The Small Business Borrower | Biz2Credit

In order for regulation and legislation to work in favor of small businesses, it becomes essential that accurate and complete information be available for analysis. Too often there are details not recognized in the information used by various agencies to help guide policy and action, and particularly in the world of privately held small business, the quality of data is often in question. This is where structured accounting software and the public accountant come in to play, and where a difference can be made not only with the individual client, but at a higher level by facilitating more accurate data production to support various research initiatives, such as those sponsored through the SBA and the Fed.

Overall, these research studies highlight two things: the important role that financial institutions play in lending to small business owners, and the value of quality data sets in ascertaining financing issues faced by small businesses and their owners.

Charles Ou, Ph.D. | Senior Economist | Office of Advocacy | July 2009

With the availability of highly useful tools for monitoring various key performance indicators and metrics in the business (with analysis of cash flow being an essential part), business owners and their accounting professionals alike are able to use real business data to reveal not simply the trends in business performance, but to identify areas where direct action could improve results in one aspect or another. By paying closer attention to managing business finances and analyzing key aspects of business performance, the “discouraged” or “denied” business borrower may become a successful or (even more valuable) a non-borrower.

via The Small Business Borrower at Biz2Credit.com.

via Accounting and Business Technologies | QuickBooks Pro and Premier as Software-as-a-Service

QuickBooks Pro and Premier as Software-as-a-Service

Running business applications online was once considered a fad, but has now become a mainstream approach to implementing technology. Businesses large and small are finding that turning technology investments into a predictable expense allows them to focus on their business operations and not the IT budget. For some, the ability to bring remote locations or mobile team members closer to the systems that support the business is the biggest benefit. For others, the security of having business continuity and disaster recovery built into the system is the key. Regardless of the motivating factors, business owners are finding that online application services can make a positive impact to their bottom line.

The market has clearly identified online technologies and application services as something beneficial. This is demonstrated by the rapid adoption and growth of business solutions that leverage the Internet as network. Further, online applications and services are being used as a way to augment systems that were once exclusively LAN or PC based. An example of this is the extension of Intuit’s QuickBooks products to incorporate online payroll services and online payment processing solutions.

With the move to online application services being one of the biggest shifts in technology seen in years, it only makes sense that the applications that have become “standards” in business shift to an online model, as well. The opportunity is great, but the responsibility is greater.

Many software companies are facing a number of problems with respect to the unauthorized hosting of their desktop applications. Because of the technology employed for desktop application hosting is very costly, many service providers feel compelled to “leverage” application licensing and other system features to increase their value proposition and in order to compete. Customers who utilize these unauthorized application services are putting their businesses at potential risk. This risk may come in the form of substandard services resulting in lost or corrupted data; risk may come in the form of unauthorized access to confidential business or personal information due to poor system security; risk may come in the form of exposure due to the unauthorized use of software licenses.

While the market has clearly demonstrated the value and benefit of application hosting services, the lack of protections, consistency and support make it a venture fraught with peril for many. The volume of “grey market” activity and instances of license piracy have undoubtedly increased dramatically, as the cost of service delivery is high and the margins for the service provider are narrow. Manipulating the cost of service by leveraging the application licensing is sometimes the only way some service providers can create profitability in their offerings. But with the prior lack of oversight in terms of service pricing, licensing, quality assurance, or service orientation, it had become the “wild west” for service providers, and the perceived value of the service declined while the number of and variety of deliveries increased.

The answer to the problem, or at least as it exists around the Intuit QuickBooks products, is in the ability for Intuit-Authorized QuickBooks hosting providers to offer subscription access to QuickBooks Pro and Premier licenses when they are hosted. Customers no longer need worry about purchasing their QuickBooks software before engaging with the hosting company, and can avoid the annual cost of upgrading their application software. With the QuickBooks license delivered under a subscription program, customers are able to work with the most current version of the software, and know that their systems are protected and their data is secure. Intuit-authorized QuickBooks Hosting providers can supply, manage, and maintain hosted QuickBooks implementations for businesses of virtually any size and type – all with an Intuit-supported license.

via Accounting and Business Technologies | Joanie Mann: QuickBooks Pro and Premier as Software-as-a-Service.

