SlideShare a Scribd company logo
1 of 6
Download to read offline
You have to also consider
the possibility of a cloud
provider going out of
business, having service
outages, being acquired
by another company, or
having a security breach.
Any of these events could
spell disaster for your
data.
At this stage, it is the
hybrid cloud solution that
is most effective for
natural resource based
companies operating in
remote offices. These
companies include chip
mills, wood dealerships,
timber management
companies, and oil field
service operations.
The hybrid cloud
combines internal
computing resources on
(Continued on page 2)
That’s all you hear these
days. The cloud this. The
cloud that. Your files are in
the cloud. Apple’s iCloud.
Backup to the cloud. You get
my point.
I have to admit. I use the
word “cloud” pretty fast and
loose when I talk about our
business systems. Most
people nod, as if to say, “I’m
not sure where the heck
cloud is, but I know it’s up
there somewhere and not
down below… and that’s a
good thing!”
Despite all this hype, the
cloud is not generally
understood. What is the
cloud, anyway? And more
importantly, can the cloud
benefit the remote office
operations of forestry, forest
products, and oil field
service businesses?
Cloud computing is not a fit
for every company. If you
don’t get all the facts or fully
understand the pros and
cons, you can make some
VERY poor and expensive
decisions you’ll deeply regret
later.
In the right situation, the
cloud can lower costs, allow
remote offices and remote
employees to connect and
work, and simplify the
infrastructure of an
operation. There are certain
pitfalls to the cloud and we’ll
examine those, too.
In plain English, the cloud refers
to computers located in a
central location containing
computer programs and data. In
cloud computing, you have the
ability to use to these programs
and data over the internet
without having to own, manage,
or backup those computers.
There are a some issues with
the pure cloud arrangement,
where all programs and data are
stored in the cloud. While a pure
cloud solution may be cheaper,
the lack of control over your
data when it is located only
offsite can be a cause for
concern for your business. In
other words, it doesn’t seem
right that you don’t have control
over your own critical company
data.
Hemard & Company
April-June 2015
Client Connection
Inside this issue:
What About The Cloud? 1
News and Commentary 1
Why I Work 2
Time Well Wasted 2
A Valuable Report 4
More Time Well Wasted 5
Books I’ve Read Recently 6
From the desk of Victor E Hemard Jr, President
News And Commentary:
Former Secretary of
State Clinton’s E-mail
And Its Security
Implications
On March 10, 2015, former
Secretary of State Hillary Clinton
held a press conference at the
United Nations to present her
position as to why she used a
private e-mail account for
government business. More
importantly, she was asked why she
had her own e-mail server in her
home in Chappaqua, New York and
was that server secure?
In her prepared remarks she said, “I
thought it would be easier to carry
one device for my work and for my
personal e-mails instead of two.”
Let’s examine this from a
technology standpoint rather than
that of the low-information voter.
We all know you can put more than
one e-mail account on a device. So,
if she was carrying a Blackberry,
iPhone, or Android, she could have
multiple e-mail accounts on it.
(Continued on page 4)
Time Well Wasted (See Page 2)
Sometimes I’m asked, “Why do you work
so hard?”
I’ve thought about it from time to time and
there are many good reasons for work.
I’ve always liked the idea of being an
entrepreneur and consider myself a
student of the dynamics involved in
running and growing a business. It’s a
challenge. I want to stay sharp. I could
work on crossword puzzles all day or I
could stay sharp by working on real
problems in real situations. In business,
there are all kinds of mind-sharpening
problems. You don’t have to look far to
find one. They’ll find you.
Another reason I work is I like what I do
and I like our clients. The clients we didn’t
fit in with are no longer clients. As for the
clients we have now, I’ve spent years
building relationships and wish to continue
those relationships. So… I work.
For one thing, I think I have it pretty darn
good. I’ve worked hard over the years and
took some risks to get this far. It’s a waste
for someone to have talents and not use
them to help other people and other
businesses. So… I work.
I recently read an article by Anthony Weller
in The Wall Street Journal entitled,
“Paralyzed From the Neck Down.” Weller is
a writer and former professional musician
who became paralyzed five years ago from
the neck down from an incurable form of
multiple sclerosis. He is 57 now. He has
continued to produce writing by dictation
but can no longer play guitar.
I assure you, if he could get up and walk,
thoughts of sleeping in or going on a tour
bus to Branson, Missouri would be the last
thing on his mind. We take the very
simplest gifts for granted. Somehow
Weller remains productive and positive. I
can’t imagine his level of quiet
desperation at times.
When I look at how fortunate I and many
others who take walking and other simple
tasks for granted, it’s a shame not to do
something worthwhile. So… I work.
(Continued on page 4)
the premises with the
external resources of the
cloud. The advantages of
both the cloud and the
traditional on-site network
of computers are merged
to form a workable
solution for remote offices
in natural resource-based
companies.
Lets take accounting
software, for instance, like
the Forest Products
Accounting (FPA) system.
The best hybrid cloud
solution comes in two
forms. The first is the
traditional local area
computer network with
the programs and data on
site. These programs and
data are then backed up
on site for quick access
and local control of the
data with the added
function of sending the
programs and data safely
into the cloud in case
there is a natural disaster
on the premises.
(Continued from page 1) A second hybrid cloud
solution for FPA is often
employed by larger
organizations. In this
solution, the company has
a server or servers at a
central location. These
servers are maintained
and backed up by the
company. Company
employees at the various
remote offices access the
company servers to run
programs and save data on
the company servers.
In this second hybrid cloud
arrangement, the company
has its own private cloud,
so to speak, with secure
access available to its
employees in the remote
offices. They maintain their
own servers at a central
location and are
responsible for all the data
backup and business
continuity systems
necessary to protect
computer resources and
insure business continuity
in the event of a disaster at
the central location.
In both hybrid cloud
arrangements, there is a
local backup in the form of
a network attached storage
(NAS) device combined
with an offsite secure
location to store data in
case severe disaster takes
out the on-site computers
and the on-site NAS.
One issue that often
affects certain remote
locations is the speed and
reliability of their internet
connection. If their
connection is slow or
unreliable, the hybrid cloud
solution allows companies
to run lightning fast at their
office, regardless of their
