• QuickPress

    Apple Spends More Than $30 Million on Amazon’s Cloud Every Month, Making it One of the Biggest AWS Customers

    As Apple and Amazon compete for a greater share of consumer dollars and attention, they also have a particularly intimate business relationship: Apple is spending more than $30 million a month on Amazon’s cloud, according to people familiar with the arrangement. To read the full article in CNBC, click: Apple Spends More Than $30 Million on Amazon’s Cloud Every Month, Making it One of the Biggest AWS Customers.

  • QuickPress

    Update on Taxes and Terrorism: Why Client’s Data Could Become Vulnerable

    Digital Security: Apple, Taxes, and Terrorism The FBI has attempted to compel Apple, Inc. to defeat its own encryption.  Because Apple has thus far refused, a federal court in California will hear arguments.  The case is certain to have far-reaching implications for the nature of digital security.  Adam Junkroski, lead manager Tax Communications for AICPA, explains how the unbreakable encryption at the center of the Apple case affects tax practitioners? To read the full article in AICPA Insights, click: Update on Taxes and Terrorism: Why Client’s Data Could Become Vulnerable.

  • QuickPress

    The Surprising Link Between Your iPhone Use and How Assertive You Are

    Why You Might Feel Less Assertive After Using a Smartphone Hunching over to use a smartphone or other device can make people less confident and more likely to recall negative memories, research has suggested.  People should be aware of their posture and hold their phones at eye level.  Vivian Giang examines new research that shows the more you hunch over your smartphone, the less likely you are to stand up for yourself. To read the full article in Fast Company, click: The Surprising Link Between Your iPhone Use and How Assertive You Are.

  • Practice Management - QuickRead Featured

    An App a Day

    The onslaught of new phones and apps and their related potential for financial crime This article examines the high cost of convenience in regards to constantly evolving smart phones, iPads, and other personal communication device applications. The intentional (and unintentional) transfer of sensitive data between individuals happens in seconds. The author lays out the double-edged benefits of such technology and whether it’s worth the risk of being a victim of fraud and theft.