Technology and Tools for Accounting Professionals

Joanie Mann Bunny FeetTechnology and Tools for Accounting Professionals

old_school_ledgerThere was a time not so long ago when accounting professionals focused more on tabulation and summarizing of information than on analysis.  Accounting for businesses, in particular, required collecting myriad papers and receipts and other transaction documents, summarizing the information, translating it into journal entries, and finally posting those numbers to the big bound book which represented the business general ledger.  With the work required to gather and enter all of the information, professionals necessarily focused their efforts on making the process as efficient as possible by attempting to structure the workflow and manage the paper.

When those efforts are compared to today’s approach which involves digital documents, intelligent data collection tools, automated workflow solutions, online accounting and data analysis, it is clear that the processes for accounting for business activities have not really become simpler.  In fact, much of the enabling technology has served to complicate certain processes, which drives users to find even more “solutions” to address these new problems.  It (IT) is a bit like the Wonka Everlasting Gobstopper, which never gets finished and never gets smaller.  IT simply changes things – regularly and often.

Back then – before the Internet and digital imaging, or even Personal Computers – high technology wasn’t the focus because it didn’t exist in the realm of business in general.  I suppose you could call business solutions at that time “low” technology, where mainly mechanical solutions were introduced to address various business problems.

old_school_filecabinet

As an example, prior to the advent of digital imaging and electronic documents, one of the primary requirements of the business was to organize and store paper documents.  Over time, a wide variety of filing, foldering and labeling solutions have been developed, all oriented towards making the storage and later retrieval of paper documents easier.  For some businesses, letting go of the paper is a hard thing to do.  Years and years of training in keeping paper files has left many business owners and managers wary of working without physical paper documents.  Investments in office space, filing cabinets, storage folders and personnel to organize, file and retrieve all of the documents is only a partial measurement of the cost of managing paper, and large numbers of businesses continue to operate in this manner.

old_school_desk

The technology applied to processing the work has also changed, in many ways even more dramatically than the technology applied to collecting and storing the information.  Take the simple processes of tabulation (to arrange in tabular form; condense and list) and summing (adding up) information, for example.  Previous generations didn’t have computers and spreadsheet software to perform the work.  Rather, individuals would painstakingly handwrite each transaction entry into a ledger or on a columnar worksheet, and would then have to manually add each column and then cross check footer totals to ensure accuracy.  Back then, the machines used to perform the addition/subtraction were mechanical devices and could not perform multiplication or division.   These adding machines were first hand-cranked devices, later replaced with shiny new electrical ones (weighing approximately 20 lbs each).

old_school_telephone

Even voice communications have changed dramatically over the years.  Many people don’t remember a time when having multiple phone lines in the business meant having multiple telephones, and the concept of a PBX (Private Branch eXchange) didn’t exist.  Every phone would be hard-wired to an incoming line; if you wanted to answer a call, you had to use the right phone.  This became difficult in an office with many people, so solutions such as the “fabulous extendo-phone” was invented to allow anyone in the office to access the phone from their desk.

The technology available to businesses today is astounding, and offers amazing potential and benefit.  On the other hand, technology rarely (truly) makes things simple or easy – it more frequently serves to shelter certain users from the complexity while delivering new workloads and concerns to others.  It’s rather like energy – it isn’t created or destroyed, it just changes form [law of conservation of energy].  Business is like that, particularly where information technology is involved.  The underlying requirement doesn’t go away, just like a business’s requirement to account for financial transactions and activities,  and the need for the business to capture and retain documents isn’t changed.  How the process is managed, and which tools or mechanisms are applied to the task is what changes.

Make Sense?

J

onewrite-accountant_apparatusOne-Write System Revolutionizes Accounting.  These guys had the right idea, they just didn’t have the cloud.

