Jump to content
ATX Community

Medlin Software, Dennis

Donors
  • Posts

    1,813
  • Joined

  • Last visited

  • Days Won

    83

Everything posted by Medlin Software, Dennis

  1. Seems like I have outlasted my welcome. Not my sandbox, I get the hints. I appreciate all of the banter over the years, best wishes to all going forward. Those that have interacted with me in the past know how to reach me, if anyone wants to discuss payroll or accounting. I don't do any returns other than my own now, but I deal with many in other ways.
  2. How would one know that? Different merchant accounts have different payment timing. Or the merchant may not even close the transaction right away. I doubt a merchant is going to look up their funding dates and send reports. So I order on dec 30. Most merchants would close the 30th, but not all get paid the 30th, the 31st, or even Jan 1. Many will get funded the next day, most by the second day. It would be interesting to see how a dec 31 deduction holds up of the finding was actually Jan 1. At least in my world, it is a non issue. Why? I look at things early in Dec and if desired, load up on expenses before Dec 20 and pay or prepay them by Dec 24.
  3. You lost me for a moment. "so the deduction is when the charge occurs, not when the payment is made to the credit card company." and "The deduction is taken in the year the payment to the payee occurs." cannot both be the "rule". There are two rules, for cash basis, when the payment is made, such as the check date or ACH date. For accrual basis, when the obligation occurs. For tax prep, I suppose there can be differences than "accounting", just as payroll accounting is always calendar year, even if the company itself is on a non-calendar (tax/accounting) year.
  4. Are you saying, even for cash accounting, one MUST account for charge purchases before the cash is spent? I see "may" in your rule mention, not "must". I know of many cash accounting who use cards to delay expenses, and hold checks to delay income, all which have passed audit, and at least one, a very detailed examination. Cards can also be used to hurry up expenses, in a cash system, as one can place orders Dec 31, and make a payment the same date. I see things like this often, not considering some use cash accounting.
  5. Interesting topic. We just cancelled a store card because they sold/hired it out to one of the affinity visa/mc issuers. For certain things, we prefer store cards as we let the store take the risk if the card gets hacked or lost (no balance, so their obscene interest is of no concern). For business use, and really personal, it is derelict to not be using a rewards card, which also makes store cards, sans rewards, useless to me.
  6. The reluctance on a personal level is puzzling to me. I get it, some argue the merits of the legal aspect, great, argue away, I might agree. But standing on privacy is pointless as there are provisions to keep all but the names private. My own worry, the address of others (I assume mine can be found with even a novice effort), is resolved via a Brown PMB. Managing the data of others, is resolved by requiring each to register personally, and giving me their number (so I have no idea or responsibility for the address or information they enter). And to be clear, I have been threatened by a nut, who is spending the rest of their days at a federal facility, and said nut was able to find my personal information, even though it was not on any company documentation at the time. Privacy is as gone as the one income family with three kids, two cars, and a paid off home.
  7. While my backup "game" was likely more detailed than 99.99% of the world, I stepped it up again this week. I added a NAS to my gadgets. As I discover and prove I am comfortable with what the NAS can do, I will be able to rid/repurpose a few gadgets. With proper encryption, you can leave your data on your front porch or even hand out USB sticks to your local hacker, and it will remain safe (maybe not against a group with national type resources and time, but those are not my concern at all). I doubt the IRS investigates or would want to take on an entity like Google by making a statement prohibiting using gDrive for storage. Few, if any, hacking groups are after the data you or I have, since what you have, even if it was 5000 clients, is worth their time. For me, I keep no card information, so hacking me would be a waste of time too. My concern is being able to get back to work in as short of time possible.
  8. Your client has made his choice and will pay for it. Really, other than needing to know the spouse is not present to sign and is never coming back, it is not something I would be concerned with. Your client has made his choice, any cost is not your concern.
  9. I have never been caught rolling the stop sign on my street. Point is most PDF readers will shrink to fit on page by default. Some will sub in different fonts. Someone could use a dot matrix printer. The penalty for submitting a tax form which cannot be scanned is significant and can blow back on the software vendor too. Try scanning that PDF and printed elsewhere check at a grocery or check cashing store and see how well that goes. Worse yet, deal with the employee who could not get timely paid because the check was not accepted. There are options, such as cloud printing (direct from the device, not from a PDF).
  10. Make sure when saving and printing to/from PDF, to not shrink/stretch/skew. This mainly applies to any form you may eventually mail (for scanning), but it is a good idea at all times. I get this question daily; can I save paychecks or tax forms to PDF and have someone else print them? The answer is always no because of shrink/stretch/skew/resolution issues. I use paper copies of things I am required or want to keep. They are kept in folders/drawers/containers CLEARLY labeled with a "destroyable" date. I also track and delete electronic records via a "destroyable" date as well. Nuttin' you were not required to have can be used again' you.