connection speed. Yet,
they have an option to
send backup and business
continuity information
offsite in case of disaster.
In a perfect world, a pure
cloud solution looks great.
In reality, however, the
hybrid cloud gives natural
resource based companies
more control of their
programs and data and
more flexibility and safety
for those computer
resources.
Page 2
Client Connection
Why I Work
Time Well Wasted: Easter
People are asking me,
”Got any trips planned?”
Well, to be honest. We’ve
been quite busy just
taking care of business
and spending time with
the new additions to the
family.
That doesn’t mean I’m not
thinking about some “time
well wasted” opportunities
later in the year. One
possibility is a physical
challenge; another is a trip
out to the Carolinas;
maybe a trip up north.
For now, though, the
Easter holiday was a
perfect chance for our
family to get together in
Texarkana. We were short
a few people, primarily my
daughter Laura and son-in
-law Greg, who had been
in just recently and my son
-in-law Drew who started a
new job at WKYC in
Cleveland that week.
Nonetheless, we had my
son Brandon, wife
Stephanie, and my
granddaughter Clara in for
a few days, as was my
daughter Kristin and
granddaughter Juliet.
On Easter Sunday morning,
we attended Mass and got
some photos. Later in the
day, my in-laws from
(Continued on page 3)
Time Well Wasted: Easter (continued)
Shreveport and Houston
drove up from Shreveport for
the day to have dinner with
us and to play with the
grandchildren.
Our grandchildren, Juliet and
Clara, are growing fast. At
Easter, they were 9 months
and 5 months, respectively.
Juliet was not quite ready to
walk and Clara was not quite
ready to crawl. We had a lot
of fun having them around.
They’re both bright-eyed,
happy babies. We are all
very blessed to have them.
We managed to get a few
photos, so look over this
page for a peek at our Easter
holiday.
(Continued from page 2)
Page 3
April-June 2015
Top to Bottom: 1. Clara with her
first Easter egg, 2. Brandon and
Stephanie with Clara after Mass.
3. Clara and Juliet looking to see
what the Easter Bunny left in
their baskets. Juliet has a head
start on her younger cousin. 4.
Family photo at Sacred Heart
Catholic Church. 5. Juliet at
Sacred Heart Church looking
right into the camera. 6. Drew,
Kristin, and Juliet right before
Drew departed for Cleveland.
Certainly, there are many
other reasons I work. My
family, for one. Personal
achievement is another.
What about financial
freedom? How about more
disposable income and a
better life my family and I
would have than if I
engaged in idleness day
after day in front of the
TV? So… I work.
(Continued from page 2) After George Foreman
retired from boxing, he was
a has-been nobody cared
about any more. Broke and
unable to find work, he
vowed to God if He helped
him overcome this rough
spot in his life, he would
never again complain about
hard work, and would
continue to work until he
was no longer able to. This
was before the George
Foreman Grill made him a
multi-millionaire. He still
continues to work,
however, long after he no
longer needs to.
Why? For one thing,
George Foreman made a
vow and, like me, he
appreciates hard work and
doesn’t feel the need to
escape it.
Therefore, with much
appreciation… I work.
Page 4
Client Connection
Why I Work (continued)
News and Commentary: Former
Secretary of State Clinton’s E-mail
The other problem with Mrs. Clinton’s
statement is she said in an earlier
interview she uses her Blackberry,
iPhone, iPad, and iPad Mini. The
Associated Press even printed e-mails
sent from her iPad during her tenure as
Secretary of State. So what gives with
Mrs. Clinton?
By the way, you might be wondering why
I don’t call Mrs. Clinton by her first
name, Hillary.
Well, my parents always taught me be
respectful of older people regardless of
their behavior or lack of respectability.
Mrs. Clinton falls into this category. She
is now 67 and has not driven a car since
1996. Her age requires a certain
amount of respect. I also sympathize
with her because she flies everywhere in
a private jet or has a chauffer to
transport her in a car or limousine. She
has it tough. I’m sure she’ll have no
problem relating to the average citizen in
this country in her bid for the presidency.
Back to the e-mail analysis…
In Mrs. Clinton’s remarks she also
stated. “The server contains personal
communications from my husband and
me, and I believe I have met all of my
responsibilities. And the server will
remain private.”
There’s are problems with this
statement. Bill Clinton’s spokesman told
the Wall Street Journal Mr. Clinton only
used e-mail twice in his entire life. That
was back in the 90s when he was
president of the United States.
As for the server remaining private, it
has not only remained private, all the
information from the server has been
wiped clean. I doubt it even physically
exists now just to avoid any potential
forensic data recovery. All this in what
was supposed to be the most
transparent administration ever.
(Continued from page 1)
(Continued on page 6)
A Valuable FPA Report For Accounts Receivable
One report often
overlooked in the Forest
Products Accounting
system is a rather
unassuming report entitled
Accounts Receivable Open
Aging Summary by
Customer. Just paying
attention to this report will:
1. Help you with your trade
receivables (money your
customers owe you). 2.
Help you with your general
ledger accounting. 3. It will
be a check against your
setup and file mainte-
nance.
How much does your
customer owe you?
Regardless of whether it’s
a paper mill, chip mill,
sawmill, or buyer of
finished lumber, you will
get the amount owed to
you as of any given date
and how current their
account is. By default, the
amounts due from your
customer are aged as
current, 1-30 days, 31-60
days, 61-90 days, and
Over 90 days. You may set
your own values for aging
to suit your needs.
Generally speaking, if you
normally get paid within two
weeks for deliveries and
your customer has an
amount due in the 31-60
day column. That could
mean another company got
paid for your delivery or it
could mean the customer is
becoming a slow pay,
improving their cash flow at
your expense. Both
situations should be
investigated with a call to
determine the cause of the
delay in payment.
If the amount due is on one
ticket, then it is likely your
load was paid to another
supplier (see Garden States
on the report sample, page
5). If the amount due is a
whole week’s deliveries,
then there is probably a
check lost in the mail or
direct deposit not issued, or
they are managing their
cash flow at your expense
(see Great Pacific).
A second use for the report
is to reconcile any possible
differences between the
open balance on this report
and your Accounts
Receivable—Trade account
on your balance sheet.
The Grand Total on the AR
Open Aging Summary,
when it is generated
based on the accounting
period, should equal the
Accounts Receivable—
Trade account on the
balance sheet for that
accounting period. If not,
it may mean incorrect
account number
distribution in the file
maintenance or other
problems. We have a
checklist available to help
us reconcile these
differences in the
balances.
You can use this checklist
yourself on request or we
can assist you in getting
the accounts back in
balance.
Finally, if you notice on the
