliver products and services despite disruptions will build trust and loyalty, leading to long-term relationships and a strong reputation.

A resilient business will have contingency plans for finances, creating buffers to mitigate the impacts of short-term shocks so investments in long-term growth continue. Also, where competitors may struggle to cope, resilient companies may not simply continue to operate but even capitalize on new opportunities that arise from the changing landscape. When a business is prepared for disruptions, it can focus on growth and innovation rather than mere survival.

Technology plays a big role in developing resilience. Cloud solutions can ensure data is backed up and accessible from anywhere, cybersecurity solutions help protect businesses from cyber threats, and automation technologies streamline operations while reducing dependency on manual processes.

Prioritizing resiliency is crucial for small businesses to navigate uncertainties and thrive.

Mendelson Consulting and Noobeh cloud services help businesses of all sizes improve their agility, streamline operations and implement the technologies and services necessary to shore up business and operational continuity and improve overall resilience.

jm bunny feetMake Sense?

J

Timing is Everything: Security, AI and the Tech Stack in Restaurants

Running a restaurant or chain of restaurants is no easy task. Margins are often razor thin while customer demands continue to expand. Food service, like so many other industries, is struggling to bear the weight of change as labor shortages, rising costs, increasing cybersecurity risk, and demands for an improved customer experience push the industry to do more efficient and effective business. To keep up, businesses must learn more about what’s really going on in the operation, and to turn that insight into action. Timing is everything, and now is the right time to look at technology and platforms which will deliver greater insight and intelligence.

Whether it is leveraging commercial solutions available from partners or through building the tech stack by DIY, businesses in the restaurant industry are looking for innovative solutions to drive more profitability as well as increasing revenues leveraging resources they’re already paying for. AI is playing a big role in this evolution and businesses of all sizes, from the single-location entrepreneur to the multi-location franchise, are taking steps to incorporate it into the operation. Yet AI is all but useless if it doesn’t have the data to analyze.

An example of a transformational solution for the restaurant industry might be Curbit’s products, which include digital infrastructure and real-time AI capabilities that enable the software to analyze the data around service, real-time order progress, kitchen performance and guess sentiment. Microsoft’s Azure and Azure AI platform is key to Curbit’s innovation and development, enabling them to give the information which powers timely decision-making rather than offering only after-the-fact reports or outdated dashboard data.

In the category of maximizing the resources you’re already paying for, look at new services available through DoorDash, where lunch special and happy hour promotional offerings help businesses drive demand in off-peak times. Designed to increase revenues and drive greater sustainability, the service also reflects how restaurants are increasingly faced with the need to leverage online tools and mobile ordering to replace the reduction in foot traffic at brick and mortar location.

On the other side of that coin is information security and privacy and how businesses deal with the realities of cybersecurity threats and the need for greater levels of protection. Collecting more data for analysis means there is an increased risk of exposing private data if not adequately protected.

Considering high profile incidents like what happened with Panera, adequate cybersecurity protections must be part of the essential infrastructure that supports the operation. What was initially described as a systemwide technical outage at Panera was ultimately found to have been a cybersecurity breach exposing some employee personal data and the basis for a class action lawsuit filed by Panera employees.  

Whether it belongs to employees or customers or others, personal and private data must be protected. The cost of protecting the data is likely lower than the cost of dealing with a data breach and the potential resultant backlash, which is another part of the equation which must be considered.

Mendelson Consulting and Noobeh cloud services recognize how businesses need to modernize their systems, developing greater intelligence and resilience in the operation. We also recognize the importance of redundancy and agility in systems, and how quality managed cybersecurity solutions and services help guard against attack.

From ERP and specialized business solutions to platform, hosting and managed service, Mendelson Consulting and Noobeh cloud services can help your business meet the demands of doing business now and in the future.

jm bunny feetMake Sense?

J

Cybersecurity and Small Business

Small businesses face many challenges as they grow and expand, and chief among them is the growing threat of cyber-attack. As the company grows, its value to cybercriminals grows, too. Implementing comprehensive cybersecurity measures is essential to maintaining customer trust and safeguarding important business data against these threats.

There is a belief among small business owners that their operations are too small or insignificant to be attractive targets for cybercriminals. Cybercriminals, on the other hand, more often view small businesses as easy targets. Why is this? Largely because the bad guys know that the smaller companies aren’t spending on cybersecurity services and tools and aren’t always keeping their workers informed about ways they can participate in keeping things safe.

