AIS

Accounting Systems News

The page for a scrolling listing of AIS and accounting systems news

EDI

Electronic Data Interchange

  1. Article from GEIS Alumni web does a nice job of explaining EDI. http://www.geis-alumni.com/apps/edi.html
EDI is a set of protocols for conducting electronic business over computer networks. Traditionally, these networks have been private WANS; but EDI is now done over the Internet. EDI defines the electronic exchange of structured business data, such as purchase orders, invoices, and shipping notices, typically between one organization and another. The relationship is usually between a vendor and customer. For example, EDI provides a way for a customer's computer to place orders for goods with a vendor's computers, based on reorder levels. The EDI system coordinates the transaction, initiates deliveries, and generates invoices. ... continues at http://www.geis-alumni.com/apps/edi.html

Enterprise Systems

  1. Main.SAP Enterprise Systems
  2. Main.SAP-Learning

Excel

  1. Excel Keyboard Shortcuts for PC and MAC

Listing of 222 different keyboard shortcuts at https://exceljet.net/keyboard-shortcuts in a nice table.

  ... more ...
  1. Excel References Page on the Main wiki
  2. Excel Tips And Tricks on the Main wiki

Strategic IT

This category continues to be very important and needs a page for itself.

Internal Control

The survey report by protiviti is based on a survey of 735 board members and executives to rate the likely impact that various risk issues will have on their organizations in 2017.
  ... more ...

Fraud (Internal Controls, Segregation of Duties)

A short list of cases that may be instructive for thinking about internal controls, segregation of duties, reconciliations, and monitoring.

  1. $3.1 million from diverted customer payments, price changes, and G/L entries

    Company: Cargill, Inc. Port of Albany (NY) facility, which receives, stores and sells grain products

    ... more ...

The Cybersecurity Canon

Interesting website: The Cybersecurity Canon - books every cybersecurity professional should read. The goal of the site is To identify a list of must-read books for all cybersecurity practitioners – be they from industry, government or academia -- where the content is timeless, genuinely represents an aspect of the community that is true and precise, reflects the highest quality and, if not read, will leave a hole in the cybersecurity professional’s education that will make the practitioner incomplete.

The complete list has been organized as a List on LibraryThing: http://www.librarything.com/list/11177/all/Cybersecurity-Canon-award-winners-

  ... more ...

Systems Stories:

XBRL - financial reporting and data


Backlinks

Total Count: 472353 | Page Views: 536