How AI and workflow automation let SMBs track real performance in real time — by turning the software you already use into a live intelligence system.
When your business software is connected and automated, your performance data works for you — in real time, without manual reporting.
Most small business owners make decisions based on incomplete information. Not because the data does not exist — it does. It’s sitting in your accounting software, your CRM, your project management tool, your inventory system, your scheduling platform, and half a dozen other applications your team uses every day.
The problem is that nobody has connected those systems. So instead of a clear, current view of your business performance, you get fragmented snapshots — last month’s financials here, a manual spreadsheet there, a gut feeling filling in the rest.
AI-powered workflow automation closes that gap. By connecting your line-of-business (LOB) applications and letting AI automatically harvest and analyze your key performance indicators (KPIs), you get a real-time picture of how your business is actually performing — without adding staff, without manual reporting, and without waiting until the end of the month.
What This Actually Means for Your Business
When your LOB applications are connected and your KPIs are being harvested automatically, you might open Monday morning to a dashboard showing: revenue versus target week-to-date, outstanding receivables by age, your five largest at-risk accounts, staff utilization rates, and inventory levels approaching reorder thresholds.
That dashboard was built by your systems, overnight, while you were not working. When a number moves outside its normal range, you receive an alert — before it becomes a crisis.
This is not technology reserved for large enterprises. The tools that make this possible are now accessible, affordable, and increasingly straightforward to implement for businesses of any size.
Practical Action Steps for You and Your IT Team
Step 1: List every software platform your business uses. Accounting, CRM, inventory, scheduling, project management, payroll, point of sale — document all of it. These are your data sources.
Step 2: Decide what your most important KPIs are. Revenue, gross margin, accounts receivable aging, customer acquisition cost, employee utilization, inventory turnover — agree on the ten numbers that, if you tracked them weekly, would help you make better decisions.
Step 3: Check your platforms’ integration capabilities. Most modern business software supports API connections or data exports. Your IT provider should assess what’s possible with your current tools before recommending anything new.
Step 4: Choose an automation and reporting platform. Tools like Microsoft Power Automate, Zapier, and Make connect thousands of business applications. Microsoft Power BI or similar tools turn that data into visual dashboards. Your IT provider can recommend the right fit for your size and stack.
Step 5: Configure your data pipelines. Have your IT provider build the automated connections between your platforms so that data flows into your reporting environment on a scheduled or real-time basis — without anyone manually exporting spreadsheets.
Step 6: Set up threshold alerts. Define the KPI boundaries that should trigger a notification — a receivable aging past 45 days, a sales pipeline dropping below a minimum, or inventory falling to reorder level. AI-driven alerting means you act on problems before they compound.
Step 7: Build a review habit. Dashboards create value when business owners and managers use them consistently. Set a weekly 20-minute review of your KPI dashboard as a fixed part of your management routine.
Questions You or Your Team Might Ask
“Is our business data safe passing between systems automatically?” Yes — when properly configured. Your IT provider should use encrypted, authenticated connections between platforms and ensure that access is controlled by role. Data security should be a stated requirement from day one.
“Do we need to replace our existing software?” No. Workflow automation connects the tools you already use. The goal is to make your existing stack smarter, not to start over.
“How long does it take to set this up?” A basic KPI dashboard connecting three to four applications can typically be implemented in two to four weeks. More complex environments take longer but are built in logical phases.
“What does it cost?” It depends on your complexity and existing platforms. Many of the core automation tools are available on subscription plans that are affordable for small businesses. Your IT provider should walk you through the realistic cost before any commitment is made.
How Farmhouse Networking Can Help
Farmhouse Networking helps small and mid-sized businesses build connected technology environments that make real-time KPI tracking practical and sustainable. We assess your current application stack, identify integration opportunities, configure secure data flows, and build dashboards that give you the clarity to lead your business with confidence.
We handle everything in-house — no outsourcing — and we focus on practical solutions that fit your size and budget. Our clients tell us we fix problems other IT firms cannot, and we answer the phone when they call.
You Should Know How Your Business Is Performing Right Now — Not Last Month
If your business decisions are based on delayed, manual, or fragmented data, your competitors who have automated this have an edge you can close.
Email us at support@farmhousenetworking.com to schedule a free consultation. We’ll take a look at your current systems, identify your best opportunities for automation and KPI visibility, and give you a clear picture of what’s possible — and what it will take to get there.
