Software vendors want you to pay for your products monthly. You can see this shift with Microsoft Office 365 and with Adobe Acrobat. The traditional model of purchase the software…
Category: Articles
The Benefits Of Workflow Automation
The following post was written by Valerie Silvani, Vice President of Sales and Marketing at Gravity Software. Valerie was kind enough to allow us to share it with our readers.…
Technology Tools-Change With The Times
Are you doing things the same old way? Do you wish there were an easier way? Have you noticed how rapidly our technology tools are changing? Continuous updates via the…
Five Technologies We Gained From The Space Race
With all the headlines surrounding the 50th anniversary of “man on the moon,” I’ve been intrigued by some of the technologies that were associated with the Space Race and how…
Seven Mistakes to Avoid When Purchasing Accounting Software
The following post was written by Valerie Silvani, Vice President of Sales and Marketing at Gravity Software. Valerie was kind enough to allow us to share it with our readers.…
Major Changes Now Available In Power BI
Microsoft’s June 2019 update to Power BI was a significant one in many regards. Not only did Microsoft radically overhaul the user interface, they added many new usability and performance…
Do We Overuse Excel?
“Do accounting and financial professionals overuse Excel?” It’s a fair question and one that should be considered. The presence of the ubiquitous spreadsheet cannot go unnoticed in virtually all organizations.…
Five Tips For Improving Personal Privacy
Personal privacy is a “hot” topic in many circles today. Many individuals are becoming increasingly outraged when they learn how much information has been collected about them and how it…
Using Excel's Transform Data by Example Add-in
Using Excel’s Transform Data by Example Add-in Dating back to Excel 2010, Microsoft has been adding features to Excel to assist us in transforming our data so that it is…
How To Avoid Being A Victim Of Social Engineering
One of the key emerging threats of the digital age is social engineering, which is tricking someone into parting with personal information or into taking some kind of action through…