To help protect the business from cybersecurity threats, it is crucial to invest in some key security measures. Longer and more complex passwords, regular software patching and updating, and periodic training for employees on how to identify phishing attempts and what to do with suspicious emails is a good start. Cybersecurity efforts should scale with the business, and this requires strategic planning that is aligned with the goals and objectives of the business.

The best cybersecurity approaches are built on a secure foundation, and this is what helps to support business growth and expansion. For every business, there are four cornerstones of a solid cybersecurity foundation.

  • Identifying potential cyber threats and understanding the business risk they represent.
  • Enforcing strong password protection and role-based access controls.
  • Following best practices in cybersecurity.
  • Managing documentation and vital business information securely.

Cybercriminals know that smaller businesses generally have limited cybersecurity resources, making small businesses prime targets for phishing and malware. What is the potential impact of falling for a phishing email, or what happens if there is a ransomware attack? Each type of threat carries different levels of risk, and growing businesses should be aware of the potential financial, legal and reputational impacts when evaluating their approach.

Businesses can help their users become part of the cybersecurity plan by regularly training them on phishing methods and ways to avoid ransomware or malware. When users know more about emerging threats and how to recognize and report suspicious things, they become valuable assets in the improvement of cybersecurity of the business.

The first line of defense in cybersecurity is the username/password challenge. Many systems today use an email address as the username or user ID, which means it really isn’t much of a challenge to guess. This leaves it to the password to keep the account secure, so a strong and unique password is necessary.

Making another challenge to the authentication adds another layer of protection to the account. Referred to as 2FA or MFA (two-factor authentication or multi-factor authentication), users may be required to respond to an in-app message, provide a code received via SMS or other, or provide a code from an authenticating application to satisfy the login requirements. This additional challenge to the user identity makes it harder for cybercriminals to gain unauthorized access.

Ensuring the protection of sensitive business information requires controlling what users have access to once they are in the system. If someone were to gain unauthorized access, having appropriate role-based access controls in place would limit their ability to get sensitive data. This is often another area of vulnerability for smaller businesses that don’t implement strict document controls or structures, opting instead for an open self-service model that leaves data available to whomever can get logged in.

With businesses changing frequently, it is important to not just create a framework to limit user access, but to keep user and role-based access reviewed and updated regularly. Software and systems also need to be updated regularly. Known software vulnerabilities should be patched and security updates installed on devices, and policies enforcing updates and antivirus/malware detection should be implemented.

We understand that businesses must enhance their cybersecurity strategies to combat the growing number and type of cyber threats, and it can be challenging just figuring out what to do first. Working with a variety of technologies and specialists, we can help secure your digital environment and keep you better-protected from the bad guys.

jm bunny feetMake Sense?

J

Deadline Approaching for QuickBooks Desktop Users

All QuickBooks Desktop Users Are Required to Upgrade to a Current Subscription Model by Sep 30. Yes, the time has come to buy in to the software subscription model or lose access to your books. But at least you get to keep using QuickBooks desktop software, which is worth a lot of you’re already invested in QuickBooks.

Effective Sep 30, 2024, all existing users of QuickBooks Desktop Pro, Premier, Mac, and Enterprise Solutions v21 (and earlier) must transition to the annual subscription model. For Pro and Premier users, this is a short reprieve. Previously Intuit had announced a July deadline for renewing Pro/Premier licenses. After the now-September deadline, there won’t be any new sales of Pro or Premier licenses. With some of the recent price increases it almost becomes a moot point, as QB Enterprise is now priced similarly (less?) than Premier.

Something notable in all of this is that versions sold under non-subscription one-time licenses will be discontinued entirely. That is just fine for many users, however, as the much older versions don’t “phone home” to authorize the license, so they can keep working. The downside to that is vulnerability. Outdated and unpatched software is more vulnerable to risk than software that is actively updated to protect against various exploits. Best practices demand keeping software updated and patched. Being out of support with your business financial and accounting software is not a position you want to find yourself in.

Starting Oct 1, 2024, QuickBooks Enterprise will be the only QuickBooks Desktop version available for new purchases. For very small businesses, this is going to be a challenge as QB Enterprise is not as affordable as Pro was. These businesses may find that QuickBooks Online works for them, but they will not only miss out on a great deal of QB Desktop functionality that is not present in Online, but they will also be locked into the QuickBooks Online service model of receiving product updates without announcement, not having a backup of your company data, getting bombarded with a revolving door of add-on apps, and having literally no control whatsoever of where your data lives and how Intuit and its companies are accessing it.

If you are using an older version of QuickBooks Desktop, upgrading to the subscription model before the deadline is crucial to avoid any interruption of services.

