JofA Not Just for Accountants Anymore

BY LUCIE DELHEIMER

I recently spent a couple of hours in an after-hours medical clinic, waiting to see a doctor. There, I found a copy of the JofA.

Even though I’m not in the accounting field, I really enjoyed the magazine. In particular, I recall reading a useful article describing how to generate reports in Excel by linking to an Access database (“Spreadsheet, Meet Database; Database, Meet Spreadsheet,” JofA, Dec.99). This task is something I would find useful in my job, as would many of my co-workers. I’ve been trying to convince them that we need to convert our data, which currently resides in a huge Excel spreadsheet, into an Access database, and generate our reports from there.
Since I haven’t used Access in quite some time, I found the article particularly helpful, and I plan to share it with my colleagues.

Lucie Delheimer
System/USOS Requirements Team
Requirements Baseline
International Space Station
Houston

Letters to the Editor

The opinions and views expressed are those of the letter writers and do not necessarily reflect those of the AICPA.

The JofA encourages readers to write letters on important professional issues in addition to comments on published articles. Because space is limited, letters submitted for publication should be no longer than 500 words. Please include telephone and fax numbers.

SPONSORED REPORT

Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.

QUIZ

News quiz: IRS warning on cyberattacks and a change in pension rules

Once again, the IRS sounds the alarm about a threat from cyberthieves. See how much you know about this and other recent news with this short quiz.

CHECKLIST

Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.