Tech Update 20150429 BCS-ETSU

Transcription

Tech UpdateCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

About Brian Tankersley@BFTCPACPA, CITP, CGMA with 20 years of Accounting and Technologybusiness experience, including public accounting, industry,consulting, media, and education. Director, Strategic Relationships, K2 Enterprises, LLC (k2e.com) (2005-present) Publisher, CPATechBlog.com (2004-present)Technology Editor, The CPA Practice Advisor (CPAPracAdvisor.com) (2010-2014)Sr. Faculty Member/ East TN Lead Instructor, Becker CPA Review (1997-2013)Selected as one of the 2011-2014“Top 25 Thought Leaders in PublicAccounting Technology” and for 2007 and 2008 “40 Under 40” by The CPATechnology Advisor/CPA Practice Advisor. 2012 and 2009 Outstanding Discussion Leader Award, TN Society of CPAs 2011 Article of the Year, Tennessee CPA JournalAuthor of numerous articles and have direct consultingexperience with and for numerous organizations such as softwarevendors and CPA Firms.brian@k2e.com // @BFTCPA // 1(865) 684-4707– Delivered presentations in 46 US states, Canada, and Bermuda.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.About K2 Enterprises Provides live and on-demand Continuing ProfessionalEducation (CPE) in 48 US states and in Canada Largest provider of technology-focused CPE foraccountants and financial professionals in NorthAmerica Services Offered––––Live in-person presentations (conferences & seminars)WebinarsOn-site trainingOn demand self study materials www.k2e.com for more informationCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.1Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Accounting Firm Operations andTechnology Survey – 2015 EditionOver 600 firms of all sizes from all fifty USstates participated in this year’s surveyMore Info: cpaclick.com/nmgi-irg-1Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.K2 Enterprises Web Sites www.k2e.com - CPE Info www.CPAFirmTech.com – CPA Firm Info www.AccountingSoftwareWorld.com – AccountingSoftware Info www.TotallyPaperless.com – Paperless Info https://www.youtube.com/user/K2Enterprises - TheK2 Enterprises YouTube channel with over 160 freetechnology training videosCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.2Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

What Is Your Technology Strategy?CHOOSING THE RIGHT TECHNOLOGYAFFECTS PROFITABILITYCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Upon completing this session, participantsshould be able to– Identify leading technologies available toaccounting and financial professionals;– Differentiate between various technology choicesand make recommendations based on relativestrengths and weaknesses; and– List major trends emerging in technology.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.3Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

What technology you should be looking at for your office BUSINESS TECHNOLOGY TOP DOWNCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.The Modern Office Has Changed Lines between departments, even individuals have blurred. Technology rules for workflow processes route, track, andmonitor our activity inside of tools like SharePoint,SalesForce, and ConnectWise Consider Telepresence, Surveillance, HaaS, SaaS, Cloudbackup, recovery, and more often today – processing fromthe Cloud. 50% of all money spent on IT will be on remote support,private and public cloud computing Mobile – 2.8 Billion people have a cell phone today, 4.5Billion by 2016 Big data Artificial Intelligence and moreCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.4Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Creating a Modern Office RequiresInvestment in Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.5Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

2015 Gartner, Inc. and/or its Affiliates. All Rights ReservedCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.And What Can We Expect In The Near Future?WHAT’S NEW IN TECHNOLOGY?Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.6Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