report large sums
accumulated in the 61-90
days column or in the Over
90 days column, it means
you have a customer who
has not paid you for a long
time or there is some fault
in your setup and file
maintenance (see
Livingston Lumber
(Continued on page 5)
Company). This can occur in situations
where wood products are purchased at a
concentration yard, then resold to the final
destination. Sometimes the user will enter
a destination price for the concentration
yard and mark it as an accounts receivable
for the yard when no money was actually
due to be paid from the customer until it
was shipped to the final destination (paper
mill or plywood mill, for instance). The
result can be overstated accounts
receivable and overstated wood sales. This
will require your immediate attention to
(Continued from page 4) correct the setup and file maintenance
and make the proper journal entries to
correct the general ledger.
As a side note, the Log Inventory module
in FPA will help prevent duplication of
sales and accounts receivable by
managing multiple inventory accounts at
the concentration yard. Proper setup and
file maintenance will give you the desired
results.
The AR Open Invoice Aging Summary By
Customer Report is a powerful tool in
managing your accounts receivable. It can
help you keep up with unpaid tickets
(invoices) and slow-paying customers
(mills), check your balance sheet, and
help you uncover any possible setup and
file maintenance issues associated with
wood storage and transfer to the final
destination.
The AR Open Invoice Aging Summary By
Customer is one of many reports
available in FPA to help you manage
your business and keep your general
ledger in good shape.
Please feel free to contact us anytime
for remote or on-site support in the use
of the many reports in FPA.
Page 5
A Valuable FPA Report For Accounts Receivable (continued)
More Time Well Wasted: A Crawfish Boil
Crawfish anyone? As part of my mother-in-law’s 88th
birthday celebration, we decided to have a crawfish
boil. We boiled 63 pounds of crawfish. Growing up in
South Louisiana, I caught and ate a lot of crawfish but
didn’t do a lot of the boiling. So, I called Jim Thomas
and Ricky Hartman for some expert advice and all
turned out well. The crawfish were well-seasoned and everyone had an
enjoyable evening. We’re looking forward to having one next year, too!
Left: Brandon and I encourage Nancy to add more seasoning to the boil. Right: Birthday celebration on the bridge
three months of Hillary Clinton’s
tenure as secretary of state—she
left this easily interceptable by
any decent SIGINT service.”
SIGINT is short for signals
intelligence (electronic spying).
Schindler continued, “The name
Clinton right on the e-mail handle
meant this was not a difficult
find. We should assume
Russians, Chinese, and others
were seeing this. In all, this is a
counterintelligence disaster of
truly epic proportions….”
An unsecured server may also
act as a gateway to penetrate
other government systems,
including classified information
on other government servers. We
don’t really know.
Normally, a server that has been
compromised would be
impounded by the FBI and then
have a forensic analysis
performed to determine what
breaches in security have
occurred. Well, that’s not going to
happen because it has been
wiped clean. And let’s face it, the
Clintons operate under their own
set of rules until someone calls
them on it.
So why did Mrs. Clinton use
private e-mail accounts and a
personal e-mail server?
It’s one thing if you want to keep
Regarding the security of her
private server, Mrs. Clinton
explained, “It had numerous
safeguards. It was on property
guarded by the Secret Service.
And there were no security
breaches.”
The server was guarded by the
Secret Service. Mail servers
aren’t normally attacked by
entering the premises,
however. They are attacked
through the connection to the
Internet required to send and
receive e-mail.
This e-mail server, because it
wasn’t under the shield of the
government, was a spy
magnet for Iranian, Chinese,
Russian, and other
intelligence services.
She hired a Cablevision
subsidiary to run the server
and had antivirus protection
from McAfee. Somehow I don’t
get the feeling of security
here.
According to John Schindler, a
former National Security
Agency counterintelligence
officer, there were few
safeguards: “By using her own
private server with e-mail—
which we now know was
totally unencrypted for the first
(Continued from page 4)
Page 6
April-June 2015
your personal correspondence
private. The statements about
using one device and e-mail
correspondence with Bill Clinton
don’t pass the smell test for
honesty and transparency. The
fact that Mrs. Clinton was asked
about this e-mail arrangement by
Congress in 2012 but never
responded, is also troubling.
Could it be she did not want
anything on a government server
readily available to the Obama
administration or the public that
could be used against her?
Was it all the foreign money
flowing into the Clinton
Foundation and the Clinton
Global Initiative during her tenure
as secretary of state? Would the
sources and timing of those
donations prove embarrassing?
What do you think?
We may never know for sure. The
real incriminating e-mails have
been deleted and electronically
shredded. The server containing
those e-mails is probably at the
bottom of the Hudson River.
As Mrs. Clinton once said about
the Benghazi scandal, "What
difference – at this point, does it
make?"
It matters, alright. This break in
our national security will surely
cost us down the road.
4601 Woodstock Ln
Texarkana, TX 75503
Phone: 800-467-5819
Fax: 903-831-5730
E-mail: ask@hemard.com
Mission and Purpose
To provide systems for
effective management of
natural resource
companies. This is done
with a complete system of
implementation,
management, and security
of these systems.
Excellence is accomplished
by using the best of breed
technology, hands-on
training, and user-friendly
support.
Who We Serve
Our clients include wood
dealerships, consulting
forestry firms, chip mills,
sawmills, timber
investment management
organizations, and oil field
service companies.
Primary Offerings
Forest Products Accounting
FPA Oilfield Accounting
Network Protection and
Management
Backup and Business
Continuity
FPA Supplemental Training
FPA Failover Service
InWoodsExpo 2015
Hot Springs, June 18-20
www.arkloggers.com
News And Commentary: Former Secretary of State Clinton’s E-mail And Its
Security Implications
Scaling Up: How a Few
Companies Make It … and
Why the Rest Don’t by Verne
Harnish
Scaling Up is organized
around the four decisions you
must address in growing a
company: People, Strategy,
Execution, and Cash.
There are several one-page
tools designed to help you through
the process of planning effective
growth.
If you’re really serious, you can
take the one-page tools Harnish
offers and do the hard work
required to fill them out. As a
result, you will have given yourself
a framework for making changes
in your company.
If you’re not sure, I suggest
reading through a chapter,
taking some of the fresh ideas
Harnish offers, and making
note of them for future use.
You can always dive into the
one-page tools later.
In any case, I think you’ll find
the book interesting and gain
some proven ideas for
growing your business.