Cloud Computing and Online Accounting for All? Some Markets Are Still Waiting for Broadband

Cloud Computing and Online Accounting for All? Some Markets Are Still Waiting on Broadband

As the information technology industry espouses the benefits of the “paradigm shift” in computing and the move to cloud computing platforms and models, there are folks out there in the world who just aren’t seeing it happen like that.  Not everybody’s working online. For many, the Internet and online working models simply haven’t intruded into their lives and businesses as it has for others.  While this may be partially rooted in conservative mentalities and beliefs which are resistant to change, the more likely reality is that options for high-quality and affordable broadband service is simply not available to them.  Without choices for affordable and useful connectivity to the Internet, online just doesn’t have the attraction it does for those who are “connected”.

When businesses look at cloud solutions and the Internet dependency that comes along with them, having more than one connection to the outside world becomes the imperative rather than a luxury.  Unfortunately, some markets are still waiting for broadband (or have very limited options for service), rendering the cloud nearly unreachable.

It may come as a surprise to some, particularly to those in East and West coastal regions, that high speed broadband just isn’t as available in other zones.  In fact, the *National Broadband Map clearly reveals limited availability and choice in numerous regions of the US.  Broadband Internet access is a necessity to support the IT industry’s shift from localized IT to “cloud” IT.  But the shift is only evident to those who are involved in it or who have that option.  For those who the industry is beginning to refer to as the technology “have-nots”, this lack of available and affordable access will ultimately create more than simply an inability to participate in broadband-reliant IT solutions.  The fast pace of innovation and evolution in IT almost guarantees that the technology have-nots will fall even further behind, possibly to the point of not being able to catch up.

 “A Growing Gap Between IT Haves, Have-Nots. There will be a growing gap between the IT haves and have-nots in 2013. The latter will fall behind the former on a wide range of business technology fronts such as mobile, cloud, social, virtualization, and analytics…” 7 SMB Technology Predictions for 2013 | InformationWeek.com

As business (and personal) technology models continue to evolve, and as new solutions and services begin to displace the old, those who remain disconnected will begin to directly experience much more impact.

Consider something as simple as using QuickBooks desktop software for small business bookkeeping.  As Intuit continues to remove elements from the installed software product, turning them into web services instead, customers with limited or no broadband access will find themselves without the features and functionality they need in the software.  And the only possibly comparable alternatives to QuickBooks desktop accounting products are Internet-based alternatives, making them not really alternative options at all.

It is also likely that lack of sufficient broadband is one of the factors motivating many solution providers to seek clients in other markets – outside of the United States, and in regions where broadband availability is more prevalent and service speed and quality is higher.  Yes, it’s true.  The United States is not the leader in broadband availability, or even in quality.

“For many people, their broadband connections are their lifelines. So what is the state of broadband in the U.S.? Well, when it comes to speed and price and adoption, we’re certainly not a leader — “middling” is a better way to describe our position.

Currently 119 million people that live in the U.S. don’t have broadband connections (for many reasons, including not wanting it or not being able to afford it) while 19 million don’t even have the option to get it. Our rate of broadband adoption (62 percent) lags behind countries such as South Korea, the U.K.,and Germany, according this year’s Federal Communication Commission report. (We’re closer to the penetration rates to Japan, Finland, and Canada.) These numbers are not likely to change soon, given that broadband growth is slowing and providers are moving away from wireline infrastructure. “ GIGAOM:The state of broadband in the U.S. [infographic]

Accountants and other professional service providers serving clients in regions lacking sufficient choices for access must recognize that their approaches to doing business will not necessarily match their peers in more fully connected areas.  Certainly, accounting and legal professionals are dealing with this reality as practice coaches and industry leaders push for IT- and cloud-enabled models for improving practice performance and creating differentiation, even as their proven applications and business solutions morph into or are replaced with SaaS applications and online service.

The take away from this is that there are still large numbers of businesses and individuals doing things with legacy tools, managing spreadsheets on standalone PCs, or writing with pens and using paper – even in areas where broadband access is plentiful.  Regardless of how forward moving the rest of the world may be there remains a need to provide service and support these IT have-nots.  Perhaps this becomes a means for differentiation, finding ways to work with businesses who are connected and those who are not, and leveraging the firm’s access and capability to deliver what the client cannot obtain directly.

Make Sense?