That AI tool looked affordable in the demo. Here’s what most small business owners discover after the first real invoice.
You signed up for a sleek AI tool. The demo was impressive. The monthly price seemed reasonable. Then three months later you’re staring at a vendor bill that’s twice what you expected, your team is still confused about how to use the software, and you’re not sure who owns the data you’ve been feeding into it.
If that sounds familiar, you’re not alone. According to a 2025 Fortune analysis, the advertised price of AI automation represents only 20–40% of the true first-year cost for most small businesses. The rest hides in plain sight — buried in data preparation, staff training, integration fees, security gaps, and consumption-based pricing that scales faster than your revenue does.
AI tools promise to save you money. But are they quietly spending it instead? Here’s what every business owner needs to know before the next invoice arrives.
What the Brochure Doesn’t Tell You: The 6 Hidden Costs of AI
1. Data Cleanup Costs: Before AI can do anything useful, it needs clean, structured data. Most businesses discover their records have duplicate entries, inconsistent formatting, or files locked in formats the AI can’t read. Getting data “AI-ready” commonly costs $1,000–$10,000 and is rarely mentioned upfront.
2. Consumption-Based Billing Surprises: Many AI tools — including Microsoft Copilot, ChatGPT, and Salesforce Agentforce — charge by usage (tokens, conversations, or seat upgrades). A 2025 Zylo survey found 78% of IT leaders reported unexpected charges from consumption-based AI pricing. The more your team uses the tool, the higher the bill climbs, often mid-contract.
3. Integration Expenses: Plugging an AI tool into your existing systems — your accounting software, CRM, email platform, or operations tools — typically costs 30–50% of your total AI budget on top of licensing fees. Legacy systems make this worse, adding another 30–50% to integration costs.
4. The Productivity Dip (The J-Curve): Staff productivity typically drops 15–25% for 3–6 months after an AI tool is introduced. Workflows change. People need training. Mistakes happen. This “J-curve” is a real cost that hits your output before the benefits kick in.
5. Ongoing Maintenance and Monitoring: AI tools don’t run themselves. They need updates, performance monitoring, and occasional retraining. Industry estimates put annual AI maintenance at 15–30% of the original implementation cost — every year.
6. Security and Compliance Gaps: When employees use unsanctioned AI tools — what experts call “shadow AI” — your data goes places you haven’t approved. This creates real liability, especially if you handle any customer financial, health, or personal data.
What You and Your IT Team Should Do Now
Audit every AI tool currently in use — sanctioned or not. Shadow AI is a real and growing problem.
Review your vendor contracts for consumption-based pricing clauses and usage caps.
Assess your data quality before adding any new AI tool. Budget time and money for cleanup.
Map out how each AI tool connects to your existing systems and what it costs to integrate.
Train your team with structured onboarding — not just a login link.
Set a usage policy that defines which AI tools are approved and what data can be shared with them.
Schedule quarterly AI cost reviews so billing surprises don’t compound.
Work with your IT provider to conduct a security review of all AI platforms you’ve adopted.
Questions Your Clients or Team May Ask You
Q: Is it really that expensive? The tool only costs $30 a month.
A: The license is just the entry fee. Once you add integration, training, data cleanup, and monitoring, that $30/month tool commonly becomes $300–$500/month in real total cost. Budgeting for only the license is the most common AI financial mistake small businesses make.
Q: Can’t we just let employees figure it out on their own?
A: Research shows that organizations with unstructured AI adoption see double the training costs and far lower ROI. Worse, employees who figure it out on their own often use unapproved tools that create security and compliance exposure.
Q: What happens if we don’t address the security side?
A: Unsanctioned AI usage has been linked to data breaches that add an average of $200,000 to breach costs, according to IBM’s 2025 Cost of a Data Breach report. For a small business, that’s potentially company-ending exposure.
Q: How do we know if our AI investment is actually paying off?
A: You need to measure specific KPIs before and after AI adoption — things like hours saved per week, error rates, and customer resolution times. Without baseline data, ROI is invisible.
How Farmhouse Networking Can Help
Farmhouse Networking specializes in helping SMBs navigate exactly these kinds of IT cost pitfalls. Our local team can help you:
Conduct a full AI tool audit to identify shadow AI and hidden spend across your organization.