More Related Content

Viewers also liked

ClientConnection2016-05
ClientConnection2016-05ClientConnection2016-05
ClientConnection2016-05Vic Hemard
 
Planning production
Planning productionPlanning production
Planning productioncharlijw123
 
Brochure-AH-Agusut-2014
Brochure-AH-Agusut-2014Brochure-AH-Agusut-2014
Brochure-AH-Agusut-2014Koen Klouwens
 
The AGENCY Inc. - Our Work
The AGENCY Inc. - Our WorkThe AGENCY Inc. - Our Work
The AGENCY Inc. - Our WorkNicole Norris
 
Awarded travalarm app delivered by i mobdev technologies
Awarded travalarm app delivered by i mobdev technologiesAwarded travalarm app delivered by i mobdev technologies
Awarded travalarm app delivered by i mobdev technologiesDev Patel
 
Analisis dan rancangan basis data terpusat
Analisis dan rancangan basis data terpusatAnalisis dan rancangan basis data terpusat
Analisis dan rancangan basis data terpusatkykioshita
 
Surplus Note report - A.M. Best
Surplus Note report - A.M. BestSurplus Note report - A.M. Best
Surplus Note report - A.M. BestAnace Ahmed
 

Viewers also liked (11)

ClientConnection2016-05
ClientConnection2016-05ClientConnection2016-05
ClientConnection2016-05
 
Bs pai sma kelas xi
Bs pai sma kelas xiBs pai sma kelas xi
Bs pai sma kelas xi
 
Planning production
Planning productionPlanning production
Planning production
 
Brochure-AH-Agusut-2014
Brochure-AH-Agusut-2014Brochure-AH-Agusut-2014
Brochure-AH-Agusut-2014
 
The AGENCY Inc. - Our Work
The AGENCY Inc. - Our WorkThe AGENCY Inc. - Our Work
The AGENCY Inc. - Our Work
 