J

*The National Broadband Map is a tool to search, analyze and map broadband availability across the United States

Preparing for Disasters of the Legal Kind

Preparing for Disasters of the Legal Kind

As businesses begin to realize the benefits of cloud computing and business data mobility, they may be overlooking one of the most important issues any enterprise can face: information management in the event of litigation.  While the IT department probably has a disaster recovery plan for handling various computer system failures, is there also a plan for managing system data and electronic information in the event of a “legal disaster”?  In the spotlight is e-discovery, which is the requirement of the business to respond to legal requests for electronically stored information, and the issues CIOs and business owners should be paying attention to as computing solutions and technology models continue to change at a rapid pace.

The popularity of BYOD (Bring Your Own Device), data sync solutions, and online collaboration tools has created an environment where business data may exist in various states (meaning as in conditions or status, not as in State, like California) and on a variety of devices and systems, some of which may not be in the direct control of internal IT.  Regardless of where or how the information was delivered to these devices and systems, CIOs and business owners should recognize that the information on those devices is included in discovery requests, and should be prepared with a plan for dealing with the response.

This “e-discovery plan” is the most important thing, and it means not only working through the various aspects of managing the information, but also providing consideration to keeping the plan updated.  As technology changes, and as user behavior changes along with it, businesses must adjust their IT management approaches in kind.  Consider that a user couldn’t store business data on their phone until the phone was able to handle that function.   Now that smartphones are the norm and tablet computers are gaining in popularity, business data is roaming on personal and business devices.  These advancements may introduce productivity and process gains which provide an advantage to businesses, but they also introduce potential risk and certain complexity when it comes to e-discovery.

Litigation is always expensive, but sanctions for slow response or other costs can be avoided if the plan helps the business respond in a timely manner.  For this reason, the plan should include an identification of all sources for information (every location where business information and data is stored), as well as the steps to be taken to preserve this data in the current state.  If the business has systems which regularly purge information (like accounting systems which purge prior period details, email systems which automatically purge old emails, or backup systems which delete old backup files as new ones are made), all of these activities must be halted.  If the company doesn’t have access to control the various devices and systems to prevent these activities (or doesn’t know that they are happening), significant risk is introduced.  In the case of a legal “hold”, all data and metadata and the audit controls and files must be preserved.

The final steps in the plan are the steps to be taken after the litigation is over.  This is often times a forgotten part of the plan, which is the final destruction of the information gathered for discovery.  Not that the original data must be destroyed (consider ALL dependencies), but the “database” of collected information related to the litigation probably should be.  With this data pooled in a single place, it becomes a potentially valuable target for a data breach.  At minimum, the collected information could too-easily be pulled into an entirely new legal case.

IT managers, CIOs and business owners must be realistic about the information their enterprises generate and store, including being realistic about the risk potential that duplicated and mobile data represents.  It is not that the enterprise should be afraid of allowing mobility and providing remote access solutions, but it is essential that the enterprise control the use of these solutions and how they use or interact with business data.   Without a strictly enforced policy of usage and control for all devices, services and solutions “touching” business data, any legal disaster planning falls short.

Joanie Mann Bunny FeetMake Sense?

J

Read More:

e-Discovery in the Cloud: Benefits versus Risks

e-Discovery in the Cloud: Benefits versus Risks

After many years of working with business professionals in “enabling” their organizations to make better use of technology, I must say that it is a bit frustrating trying to get folks to understand that this new and wonderful cloud computing model (or Internet-based computing, SaaS, or whatever-you-want-to-call-it computing) is still just technology.  It uses computers and disk drives, it runs software, it takes electricity, and it was developed by human beings.  It can break.   It’s not magical and perfect and you can’t get the good stuff for free.  Swim at your own risk.  So, assess the risks, and measure the benefits against the risks and costs.  For many, the benefits outweigh the risks, as cloud computing approaches can deliver advanced capabilities at cost levels not previously available to most businesses.