You Know I Read A Lot, Last Year I UsedTechnology AnniversariesCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Magna Carta – June 15, 1215 “Mega Carta” by LudwigSiegele, The Economist 11/20/14 Adapts it to cyberspace All Cyber requests incourt Which limited the powersof England’s king andinspired many aconstitution.– Net neutrality– All digital propertiesdistributed to next of kin– All intercept devices shutdown– MoreCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.7Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Back to the Future II Marty McFly (1985,1955, 2015, 1885– October 21, 2015 Hendo Hoverboard– 10,000Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Time’s Best Inventions Of 2014 Apple Watch- 349 Blackphone- 629 Microsoft Surface Pro 3 799 Quirky Aros Air Cond. 279 Coolest Cooler- 399 MotionSavvy signlanguage app- 198 Lumo Lift posture app 100 Copenhagen Wheel 799 94fifty smart sensorbasketball- 200Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.8Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Time’s Best Inventions Of 2014 Bananas that PreventBlindness Wrappers You Can Eat –Wikipearls from WholeFoods HemopurifierDeveloped by AethlonMedical Pillpack-prices varyBMW i3- 41,350Witricity3-D-Printed EverythingHigh-beta fusionreactor-Developed byLockheed MartinCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Witricity Wireless Electricity A4WP Wireless power standardsCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.9Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Alliance for Wireless Power (A4WP) Rezence technology Alliance Goals:– Evolving and publishing Rezence technicalspecifications– Maintaining global testing and certification processes– Actively promoting the benefits of Rezencetechnology throughout the industry From phones, tablets, and laptops to cars Much less efficient than a wired connection, butno wired connection is neededCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Rezence Uses The Principles OfMagnetic Resonance Superior charging range– A superior charging range allowing for a true drop and go charging experience,through almost any surface and through objects such as books and clothing. Multi-device charging– Ability to charge multiple devices with different power requirements at thesame time, such as smartphones, tablets, laptops and Bluetooth headsets. Ready for the real world– Charging surfaces powered by Rezence will operate in the presence of metallicobjects such as keys, coins, and utensils, making it an ideal choice forautomotive, retail, and kitchen applications. Bluetooth communication– Uses existing Bluetooth smart technology, minimizing the manufacturer’shardware requirements, as well as opening the door for future, smart chargingzones.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.10Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