Awarded travalarm app delivered by i mobdev technologies
Awarded travalarm app delivered by i mobdev technologiesAwarded travalarm app delivered by i mobdev technologies
Awarded travalarm app delivered by i mobdev technologies
 
ali_safe
ali_safeali_safe
ali_safe
 
Secondary evidence
Secondary evidenceSecondary evidence
Secondary evidence
 
Resume
ResumeResume
Resume
 
Analisis dan rancangan basis data terpusat
Analisis dan rancangan basis data terpusatAnalisis dan rancangan basis data terpusat
Analisis dan rancangan basis data terpusat
 
Surplus Note report - A.M. Best
Surplus Note report - A.M. BestSurplus Note report - A.M. Best
Surplus Note report - A.M. Best
 

Similar to ClientConnection2015-06

ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08Vic Hemard
 
8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing PaperDebra Perea
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OMichael Roytman
 
Cloud Information Management for Dummies
Cloud Information Management for DummiesCloud Information Management for Dummies
Cloud Information Management for DummiesLiberteks
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009ITbyTheSea
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Philip Oakley
 
ClientConnection2016-01
ClientConnection2016-01ClientConnection2016-01
ClientConnection2016-01Vic Hemard
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfPolicypros.co.uk
 
Briefings direct transcript how florida school district tames the wild west o...
Briefings direct transcript how florida school district tames the wild west o...Briefings direct transcript how florida school district tames the wild west o...
Briefings direct transcript how florida school district tames the wild west o...Dana Gardner
 
Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Liz Sims
 
CLOUD_Presentation PB BNI
CLOUD_Presentation PB BNI CLOUD_Presentation PB BNI
CLOUD_Presentation PB BNI Philip Base
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.uNIX Jim
 
B3: Backup & its relevance
B3: Backup & its relevanceB3: Backup & its relevance
B3: Backup & its relevanceRevolucion
 
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docx
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docxRunning head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docx
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docxtoltonkendal
 
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...Dana Gardner
 

Similar to ClientConnection2015-06 (20)

ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
ClientConnection2015-08
ClientConnection2015-08ClientConnection2015-08
ClientConnection2015-08
 
8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper8 Best Images Of Printable Lined Letter Writing Paper
8 Best Images Of Printable Lined Letter Writing Paper
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Less is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/OLess is More: Behind the Data at Risk I/O
Less is More: Behind the Data at Risk I/O
 
Cloud Information Management for Dummies
Cloud Information Management for DummiesCloud Information Management for Dummies
Cloud Information Management for Dummies
 
Caloosa Tech Times October 2009
Caloosa Tech Times October 2009Caloosa Tech Times October 2009
Caloosa Tech Times October 2009
 
Essay Information
Essay InformationEssay Information
Essay Information
 
12 facts about backups
12 facts about backups12 facts about backups
12 facts about backups
 
Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012Taste of the Cloud Prime Accountants June 2012
Taste of the Cloud Prime Accountants June 2012
 
ClientConnection2016-01
ClientConnection2016-01ClientConnection2016-01
ClientConnection2016-01
 
Data dynamite presentation
Data dynamite presentationData dynamite presentation
Data dynamite presentation
 
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdfNCSC_A5_Small_Business_Guide_v4_OCT20.pdf
NCSC_A5_Small_Business_Guide_v4_OCT20.pdf
 
Briefings direct transcript how florida school district tames the wild west o...
Briefings direct transcript how florida school district tames the wild west o...Briefings direct transcript how florida school district tames the wild west o...
Briefings direct transcript how florida school district tames the wild west o...
 
Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.Essay Statement Of Purpose Sketsa. Online assignment writing service.
Essay Statement Of Purpose Sketsa. Online assignment writing service.
 
CLOUD_Presentation PB BNI
CLOUD_Presentation PB BNI CLOUD_Presentation PB BNI
CLOUD_Presentation PB BNI
 
Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.Biggest info security mistakes security innovation inc.
Biggest info security mistakes security innovation inc.
 
B3: Backup & its relevance
B3: Backup & its relevanceB3: Backup & its relevance
B3: Backup & its relevance
 
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docx
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docxRunning head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docx
Running head UTILITY AND CLOUD COMPUTING2UTILITY AND CLOU.docx
 
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
How Dashboard Analytics Bolster Security and Risk Management Across IT Supply...
 