  11. The vendor made a compliance decision, and customers are stuck with it. There were other options (as I keep saying), arguably more secure, but maybe more annoying for some (depends on the person).
  12. I have likely spouted this before. AV programs are all similar in finding known items. So the free solution which comes with Windows is good, no need for others. It also is more likely to be kept updated (which is daily). The systems which use Wild Rear Guesses (Heuristics) have their place, but not at consumer level. Those guesses are what creates the false positives, costing you time any money. The false positives also can fool you to believe the solution is doing "something", so you keep renewing. So, the Microsoft solution wins again. Windows also has very good hardening settings, which are more than enough for consumer use, and do MORE than your consumer level AV solution. As a software dev, I deal with the false positive issue every single you know what day. The false positives not only cost me customers, but they are also a huge time suck for me and my customers/potential customers. A dev can simply send an email to certain AV companies, and they will whitelist my file (not really secure it is?). I can change one item in my code, even something as simple as one letter from upcase to lcase, and the recompiled exe will not trigger the current foals positive. I can change the compression level in my setup, which will also stop a false positive. (See a theme? How simple it is to fool a "security" system.) The old adage, from even the "good" days when Peter Norton was writing AV software, was TURN OFF the AV software during app installation, still applies, and proves how pointless these third party systems are. Even McAfee (who is off his rocker now) admitted his products are snake oil, no different than Old "Doc" Smith selling elixir off his medicine wagon. Ironically, there is a free scanning tool which actually does use the latest signature files from more than 50 vendors, and I have yet to be listed by them as nefarious - so the real issue is not even the sloppy (if not outright on purpose) false positives, it is consumers not keeping their software current, coupled with either badly created or on purpose created false positive causing software. I have yet to see a class action suit for false positives, as there is little to no lawyer money to be made, so the issue lives on. With the above spouted, I do let the MS AV app run, and it rarely gives me any issue (meaning no false positives of note). It needs no exclusions (nor should any good AV solution) and couples well with the other MS security settings.
  13. If the software vendor elects to force something (such as use of a cell phone for their security purposes), then the software vendor is sating, yes, you must have a cell phone. If this is an issue, contact the software vendor directly. As I have likely spouted several times, using SMS or authenticator apps for MFA/security compliance is not required by the FTC, they allow several compliance options. But the FTC rules to not mean SMS for MFA is bad (there are better means) or authenticator apps are bad, or that it is unreasonable for software designed for tax pros comes with requirements such as being able to use SMS or authenticator apps for MFA. I actually answer similar messages routinely, similar to "I am too old to X", and I have to be sincere and honest when I say if they feel this way, maybe it is time to have someone else do what they are doing. We all have to face this. I have the experience and skills to do many things I elect not to do to keep SWMBO happy, to increase the odds I keep getting older, etc. Although, if our granddaughter elects to be a racer, I will likely strap up at least one more time to be on track with her, to help her learn (and honestly, I miss it too).
  14. For me, no online source is safe as is. What I mean is unless I have the ability to, and actually do, encrypt first, before the online source does their upload/storage, I do not consider it safe. IOW, I do not trust an online source to provide security, I assume my data will get compromised, so I have to secure it before posting. With the above said, I can then use ANY online source, as I only permit them to store data I have already secured. I have used many tools over the years, and storage locations. For online, at present, I sue my own servers, as well as AWS. The KEY is the software I use for file transfer, and the security method., I found Cobian Software meets my needs for automation and security. If one wants to also use a backup service, first spin the data through Cobian, then let the online service's software backup only the encrypted files you encrypted using Cobian. As a software dev, the trend is for each software to provide backup/storage, as it is much easier to support (rather than having to try to help those whose IT "expert" helped, or who paid a geek type company for "help"). Plus, the software dev knows what needs to be backed up, and will not skip something important. Remember, any security requirements apply to the DATA, not to the place you drop the data. And, MFA does not mean some sort of authenticator is required, just that an auth is one option.