Review your vendor contracts and consumption-based pricing to protect you from billing surprises.
Assess data readiness so you’re not paying for expensive data cleanup after the fact.
Build a secure AI governance policy so your team knows what’s approved, what’s not, and why.
Provide proactive IT monitoring that catches cost and security issues before they become crises.
Ready to Find Out What AI Is Really Costing You?
Don’t wait for the surprise invoice. Send us a message and we’ll schedule a free AI cost and security review for your business. We’ll show you exactly where you stand — no obligation, no jargon, no pressure. Email us today: support@farmhousenetworking.com
The right technology stack helps SMBs improve security, streamline operations, and support long-term growth.
Businesses need technology that makes the company easier to run, safer to operate, and better at winning customers. The right stack can reduce manual work, improve communication, and create a more professional experience across every part of the business.
For owners, the focus should be on growth and operational clarity. For IT, the goal is secure, reliable systems that support collaboration, backup, automation, and customer-facing workflows.
Practical action steps
Replace disconnected tools with integrated platforms for email, files, CRM, and scheduling.
Use MFA, endpoint protection, and automated backups on every business device.
Improve your website and local SEO so customers can find and contact you more easily.
Automate repetitive workflows like reminders, approvals, and intake forms.
Create a technology roadmap so upgrades happen proactively instead of reactively.
Client questions and answers
Q: Do we need a managed IT provider? A: If technology downtime, security risk, or slow support hurts productivity, yes.
Q: What should we prioritize first? A: Security, backups, and the systems your team uses every day.
Q: How does technology help growth? A: Better tools improve response time, customer experience, visibility in search, and team efficiency.
Farmhouse Networking helps SMBs build dependable, secure, and growth-ready technology foundations without overcomplicating the stack. Email support@farmhousenetworking.com for more information about how Farmhouse Networking can help improve their business.
How SMB leaders can use an AI boardroom bot to improve preparation, analysis, and decision‑making in their meetings.
Lloyds Banking Group’s deployment of an AI boardroom bot is more than a banking headline. It shows that AI is becoming a serious business tool for better preparation, faster analysis, and smarter decision-making, and SMB owners who adopt it early—with proper controls—can gain a competitive edge.
Practical steps for owners and IT
Start with one business problem, such as meeting summaries, document review, or internal reporting.
Create a simple AI policy that defines approved tools, responsible users, and escalation rules.
Review security, permissions, and data retention before connecting AI to company information.
Put IT in charge of testing, monitoring, and patching any AI-related systems.
Measure results with clear metrics like time saved, error reduction, and decision speed.
Client questions and answers
Q: Is AI only for large enterprises? A: No. SMBs can benefit from targeted use cases if they adopt AI carefully and securely.
Q: What is the biggest risk? A: Uncontrolled access to sensitive information and overreliance on outputs without review.
How Farmhouse Networking helps
Farmhouse Networking helps SMB owners turn AI interest into a secure, practical rollout. We can support strategy, vendor evaluation, security hardening, and IT execution so your team can adopt AI without losing control.
Small business leaders can reduce AI risk by building governance, review processes, and secure IT controls
Businesses are adopting AI faster than ever, often without realizing how many tools already include automation. The Colorado AI Act matters because if AI influences decisions that affect customers, employees, or applicants, your business may need to add oversight, disclosures, and human review.
For SMB owners, the best strategy is simple: know what AI you use, know what it affects, and know who is responsible. That keeps compliance manageable and reduces risk.
What your business should do
Start with an AI inventory across software, plugins, and cloud apps. Then identify which tools affect important decisions, customer experiences, or internal workflows.
Your IT team should review vendor contracts, access controls, logging, and data retention. They should also create a clear process for reviewing AI outputs, correcting mistakes, and responding to customer questions.
Questions customers may ask
Q: Is your business using AI to evaluate me? A: It may be, depending on the service or process.
Q: Can a person review the decision? A: Your business should be able to provide human review where needed.
Q: Why should I care about AI use? A: Because it affects fairness, accuracy, and transparency.
How Farmhouse Networking can help
Farmhouse Networking helps SMBs build a stronger IT foundation for AI governance, security, and compliance. We can help you identify risks, secure systems, and support the operational steps your business needs to take.
Email support@farmhousenetworking.com for more information about how Farmhouse Networking can help improve their business.