ClientConnection2015-06

  • 1. You have to also consider the possibility of a cloud provider going out of business, having service outages, being acquired by another company, or having a security breach. Any of these events could spell disaster for your data. At this stage, it is the hybrid cloud solution that is most effective for natural resource based companies operating in remote offices. These companies include chip mills, wood dealerships, timber management companies, and oil field service operations. The hybrid cloud combines internal computing resources on (Continued on page 2) That’s all you hear these days. The cloud this. The cloud that. Your files are in the cloud. Apple’s iCloud. Backup to the cloud. You get my point. I have to admit. I use the word “cloud” pretty fast and loose when I talk about our business systems. Most people nod, as if to say, “I’m not sure where the heck cloud is, but I know it’s up there somewhere and not down below… and that’s a good thing!” Despite all this hype, the cloud is not generally understood. What is the cloud, anyway? And more importantly, can the cloud benefit the remote office operations of forestry, forest products, and oil field service businesses? Cloud computing is not a fit for every company. If you don’t get all the facts or fully understand the pros and cons, you can make some VERY poor and expensive decisions you’ll deeply regret later. In the right situation, the cloud can lower costs, allow remote offices and remote employees to connect and work, and simplify the infrastructure of an operation. There are certain pitfalls to the cloud and we’ll examine those, too. In plain English, the cloud refers to computers located in a central location containing computer programs and data. In cloud computing, you have the ability to use to these programs and data over the internet without having to own, manage, or backup those computers. There are a some issues with the pure cloud arrangement, where all programs and data are stored in the cloud. While a pure cloud solution may be cheaper, the lack of control over your data when it is located only offsite can be a cause for concern for your business. In other words, it doesn’t seem right that you don’t have control over your own critical company data. Hemard & Company April-June 2015 Client Connection Inside this issue: What About The Cloud? 1 News and Commentary 1 Why I Work 2 Time Well Wasted 2 A Valuable Report 4 More Time Well Wasted 5 Books I’ve Read Recently 6 From the desk of Victor E Hemard Jr, President News And Commentary: Former Secretary of State Clinton’s E-mail And Its Security Implications On March 10, 2015, former Secretary of State Hillary Clinton held a press conference at the United Nations to present her position as to why she used a private e-mail account for government business. More importantly, she was asked why she had her own e-mail server in her home in Chappaqua, New York and was that server secure? In her prepared remarks she said, “I thought it would be easier to carry one device for my work and for my personal e-mails instead of two.” Let’s examine this from a technology standpoint rather than that of the low-information voter. We all know you can put more than one e-mail account on a device. So, if she was carrying a Blackberry, iPhone, or Android, she could have multiple e-mail accounts on it. (Continued on page 4) Time Well Wasted (See Page 2)
  • 2. Sometimes I’m asked, “Why do you work so hard?” I’ve thought about it from time to time and there are many good reasons for work. I’ve always liked the idea of being an entrepreneur and consider myself a student of the dynamics involved in running and growing a business. It’s a challenge. I want to stay sharp. I could work on crossword puzzles all day or I could stay sharp by working on real problems in real situations. In business, there are all kinds of mind-sharpening problems. You don’t have to look far to find one. They’ll find you. Another reason I work is I like what I do and I like our clients. The clients we didn’t fit in with are no longer clients. As for the clients we have now, I’ve spent years building relationships and wish to continue those relationships. So… I work. For one thing, I think I have it pretty darn good. I’ve worked hard over the years and took some risks to get this far. It’s a waste for someone to have talents and not use them to help other people and other businesses. So… I work. I recently read an article by Anthony Weller in The Wall Street Journal entitled, “Paralyzed From the Neck Down.” Weller is a writer and former professional musician who became paralyzed five years ago from the neck down from an incurable form of multiple sclerosis. He is 57 now. He has continued to produce writing by dictation but can no longer play guitar. I assure you, if he could get up and walk, thoughts of sleeping in or going on a tour bus to Branson, Missouri would be the last thing on his mind. We take the very simplest gifts for granted. Somehow Weller remains productive and positive. I can’t imagine his level of quiet desperation at times. When I look at how fortunate I and many others who take walking and other simple tasks for granted, it’s a shame not to do something worthwhile. So… I work. (Continued on page 4) the premises with the external resources of the cloud. The advantages of both the cloud and the traditional on-site network of computers are merged to form a workable solution for remote offices in natural resource-based companies. Lets take accounting software, for instance, like the Forest Products Accounting (FPA) system. The best hybrid cloud solution comes in two forms. The first is the traditional local area computer network with the programs and data on site. These programs and data are then backed up on site for quick access and local control of the data with the added function of sending the programs and data safely into the cloud in case there is a natural disaster on the premises. (Continued from page 1) A second hybrid cloud solution for FPA is often employed by larger organizations. In this solution, the company has a server or servers at a central location. These servers are maintained and backed up by the company. Company employees at the various remote offices access the company servers to run programs and save data on the company servers. In this second hybrid cloud arrangement, the company has its own private cloud, so to speak, with secure access available to its employees in the remote offices. They maintain their own servers at a central location and are responsible for all the data backup and business continuity systems necessary to protect computer resources and insure business continuity in the event of a disaster at the central location. In both hybrid cloud arrangements, there is a local backup in the form of a network attached storage (NAS) device combined with an offsite secure location to store data in case severe disaster takes out the on-site computers and the on-site NAS. One issue that often affects certain remote locations is the speed and reliability of their internet connection. If their connection is slow or unreliable, the hybrid cloud solution allows companies to run lightning fast at their office, regardless of their connection speed. Yet, they