What does this mean?

  1. Service Discontinuation:
    Failure to upgrade will result in the discontinuation of services such as QuickBooks Desktop Payroll, Payments, Online Backup, online banking, system updates, security patches, and live support. This could potentially disrupt your business operations.
  2. Immediate Action Needed:
    To ensure uninterrupted business operations, we strongly recommend planning your upgrade without delay.
  3. Advantages of Upgrading:
    Intuit encourages existing Desktop subscribers to upgrade to the current version (Desktop 2024) to benefit from the latest features, improvements, security updates, and bug fixes. Updated software also improves compatibility with current versions of Windows, Microsoft Office applications, Gmail services and other solutions that use modern methods of account protection and authentication.

At that time, you may also want to consider your alternatives to how and where you run your QuickBooks Desktop software.

Intuit offers “cloud access” with their QuickBooks Enterprise licensing, but this option is not your only or best option for running your QuickBooks Desktop/Enterprise software in the cloud.

With the bad guys (hackers) and malware being as prevalent as they are, businesses must be vigilant in securing their business and financial information. Shared hosting platforms where service providers allow many users from many businesses to operate on the same servers simply cannot provide the level of security or protection most businesses need.

Noobeh QBonAzure offers some limited shared hosting, but only for customers that have limited requirements and only for a few users. When a company needs more than just “vanilla” hosting for their valuable financial data, we strongly recommend going the private route and having your own cloud server.

Not just a “dedicated” server in a service provider’s network, Noobeh works only in the private Microsoft account of each customer, ensuring that there is absolutely no sharing of any resources with other customers. This allows us to build a system that works specifically for your business, with all the applications and services needed to support all aspects of operation. There aren’t different levels of service or service packages; each system is built and sized for the customer’s unique requirements, and we don’t charge per-application or silly things like that. You need what you need to run your business, and we host that.

Connect with us if you have any questions or need assistance during this transition. We will help you navigate the changes and understand how best to proceed for your business and circumstances, engaging with the right products and services to ensure continuity and set you up for greater future success.

jm bunny feetMake Sense?

J

Enhancing Business Insight: Noobeh Cloud Services and Azure-Based Solutions

Technology is evolving and so are our ways of using it. While the rules of accounting haven’t changed for years, the solutions we use to do the work have changed a lot. Yet there remain many businesses that haven’t yet embraced the idea of fully digital workflows, integrating and automating how data moves through the “system” to provide a comprehensive view of the business and how it is performing.

This is where accountants and bookkeepers can best serve their clients, by helping them implement the platforms and solutions which transform operations and provide greater insight into these areas.

Over 20 years ago, a technology model was developed which allowed businesses and the accounting professionals who serve them to work directly and collaboratively in the clients’ accounting system. By hosting QuickBooks and Sage desktop products on host servers, small business users and their accountants could both access the software and the data in real time.

This new approach was a boon for accountants, bookkeepers and others working with small business clients as it not only enabled closer work, but also provided those advisors an opportunity to do more – and more complex – work with the client. Yet many platforms and working models created barriers to broadening the scope of service or access to client systems, limiting to just basic accounting products like QuickBooks, and not effectively addressing the rest of the business need.

As technology has evolved, so have these transformations.

More accounting professionals understand the benefits as well as the necessity of moving from analog to digital workflows, removing manual entry and improving efficiency and accuracy of data. Yet this improvement doesn’t require changing accounting software and undoing years of learning and business knowledge. Rather, the platforms and connections must be the primary focus, replacing the manual with automation and smoothing out the bumps where data isn’t flowing at all. If the system isn’t in place to handle the complete flow of the data, there is a break. Like a pipe leaking water, this break results in data loss – which is also loss of business intelligence.

A key to all of this is the consideration of where the data ultimately resides. When business data exists in closed silos – whether web-based software or closed hosting platform – it takes a comprehensive approach to collection, storage and analysis. This is among the benefits to be derived from the modern cloud and Noobeh’s Azure-based hosting approach.

Noobeh’s hosting is not just about the desktop or the applications.

The cloud platform, and Azure in particular, also provides resources for data analysis and business intelligence, workflow and data flow automations, improved security and identity management, IoT and computing on the network edge.

For professionals looking to evolve their practices by helping clients go beyond basic recordkeeping and reporting, it’s time to delve into the operational details, data flows and development of real business intelligence and insight. Noobeh Cloud Services and Mendelson Consulting have the platforms and the supporting services to help bring it all together, improving profitability and performance of their clients through the intelligent application of technology.

jm bunny feetMake Sense?

J