3D Printing Update Additive manufacturing—as 3-D printing is alsocalled—has been around for about 30 years. A 3-D printer works in much the same way as a desktopprinter does. Instead of using ink, though, it “prints” inplastic, wax, resin, wood, concrete, gold, titanium,carbon fiber, chocolate—and even living tissue. Thejets of a 3-D printer deposit materials layer by layer, asliquids, pastes, or powder. Some simply harden, whileothers are fused using heat or light. “Just Press Print” by Roff Smith – National Geographic– December 2014Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Harvard Bio Printing For Blood Vessels Multimaterial 3D printing can be achieved using fourindependently addressable printheads (a), as demonstratedhere. The fluorescence image (b) shows a 4-layer latticeprinted by sequentially depositing four PDMS inks (c), eachdyed with a different fluorophore. (Images courtesy ofJennifer A. Lewis.)Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.11Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Ericsson 5G Cellular by 2020 4.7GB Secure pathway for each device “device todevice” or secure M2M 15GHzCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Home Automation – ZigBee & Z-WaveCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.12Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Gartner Research 2015 Report – Dated October 2014TOP 10 STRATEGIC PREDICTIONS FOR2015 AND BEYOND: DIGITAL BUSINESSIS DRIVING 'BIG CHANGE'Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Strategic Planning Assumptions1. By 2016, more than 2 billion in online shopping willbe performed exclusively by mobile digital assistants.2. By 2017, U.S. customers' mobile engagementbehavior will drive mobile commerce revenue in theU.S. to 50% of U.S. digital commerce revenue.3. By 2017, 70% of successful digital business modelswill rely on deliberately unstable processes designedto shift as customers' needs shift.4. By 2017, 50% of consumer product investments willbe redirected to customer experience innovations.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.13Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Strategic Planning Assumptions5. By 2017, nearly 20% of durable goods "e-tailers" willuse 3D printing to create personalized productofferings.6. By 2017, a significant and disruptive digital businesswill be launched that was conceived by a computeralgorithm.7. By 2018, the total cost of ownership for businessoperations will be reduced by 30% through smartmachines and industrialized services.8. By 2018, digital business will require 50% fewerbusiness process workers and 500% more key digitalbusiness jobs, compared with traditional models.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Strategic Planning Assumptions9. By 2020, retail businesses that use targetedmessaging in combination with internal positioningsystems will see a 5% increase in sales.10. By 2020, developed world life expectancy willincrease by a half-year, due to the widespreadadoption of wireless health monitoring technology. What is your most important initiative?Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.14Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Strategic Planning Assumptions By 2016, poor return on equity will drive morethan 60% of banks worldwide to process themajority of their transactions in the cloud. By YE17, at least seven of the world's top 10multichannel retailers will use 3D printingtechnologies to generate custom stock orders. By 2017, more than 60% of governmentorganizations with a CIO and a chief digitalofficer will eliminate one of those roles.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Strategic Planning Assumptions By 2017, 40% of utilities with smart meteringsolutions will use cloud-based big data analyticsto address asset-, commodity-, customer- orrevenue-related needs. By YE15, inadequate ROI will drive insurers toabandon 40% of their current customer-facingmobile apps. Full genome sequencing will stimulate a newmarket for medical data banks, with marketpenetration exceeding 3% by 2016.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.15Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Strategic Planning Assumptions By 2016, 60% of U.S. health insureds will know the procedureprice and provider quality rating of shoppable medicalservices in advance. By 2018, 20% of the top 100 manufacturers' revenue willcome from innovations that are the result of new, crossindustry value experiences. By 2018, 3D printing will result in the loss of at least 100billion per year in intellectual property globally. By 2017, 15% of consumers will respond to context-awareoffers based on their individual demographics and shopperprofiles.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Key Items You Need To ManageTOP TECHNOLOGY CONSIDERATIONS ASAN OWNER/MANAGERCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.16Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Items To Watch1.2.3.4.5.LicensingFormalized Learning Plans/CPERemote Access/VDIConsistency in Process/workflowGovernance Including Patriot Act/ HIPAA/7216/Gramm-Leach-BlileyCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Items To Watch6.7.8.9.Marketing initiativesDocument management/Portal useCommunication issues, data and voiceControlling risks including, mobile devices,internal controls on data, cyber insurance10.Older technology, including SANs, firewalls,switches, wireless, end-user computersCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.17Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Our Concern With Threats Will Slow Down InnovationSECURITY CONCERNS INCREASINGCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.The Unstoppable Threat! The email correspondence that leaked in thewake of the recent hack showed that SonyPictures Entertainment may have been operatingwithout adequate protection against phishingattacks, remote-access Trojans, passwordmanagement policies, proper use of encryption,data storage, and backups. Management listened to IT but did not verify.“Trust but Verify” should be a business mantra.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.18Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Target Did Not See It Coming Target believed itself a victim, but themalware ultimately succeeded as a result oftheir lack of due diligence and deep thinking. A business must consider how technologycould be used, but what else it could be usedfor and where potential threats are. Think like a crook – or hire someone who can.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.You Should Consider A “Cyber 9/11” Do not assume you are too small to be hit, or thatyour business will not be threaten. Malware does not discriminate. Not about the money anymore – we are at cyberwar! Educate yourself, then educate your staff. Be very diligent of third-parties you work withand vet them appropriately. Again, Imagine what could happen and protectyourself.Copyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.19Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Where To Upgrade Your Hardware. What Are The Options?HARDWARE TRENDINGCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.Monitor Recommendations Changing Curved – improved productivity on one monitor4K5K – 4K usable with edges for toolbars/navigation3DTouchPortable Days of 2, 3, 4 monitor recommendations comingto a close because of on screen applicationsnappingCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.20Copyright 2015, K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.

Curved Monitors HP, Samsung, LGCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.HP Family 4K, Curved, 3DCopyright 2015 K2 Enterprises, LLC. Reproduction or reuse for purposes other than a K2 Enterprises’ training event is prohibited.21Copyright 2015, K2 Enterprises,

be performed exclusively by mobile digital assistants. 2. By 2017, U.S. customers' mobile engagement behavior will drive mobile commerce revenue in the U.S. to 50% of U.S. digital commerce revenue. 3. By 2017, 70% of successful digital business models will rely on deliberately unstable