have an option to send backup and business continuity information offsite in case of disaster. In a perfect world, a pure cloud solution looks great. In reality, however, the hybrid cloud gives natural resource based companies more control of their programs and data and more flexibility and safety for those computer resources. Page 2 Client Connection Why I Work Time Well Wasted: Easter People are asking me, ”Got any trips planned?” Well, to be honest. We’ve been quite busy just taking care of business and spending time with the new additions to the family. That doesn’t mean I’m not thinking about some “time well wasted” opportunities later in the year. One possibility is a physical challenge; another is a trip out to the Carolinas; maybe a trip up north. For now, though, the Easter holiday was a perfect chance for our family to get together in Texarkana. We were short a few people, primarily my daughter Laura and son-in -law Greg, who had been in just recently and my son -in-law Drew who started a new job at WKYC in Cleveland that week. Nonetheless, we had my son Brandon, wife Stephanie, and my granddaughter Clara in for a few days, as was my daughter Kristin and granddaughter Juliet. On Easter Sunday morning, we attended Mass and got some photos. Later in the day, my in-laws from (Continued on page 3)
  • 3. Time Well Wasted: Easter (continued) Shreveport and Houston drove up from Shreveport for the day to have dinner with us and to play with the grandchildren. Our grandchildren, Juliet and Clara, are growing fast. At Easter, they were 9 months and 5 months, respectively. Juliet was not quite ready to walk and Clara was not quite ready to crawl. We had a lot of fun having them around. They’re both bright-eyed, happy babies. We are all very blessed to have them. We managed to get a few photos, so look over this page for a peek at our Easter holiday. (Continued from page 2) Page 3 April-June 2015 Top to Bottom: 1. Clara with her first Easter egg, 2. Brandon and Stephanie with Clara after Mass. 3. Clara and Juliet looking to see what the Easter Bunny left in their baskets. Juliet has a head start on her younger cousin. 4. Family photo at Sacred Heart Catholic Church. 5. Juliet at Sacred Heart Church looking right into the camera. 6. Drew, Kristin, and Juliet right before Drew departed for Cleveland.
  • 4. Certainly, there are many other reasons I work. My family, for one. Personal achievement is another. What about financial freedom? How about more disposable income and a better life my family and I would have than if I engaged in idleness day after day in front of the TV? So… I work. (Continued from page 2) After George Foreman retired from boxing, he was a has-been nobody cared about any more. Broke and unable to find work, he vowed to God if He helped him overcome this rough spot in his life, he would never again complain about hard work, and would continue to work until he was no longer able to. This was before the George Foreman Grill made him a multi-millionaire. He still continues to work, however, long after he no longer needs to. Why? For one thing, George Foreman made a vow and, like me, he appreciates hard work and doesn’t feel the need to escape it. Therefore, with much appreciation… I work. Page 4 Client Connection Why I Work (continued) News and Commentary: Former Secretary of State Clinton’s E-mail The other problem with Mrs. Clinton’s statement is she said in an earlier interview she uses her Blackberry, iPhone, iPad, and iPad Mini. The Associated Press even printed e-mails sent from her iPad during her tenure as Secretary of State. So what gives with Mrs. Clinton? By the way, you might be wondering why I don’t call Mrs. Clinton by her first name, Hillary. Well, my parents always taught me be respectful of older people regardless of their behavior or lack of respectability. Mrs. Clinton falls into this category. She is now 67 and has not driven a car since 1996. Her age requires a certain amount of respect. I also sympathize with her because she flies everywhere in a private jet or has a chauffer to transport her in a car or limousine. She has it tough. I’m sure she’ll have no problem relating to the average citizen in this country in her bid for the presidency. Back to the e-mail analysis… In Mrs. Clinton’s remarks she also stated. “The server contains personal communications from my husband and me, and I believe I have met all of my responsibilities. And the server will remain private.” There’s are problems with this statement. Bill Clinton’s spokesman told the Wall Street Journal Mr. Clinton only used e-mail twice in his entire life. That was back in the 90s when he was president of the United States. As for the server remaining private, it has not only remained private, all the information from the server has been wiped clean. I doubt it even physically exists now just to avoid any potential forensic data recovery. All this in what was supposed to be the most transparent administration ever. (Continued from page 1) (Continued on page 6) A Valuable FPA Report For Accounts Receivable One report often overlooked in the Forest Products Accounting system is a rather unassuming report entitled Accounts Receivable Open Aging Summary by Customer. Just paying attention to this report will: 1. Help you with your trade receivables (money your customers owe you). 2. Help you with your general ledger accounting. 3. It will be a check against your setup and file mainte- nance. How much does your customer owe you? Regardless of whether it’s a paper mill, chip mill, sawmill, or buyer of finished lumber, you will get the amount owed to you as of any given date and how current their account is. By default, the amounts due from your customer are aged as current, 1-30 days, 31-60 days, 61-90 days, and Over 90 days. You may set your own values for aging to suit your needs. Generally speaking, if you normally get paid within two weeks for deliveries and your customer has an amount due in the 31-60 day column. That could mean another company got paid for your delivery or it could mean the customer is becoming a slow pay, improving their cash flow at your expense. Both situations should be investigated with a call to determine the cause of the delay in payment. If the amount due is on one ticket, then it is likely your load was paid to another supplier (see Garden States on the report sample, page 5). If the amount due is a whole week’s deliveries, then there is probably a check lost in the mail or direct deposit not issued, or they are managing their cash flow at your expense (see Great Pacific). A second use for the report is to reconcile any possible differences between the open balance on this report and your Accounts Receivable—Trade account on your balance sheet. The Grand Total on the AR Open Aging Summary, when it is generated based on the accounting period, should equal the Accounts Receivable— Trade account on the balance sheet for that accounting period. If not, it may mean incorrect account number distribution in the file maintenance or other problems. We have a checklist available to help us reconcile these differences in the balances. You can use this checklist yourself on request or we can assist you in getting the accounts back in balance. Finally, if you notice on the report large sums accumulated in the 61-90 days column or in the Over 90 days column, it means you have a customer who has not paid you for a long time or there is some fault in your setup and file maintenance (see Livingston Lumber (Continued on page 5)