No industry is immune to the security and access considerations surrounding a cloud computing model.  Particular those lawyers involved in e-discovery (all of them) have recognizing the potential benefits – and tradeoffs – of the model.  This reality was clearly revealed at the ILTA (International Legal Technology Association) 2010 event in Las Vegas.  While the discussions at the conference were oriented specifically towards the legal profession, the IT-related discussions are totally relevant to every business.  Accounting and finance professionals should pay close attention to this type of conversation, as it relates very directly to accounting’s approach to information technology and the application of IT in the business or professional practice.

In a recap of the event entitled ILTA 2010 in Las Vegas: Strategic Unity, Defensibility, and the Cloud, author Chris Dale discussed that professionals in both public and corporate service must work with the IT departments towards a common goal.  “IT is no longer just a service department providing an infrastructure, applications, training, and troubleshooting.”  While these elements still remain as critical aspects of IT, the role has grown to also incorporate considerations for collaboration (collaborative information management), mobility, and social media.

Recounting one session attended, called Defensible Ediscovery Processes, the author related the variety of definitions provided to the general term” defensible”, which were pretty amusing.  These definitions ranged from protected against attack, to less lousy practices or practices which suck the least” (my personal favorite), and finally, what you can get away with without being found guilty of spoliation.  From these definitions then came qualifiers, such as “reasonableness” and “faith”.

Why would defensible processes be important, and how does this relate to IT or cloud computing?  An example of the element of “faith” came up in this context: ” how can [lawyers] have faith that the technology is delivering the right answers?”  A panelist gave the sample of “an email retrieved from (or possibly not retrieved from [love those lawyers]) a system, with 26.5 pages missing.  How can you be sure that the systems which you are using will not do that to you?”  These are valid questions in any IT environment, and are no less important when considering a cloud-based technology model.   The trade-offs are related to perfection in functionality and performance of the solution versus cost, and should be measured in proportion to one another.

The tradeoffs may come in a variety of areas, with collaboration and connectivity being the primary drivers (collaboration) and barriers (connectivity) to the model.  Businesses are more than ready to adopt cloud computing strategies based on the belief in improved collaboration, access to information, and improved IT management,  but tend to overlook the offsets in the areas of bandwidth availability (and consistency), application functionality (or lack thereof), and level of support available from the provider.  In support of this argument,  Jerry Justice (IT Director for SS&G – Certified Public Accountants and Advisers) posted in a LinkedIn discussion on the topic that “by design the Internet is ‘reasonably’ connected, but not the same as a well-connected [local] network.  the upside is it gives you the ability to connect from great distances, the tradeoff is that you experience variable connectivity.”

The underlying issues are that there is a paradigm shift to working on the Internet (from working in the office) and then another shift when you add in cloud-based environments (versus local apps).  It is possible to be very productive, but .. you have to adapt your approaches“.

The idea “that perfect must be qualified by cost and proportionality” was also discussed in an ILTA session on cloud computing which included panelists from Autonomy iManage, Mayer Brown, and Ernst & Young.  “Cloud computing remains a contentious area, with no obvious agreement even as to what the term means, let alone as to its implications” wrote Mr Dale in his recap of the event.  While the panelists held differing views, the representative from Mayer Brown held a position similar to Mr Dale, in that it is important to “dissect the objections one at a time, accepting that there is room for more than one view, and testing arguments against the alternatives.  Arguments based on pure cost are pretty compelling, and if one method of achieving an objective is very much cheaper than the others, then the burden shifts to those who argue for the more expensive route.”

Discussions went on to describe differences between public cloud providers and others, who segregate customer data in “private and identifiable silos”.  “The key word here is identifiable“, writes the author, “which connotes a geographical certainty as well as anything else.  I sometimes wonder if the imagery associated with cloud computing (invariably a jagged line disappearing into some cumulus) does not leave some people with the idea that their precious data is indeed floating in some inchoate container up in the air.”

If you neglect to provide in your contract that your data remains in a specified jurisdiction, and if you fail to conduct proper due diligence checks on the provider, then you deserve all you get.  Like any risk assessment, it involves weighing cost against other factors; most of these other factors are definable and quantifiable“.

I couldn’t have said it better myself.

Joanie Mann Bunny FeetJ

original post March 24, 2011