Workflow Automation Payoff

How Often Does Investing
In Workflow Automation
Pay Off 10-to-1
In the First Month?

In one month, our client received a return on automation more than ten times what they paid to us! A very healthy ROI.

 

Java Holdings is a food and merchandise liquidator. They purchase meat, poultry, canned and frozen food and more. They buy small and large lots, including short-coded food. To increase sales, Java engaged MBSG to automate the preparation and delivery of Sales Sheets.

 

With the workflow automation that MBSG created, Java can now send Sales Sheets for more items, to more customer, more often -- at greatly reduced lead time and cost.

 

Read More at Automation Success Story.

In one month, our client received a return on automation more than ten times what they paid to us! A very healthy ROI.   Java Holdings is a food and merchandise liquidator. They purchase me...

 

Sage 100 Newsletter

Sage 100 Newsletter
April 2017

For users of Sage 100c (subscription pricing) ERP software, Sage announced the following

 

  • Free Multi-Bin module for Inventory Management
  • Free Designer Module for Sage Intelligence Reporting (SIR)

 

For the Multi-Bin module, note that this is the basic version of multi-bin. If you are using the manufacturing modules, you will need the advanced version of mult-bin, at additional cost.

 

The Designer Module dramatically simplifies the process of editing and creating new reports with SIR.

For both of the free modules, note that Sage provides these to  registered users of Sage 100c (not Sage 100) who are current on software maintenance.

For details, visit our Sage 100 Newsletter http://conta.cc/2oONKnI

For Sage 100c, two free modules now available: 1) Multi-Bin Inventory, and 2) Designer for Sage Information Reporter (SIR)

 

N/A

How To Use Memorized Transactions In QuickBooks
 

Do you have many recurring transactions such as bills (payables), invoices, purchase orders?

 

If so, QuickBooks can save you time and errors with a feature called Memorized Transactions.

 

For example, you might make a rent payment every month. With QuickBooks memorized transactions, you could add that transaction to a Reminders List. QuickBooks will prompt you every time the transaction comes due. Even if the dollar amount changes with each occurence, QuickBooks can remember all of the other data fields, to save you time.

 

Our QuickBooks newsletter provides details on how to use Memorized Transactions. http://conta.cc/2nEhoOw

How to use Memorized Transactions in QuickBooks

 

N/A

Not the Software Police, But--
A  License Audit May Soon Arrive

Business Owners know and expect financial audits. What they may not expect is having to pass a Software License audit.

 

Microsoft has been aggressively auditing its customers. No company is immune. It is no longer, if you get audited, it is when.

Business Owners know and expect financial audits. What they may not expect is having to pass a Software License audit.   Microsoft has been aggressively auditing its customers. No company i...

 

N/A

Protect Yourself 

From Cyber Crooks

Who Want to Steal Your Data

 Despite firewalls and other security gizmos that protect our networks and devices, we are still very exposed. Crooks and other bad guys know that the easiest way to break into your system is to trick someone into ‘opening the door.’

 

Cyber phishing doesn’t rely on security flaws in your operating systems or exploiting weaknesses in digital infrastructure. A phishing scam targets the most unstable and unpredictable elements in the layers of defenses -- people.The Hacker wants to trick you nto doing what the Hacker wants:

 

  • Click a link
  • Log into a website
  • Open an Attachment
  • Grant access to your social media account
  • Grant access to your email or other data

The Hacker’s technique may be sophisticated or laughable. But the goal is the same. To steal valuable information on you and others.

 

 Here are 8 Tips to protect your data and your identity.

Cyber crooks want to steal your data and your identity. Protect yourself, your colleagues, clients and customers.

 

N/A

Microsoft Stops Nagging.
Starts Updating to Windows 10 --Without Your Permission !

As many of you know, Microsoft has been prompting (nagging) users with the offer to upgrade to Windows 10 for free, from Windows 7 or 8.

Recently  however, people are discovering that Microsoft has automatically installed Windows 10—without permission.  Surprise!

Imagine that you start up your computer ready to begin work and find a Windows 10 splash screen. The screen informs you that it has completed the upgrade to Windows 10!  The screen offers to ‘roll back’, but with warnings on the consequences.

As many of you know, Microsoft has been prompting (nagging) users with the offer to upgrade to Windows 10 for free, from Windows 7 or 8. Recently  however, people are discove...

 

N/A

Security vs. Privacy
FBI vs. Apple

As many of you know, the FBI has asked Apple to help unlock a cellphone that belonged to the San Bernardino shooter. The phone may have clues useful to the FBI. Apple, which has cooperated with the FBI in the past, refused this request. Apple claims that creating a backdoor will destroy security that millions of users depend upon.

Some news media frame this as a balance between Security and Privacy. Beyond privacy, we see this as a battle of Secure vs. Not Secure.

In our IT security practice, we review, identify and remediate security risks and exposures. We routinely find backdoors that someone created deliberately or left open through ignorance. An open backdoor is a security risk – even if created with good intentions.

Every day, businesses make conscious judgements balancing security vs. convenience. With the FBI vs. Apple dispute, now the US courts will consider competing objectives.

From a technical perspective, we have never a seen a backdoor that only ‘the good guys’ can enter.

If the FBI is successful in forcing Apple to weaken security, there is no mechanism to ensure that only ‘the good guys’ will have access.

As many of you know, the FBI has asked Apple to help unlock a cellphone that belonged to the San Bernardino shooter. The phone may have clues useful to the FBI. Apple, which has cooperated with the FB...

 

N/A

Richard Randle Nominated as Los Angeles Business Journal CIO of the Year 2015

Richard serves as outsourced CIO (Chief Information Officer) to MBSG clients. He provides IT Strategy and IT support.

"Richard is the rare breed of IT consultant who speaks geek to his IT peer group, but also clearly communicates with Management -- costs, benefits, ROI and risks. He designs and deploys information technology that make good business sense".

Richard and the MBSG consulting team help clients evaluate IT strategy alternatives in-the-cloud and on-the-ground, including Office 365.

Among many strengths that influenced the LA Busines Journal to nominate Richard as  CIO of the year, Richard is particularly adept at achieving collaboration in tense situations where technical advisors present conflicting recommendations.

Richard serves as outsourced CIO (Chief Information Officer) to MBSG clients. He provides IT Strategy and IT support. "Richard is the rare breed of IT consultant who spe...

 

Created & Powered by Majestic Imaging
×

dark web attacker md