  • 5. Company). This can occur in situations where wood products are purchased at a concentration yard, then resold to the final destination. Sometimes the user will enter a destination price for the concentration yard and mark it as an accounts receivable for the yard when no money was actually due to be paid from the customer until it was shipped to the final destination (paper mill or plywood mill, for instance). The result can be overstated accounts receivable and overstated wood sales. This will require your immediate attention to (Continued from page 4) correct the setup and file maintenance and make the proper journal entries to correct the general ledger. As a side note, the Log Inventory module in FPA will help prevent duplication of sales and accounts receivable by managing multiple inventory accounts at the concentration yard. Proper setup and file maintenance will give you the desired results. The AR Open Invoice Aging Summary By Customer Report is a powerful tool in managing your accounts receivable. It can help you keep up with unpaid tickets (invoices) and slow-paying customers (mills), check your balance sheet, and help you uncover any possible setup and file maintenance issues associated with wood storage and transfer to the final destination. The AR Open Invoice Aging Summary By Customer is one of many reports available in FPA to help you manage your business and keep your general ledger in good shape. Please feel free to contact us anytime for remote or on-site support in the use of the many reports in FPA. Page 5 A Valuable FPA Report For Accounts Receivable (continued) More Time Well Wasted: A Crawfish Boil Crawfish anyone? As part of my mother-in-law’s 88th birthday celebration, we decided to have a crawfish boil. We boiled 63 pounds of crawfish. Growing up in South Louisiana, I caught and ate a lot of crawfish but didn’t do a lot of the boiling. So, I called Jim Thomas and Ricky Hartman for some expert advice and all turned out well. The crawfish were well-seasoned and everyone had an enjoyable evening. We’re looking forward to having one next year, too! Left: Brandon and I encourage Nancy to add more seasoning to the boil. Right: Birthday celebration on the bridge
  • 6. three months of Hillary Clinton’s tenure as secretary of state—she left this easily interceptable by any decent SIGINT service.” SIGINT is short for signals intelligence (electronic spying). Schindler continued, “The name Clinton right on the e-mail handle meant this was not a difficult find. We should assume Russians, Chinese, and others were seeing this. In all, this is a counterintelligence disaster of truly epic proportions….” An unsecured server may also act as a gateway to penetrate other government systems, including classified information on other government servers. We don’t really know. Normally, a server that has been compromised would be impounded by the FBI and then have a forensic analysis performed to determine what breaches in security have occurred. Well, that’s not going to happen because it has been wiped clean. And let’s face it, the Clintons operate under their own set of rules until someone calls them on it. So why did Mrs. Clinton use private e-mail accounts and a personal e-mail server? It’s one thing if you want to keep Regarding the security of her private server, Mrs. Clinton explained, “It had numerous safeguards. It was on property guarded by the Secret Service. And there were no security breaches.” The server was guarded by the Secret Service. Mail servers aren’t normally attacked by entering the premises, however. They are attacked through the connection to the Internet required to send and receive e-mail. This e-mail server, because it wasn’t under the shield of the government, was a spy magnet for Iranian, Chinese, Russian, and other intelligence services. She hired a Cablevision subsidiary to run the server and had antivirus protection from McAfee. Somehow I don’t get the feeling of security here. According to John Schindler, a former National Security Agency counterintelligence officer, there were few safeguards: “By using her own private server with e-mail— which we now know was totally unencrypted for the first (Continued from page 4) Page 6 April-June 2015 your personal correspondence private. The statements about using one device and e-mail correspondence with Bill Clinton don’t pass the smell test for honesty and transparency. The fact that Mrs. Clinton was asked about this e-mail arrangement by Congress in 2012 but never responded, is also troubling. Could it be she did not want anything on a government server readily available to the Obama administration or the public that could be used against her? Was it all the foreign money flowing into the Clinton Foundation and the Clinton Global Initiative during her tenure as secretary of state? Would the sources and timing of those donations prove embarrassing? What do you think? We may never know for sure. The real incriminating e-mails have been deleted and electronically shredded. The server containing those e-mails is probably at the bottom of the Hudson River. As Mrs. Clinton once said about the Benghazi scandal, "What difference – at this point, does it make?" It matters, alright. This break in our national security will surely cost us down the road. 4601 Woodstock Ln Texarkana, TX 75503 Phone: 800-467-5819 Fax: 903-831-5730 E-mail: ask@hemard.com Mission and Purpose To provide systems for effective management of natural resource companies. This is done with a complete system of implementation, management, and security of these systems. Excellence is accomplished by using the best of breed technology, hands-on training, and user-friendly support. Who We Serve Our clients include wood dealerships, consulting forestry firms, chip mills, sawmills, timber investment management organizations, and oil field service companies. Primary Offerings Forest Products Accounting FPA Oilfield Accounting Network Protection and Management Backup and Business Continuity FPA Supplemental Training FPA Failover Service InWoodsExpo 2015 Hot Springs, June 18-20 www.arkloggers.com News And Commentary: Former Secretary of State Clinton’s E-mail And Its Security Implications Scaling Up: How a Few Companies Make It … and Why the Rest Don’t by Verne Harnish Scaling Up is organized around the four decisions you must address in growing a company: People, Strategy, Execution, and Cash. There are several one-page tools designed to help you through the process of planning effective growth. If you’re really serious, you can take the one-page tools Harnish offers and do the hard work required to fill them out. As a result, you will have given yourself a framework for making changes in your company. If you’re not sure, I suggest reading through a chapter, taking some of the fresh ideas Harnish offers, and making note of them for future use. You can always dive into the one-page tools later. In any case, I think you’ll find the book interesting and gain some proven ideas for growing your business.