Accountancy Forum
2004 AICPA Top 10 Technologies - Printable Version

+- Accountancy Forum (https://www.accountancy.com.pk/forum)
+-- Forum: The Profession (https://www.accountancy.com.pk/forum/forumdisplay.php?fid=4)
+--- Forum: Technology (https://www.accountancy.com.pk/forum/forumdisplay.php?fid=9)
+--- Thread: 2004 AICPA Top 10 Technologies (/showthread.php?tid=1041)



2004 AICPA Top 10 Technologies - XAVIER - 08-18-2004

<b>2004 AICPA Top 10 Technologies </b>



The 2004 AICPA Top 10 Technologies list includes an unprecedented seven first-time entries. Information security was once again the top technology affecting the accounting profession. Spam Technology a completely new issue to the list came in at number two. Rounding out the remainder of new items are technologies that lead to paperless or virtual office environments, foster synchronization and exchangeability, and ensure swift access to data.
Top 10 Technologies List

The following is the complete 2004 Top 10 Technologies list. Those new to the list are indicated below.

1. Information Security. The hardware, software, processes, and procedures in place to protect an organizations systems. It includes firewalls, anti-virus, password management, patches, and locked facilities, among others. Learn more

2. Spam Technology (new). The use of technology to reduce or eliminate unwanted e-mail. Technologies range from confirmation of the sender via ISP lookup to methods where the recipient accepts e-mail only from specific senders. Learn more

3. Digital Optimization (new). Also known as The Paperless Office. The process of capturing and managing documents electronically (that is, PDF and other formats). Learn more

4. Database and Application Integration (new). The ability to update one field and have it automatically synchronize between multiple databases. An example would be the transfer of data between disparate systems. Learn more

5. Wireless Technologies. The transfer of voice or data from one machine to another via the airwaves without physical connectivity. Learn more

6. Disaster Recovery. The development, monitoring, and updating of the process by which organizations plan for continuity of their business in the event of a loss of business information resources due to theft, weather damage, accidents, or malicious destruction. Learn more

7. Data Mining (new). The methods by which a user can sift through volumes of data to find specific answers. Learn more

8. Virtual Office (new). The technologies, processes, and procedures that allow personnel to work effectively, either individually or with others, regardless of physical location. Learn more

9. Business Exchange Technology (new). The natural evolution from EDI to greater business transaction and data exchange via the Internet using datasets that are transported easily between programs and databases (for example, XBRL). Learn more

10. Messaging Applications (new). Applications that permit users to communicate electronically, including e-mail, voicemail and instant messaging. Learn more
Emerging Technologies
The initiative also explored Emerging Technologies, expected to
affect businesses and individuals in the next several years. The five

Emerging Technologies are

1. ID/Authentication. Verifying either the identity of a user who is logging onto a computer system or the integrity of a transmitted message.

2. Radio Frequency Identification (RFID). RFID tags, which consist of silicon chips and an antenna that can transmit data to a wireless receiver, could one day be used to track everything from soda cans to cereal boxes. Unlike bar codes, radio tags do not require line-of-sight for reading.

3. 3G Wireless. Designed for high-speed multimedia data and voice.

4. Simple Object Access Protocol (SOAP). A message-based protocol based on XML for accessing services on the Internet.

5. Autonomic Computers. Tools and strategies to manage and maintain all systems across the enterprise, including system maintenance, upgrades, automatic patching, and self-healing (for example, ZenWorks, Unicenter TNG, management alerts). This is an approach toward self-managed computing systems with a minimum of human interference. The term derives from the body's autonomic nervous system, which controls key functions without conscious awareness or involvement.


I've learned-
that you can get by on charm for about
fifteen minutes.
After that, you'd better know something.


- jbladeus - 08-24-2004

good post xavier

its been estimated that 5-6 petabytes of email is sent throughout the internet in a single day and around 60% of it is spam. Its no wonder that spam-fighting is so important these days.

________________________
Arrrgh... it sure's gonna be mighty rough sailin' today ... mates!