  15. Indeed, the IRS is human operated and thus imperfect. Despite many in my business saying it cannot happen, it is absolutely true things get lost, and mistakes made. Their system read one of my Q3 941's as being for Q2 and ADDED it to Q2. So I got an underpay for Q2, and for Q3. The "experts" say the IRS rejects and 941 after the first, which I can say is not always the case. There was one year where a significant number of my customers at one 941 processing centers reported the IRS had no record of their returns. Clearly, there was a data loss, which was later also shared by industry insiders to me.
  16. Customer who is a tax prep franchisee asked me for something because they are tired of answering repeated employee questions. The chuckle is the employees, who are likely doing tax prep, are not retaining their own pay stubs! I can only figure it is a case of the franchisee being in a position to have to take on all who can fog a mirror and operate the software. I hear similar situations often (having to take on less than ideal employees), because the business cannot work if they were to pay enough wage to get competent workers (usually it is a case of a long-time employer not wanting to raise prices to cover the current cost of employees). We sometimes see similar threads here - keeping prices current.
      • 2
      • Like
  17. Even when using proper representation, the TP should still have basic knowledge to spot something this and/or hiring out for at least a cursory review. I mean really, a S Corp which does not zero out each year? I am not discounting the allowed practice of things like holding checks, for even months, to defer income, but to what sounds like cash checks, but claim then as undeposited/unrealized? Maybe the bookkeeper is also a sovereign citizen :). As I sit in a home where I either DIY or pay licensed insured for repairs/maintenance, and next door, they are finishing up unpermitted window and roof replacement with unlicensed employees on a slow work day (and run an unlicensed, unpermitted, and not allowed cash business from their home).
  18. That amount would have me (if were the TP) looking for relief from the previous "expert".
  19. Why ooh why would you delete data? I get it, some of us, especially longer in the tooth, try to save drive space. The days of tiny drives and drive space issues are decades ago gone. Deleting for security reasons? Sure, but if security is a concern, then an overall solution is likely better. Deleting to rid a computer? Indeed, there are tools for wiping drives, but I prefer to physically destroy them. With the above said, even today, a customer asked me how to delete data. I do not offer such a function, as within a few minutes of offering one, someone would be asking how to undo, or if I had a copy of their now deleted data I can give to them. If replacing computer/drives on a regular basis, restoring from backups, your machine would likely not have any old data on it (passed the retention timeline). For my software, I strongly remind to make monthly backups, offer free secure online backup storage, and have TWO separate on local drive locations for alternate data. One alternate location is easily found by the user and is saved every program close. This is a good one to use if there is a power outage. I also create what I call a "rescue" backup, stored in a location which likely will help when a computer "expert" helps out a customer and deletes their live data. It is also in a location which Windows backup includes, by default, as another means to help those who do not backup well, or at all. While I am all for the what you are not required to have cannot be used against you, as a software dev, zero harm to me comes from not offering any sort of mass delete function, and much harm can come to me - even if only being blamed for not preventing silly human error - if I were to offer such an option. Another example. A customer is currently trying to blame me for their issue of incorrectly moving/copying files. They are trying to blame me for commands they use outside of my software. The issue is their method has caused the deletion or remove of one of their data files, and they are insisting the software caused it, even though I have actual hard proof they caused the issue. This is a total waste of time, and I only can lose a customer and reputation, even though I did nothing wrong. And this is for something I do not even offer... so there is no way in you know what I will ever build in a function to delete unused data.
  20. A legal firm I trust posted (paraphrasing), those that have not filed, need not. If ever enforced, there will likely be a reasonable time to comply. Those that have already submitted, can do nothing, or consider trying to remove any data they deem sensitive. They mentioned the injunction was worded that it is likely the plaintiffs will prevail, but one must be prepared just in case. Logically, not that it applies, it may end up where the states will have to compel more data for company registration. To me, the principle is good, ability to know who is responsible. The flaw is the feds appear to be overstepping. I have privacy concerns, but there are very legal means to comply without giving away one's home address.
  21. Easy for those in the business, but not every employer keeps up with the rules, nor do all employees even know about things like this, or RROP. Just today, I was ripped into by two people claiming OT is ALWAYS 1.5x. Also helped an AL employer who incorrectly handled their OT (put all OT, even not meeting the rules for the special exemption) as exempt from AL wages. My point here was for your customers who are in AL, ask if they had any weeks over 40 hours, and then verify their W2 is accurate (or suggest they do themselves). Also, as it is now clear to me RROP is often ignored, ask if any customers received any sort of OT, PTO, or really, any sort of payment which might trigger or be subject to RROP. Not that as a preparer you would get into RROP, but it would be a great catch if you mentioned it and found a client who was underpaid.
