JofA Not Just for Accountants Anymore


I recently spent a couple of hours in an after-hours medical clinic, waiting to see a doctor. There, I found a copy of the JofA.

Even though I’m not in the accounting field, I really enjoyed the magazine. In particular, I recall reading a useful article describing how to generate reports in Excel by linking to an Access database (“Spreadsheet, Meet Database; Database, Meet Spreadsheet,” JofA, Dec.99). This task is something I would find useful in my job, as would many of my co-workers. I’ve been trying to convince them that we need to convert our data, which currently resides in a huge Excel spreadsheet, into an Access database, and generate our reports from there.
Since I haven’t used Access in quite some time, I found the article particularly helpful, and I plan to share it with my colleagues.

Lucie Delheimer
System/USOS Requirements Team
Requirements Baseline
International Space Station

Letters to the Editor

The opinions and views expressed are those of the letter writers and do not necessarily reflect those of the AICPA.

The JofA encourages readers to write letters on important professional issues in addition to comments on published articles. Because space is limited, letters submitted for publication should be no longer than 500 words. Please include telephone and fax numbers.


Year-end tax planning and what’s new for 2016

Practitioners need to consider several tax planning opportunities to review with their clients before the end of the year. This report offers strategies for individuals and businesses, as well as recent federal tax law changes affecting this year’s tax returns.


News quiz: Retirement planning, tax practice, and fraud risk

Recent reports focused on a survey that gauges the worries about retirement among CPA financial planners’ clients, a suit that affects tax practitioners, and a guide that offers advice on fraud risk. See how much you know with this short quiz.


Bolster your data defenses

As you weather the dog days of summer, it’s a good time to make sure your cybersecurity structure can stand up to the heat of external and internal threats. Here are six steps to help shore up your systems.