  22. For these types of things, login, MFA, etc., I create a separate one, which I only know, but I keep stored in a manner where it could be used by others if something would make me unavailable. The second is also good to have in case something goes awry with the main. I check my backups a couple of times a year. We all, maybe, think about what happens after us. For those who care or have obligations to be succeeded, this type of thing will be priceless for those who have to use it. It is no fun being left to clean up, and have no authority to do so, or no timely means.
  23. If you have any AL W2 earners, who have OT, beware of payroll/W2 issues. AL, for 2024, and Q1/Q2 of 2025, is exempting OT earnings from AL gross wages (essentially AL taxable wages). The W2 should have a box 14 item showing the exempted wages, and box 16 should not include the exempted wages. I expect many employers handled this less than accurately. Such as exempting only the OT premium, by exempting incorrectly (ONLY on pay earned after 40 hours in a week), and so on. My suggestion is if you see an AL W2, view it with caution. You may want to start by asking for their last stub for the year. See if you can figure out if the OT was properly exempted from AL WH. Or maybe create a note reminding the employee you are going off the W2, and if they want you to prove out their W2, that is an extra fee, and they will need all of their stubs for the year, or some sort of paycheck listing for the year. "I" would only bother digging if the annual OT earnings were significant enough to result in a significant Al reduction. --- OT wages in general seem to be a growing issue. What I am referring to is the seemingly lack of proper RROP (Regular Rate of Pay) handling. Depending on your interest, you could ask W2 employees if they received and OT, and if so, if they work at more than one pay rate, received a raise during a pay period, or received any sort of "additional" pay (Bonus, commission, gifts, etc.). Anyone who was paid OT, and had more than one pay rate, or received additional pay, is subject to RROP for OT/PTO calculations. I recently had a new customer complain because of RROP. Roughly, they have an employee who earns 10 per hour, or 15 per hour, depending on the job. Of course, the employer wants the OT only on the 10 per hour job and was upset since he "always" paid OT only on the lower rate. With his given figures, the difference was less than $10, but if the employee catches on, the difference will likely be thousands in penalties and defense. I still have had only one or two customers ever ask about handling RROP, which even for my type of customer, is too low. Even though my customer can setup RROP handling, I suspect many ignore it.
  24. I get accused of being an AI bot. The issue is not my reply, but the number of same human tricks, needing the same response. I do have prewritten replies I can select, honed to be as concise as possible, but they were human developed/written. Last week, it was a person who was having trouble following plainly and accurate steps (three of them). Their replies did not need any more from me, other than to remind them to accurately follow steps in the earlier reply. After a few messages, I added something like "The first reply had the accurate solution, step by step. There are no hidden or additional steps I held back." This resulted in the oft seen "I want a real person you must be replying with AI." response. I sometimes use the old "paper towns" trick - not correcting all spelling errors, or even insert one, to not only see if anyone reads the item, but to now prove it was not AI generated.
  25. I saw and objected to such responses on another private board. The person eventually responded stating they thought they were helping (they would copy the OP, then post AI results, which was easy to reproduce). I was blunt, and said the board was for providing "between the lines" sharing, as all of the participants should be professional enough to use a search engine, so asking in public was almost never for a plain answer any search engine could return. Of course, there are many newer members who ask things, but most of the vets ignore things which can be found via even the most basic search. Search engines are the precursor to AI, since they scrape and snip things to present. The difference is, at least for me, being in a search engine results in earnings, where AI results to not. I allow one or two search engine AI bots "in" at present, since they give me something back (more search engine click throughs). One of the first bots I stopped was one who was selling plagiarism score results. I got nothing from them hammering my sites, yet they were making money. I also blocked a competitor's IP ranges, as they were hammering my site as well. There is a great long time group for web site creators to discuss and share these types of things (I don't work at it that hard). The last year or two, more and more random IP's are scraping me looking for doors in. Most look for common word press pages. Easy to block though. This is another reason I do not use tools like word press. Better to be a little fish in a big pond, rather than invite hacking. We use some shared type web coding, but we do not depend on outside tools other than certain well known and trusted css files. At some point, I will likely have to create a door in, meaning washing all accesses through a filter type of deal. Many use Cloudflare for this, but I prefer something less well known.
×
×
  • Create New...