Why Length Beats Complexity for Today’s Businesses
Long passphrases provide stronger protection and easier usability than outdated complexity rules, as recommended by NIST.
Businesses often believe adding symbols and monthly password resets makes them secure. NIST’s latest guidance says otherwise: a long, easy‑to‑remember passphrase offers more real protection than complexity tricks.
Password Style
Example Password
Notes on Strength and Usability
Old Complexity Rule (Outdated)
Tr@v3l!92
Short, hard to remember; may be reused or written down; easier for automated attacks to guess.
Old Complexity Rule (Outdated)
Pa$$w0rd!
Common pattern, predictable substitutions (“a”→“@”, “s”→“$”); easily cracked despite complexity.
Old Complexity Rule (Outdated)
M1cR0#Biz
Limited entropy due to short length; users frequently forget or reuse similar versions.
Modern NIST Approach (Recommended)
coffeeandcodeinthefall
Long, natural phrase; easy to remember; high entropy from length and unpredictability.
Modern NIST Approach (Recommended)
mydoglovesthebeachwalks
Secure through length, words chosen personally; human‑friendly without sacrificing strength.
Modern NIST Approach (Recommended)
sevencloudsdriftbyslowlytoday
Strong against brute‑force attacks because of sheer character count and mixed word structure.
Action Steps for Business Owners
Update Your Security Policy: Review password guidelines against NIST SP 800‑63B. Shift to length‑based passphrases.
Use Professional Password Management: Centralize storage and compliance while simplifying employee access.
Add Multifactor Authentication: Combine long passwords with MFA for the strongest possible protection.
Educate Staff Regularly: Train teams to create strong, unique passphrases and spot common cyber threats.
Monitor Access: Implement logging and alerts for suspicious password usage or failed login attempts.
Client Q&A
Q: Why did NIST change its recommendations? A: Research showed that complexity rules lead to bad habits — predictable substitutions and reused passwords — while longer ones resist attacks better.
Q: Do these changes apply to small businesses? A: Yes, small firms face the same credential attacks big ones do. NIST’s standards are scalable and easy to implement.
Q: How can I simplify all this? A: Centralized password management enforces standards automatically and keeps credentials secure without manual oversight.
How Farmhouse Networking Can Help
Farmhouse Networking works with SMBs to implement secure password policy frameworks based on NIST, automate credential management, and train users. Our goal: reduce risk, improve productivity, and strengthen compliance.
What the U.S. Treasury’s New AI Framework Means for You
How the U.S. Treasury’s AI Lexicon and Financial Services AI Risk Management Framework help small businesses govern AI safely and securely
From chatbots to cloud‑based “smart” bookkeeping tools, AI is quietly embedded in many SMB software platforms. The Treasury’s AI Lexicon and Financial Services AI Risk Management Framework give small‑business owners a practical way to manage AI‑related risks—without needing a corporate‑level compliance team.
What SMB owners should do
Create a simple AI inventory: List tools that say they use “AI,” “machine learning,” or “smart automation.”
Ask vendors clear questions: How does the AI work? What data does it use? How are models updated and monitored?
Limit AI for sensitive decisions: Use AI for tasks like email filtering, data entry, or basic analytics, but keep humans in the loop for pricing, hiring, or customer‑impact decisions.
Add AI‑governance to your cybersecurity plan: Treat AI‑enabled tools the same way as any other SaaS—review access, permissions, and data‑handling practices.
Sample Q&A for customers and partners
“Do you use AI to decide which customers get service?” You can say: “AI helps us manage communications and prioritize tasks, but a real person makes decisions that affect you.”
“How do you ensure AI isn’t biased or insecure?” You can reference documented vendor‑review processes, human oversight, and your commitment to strong cybersecurity and data‑protection practices.
Farmhouse can help
Farmhouse Networking can:
Help you build a simple AI‑inventory checklist for your SMB.
Assist with drafting light‑touch AI‑governance language for your policies and customer‑facing communications.
Integrate AI‑risk checks into your existing IT and cybersecurity processes.
Call to action: Email support@farmhousenetworking.com to start a conversation about how AI is already in your business—and how to manage it in a way that’s both powerful and defensible.
Use DNS Filtering to Stay Safe and Open for Business
DNS filtering helps small business owners block AI powered social media scams before employees can reach malicious websites
AI tools now let scammers quickly generate deepfake videos, realistic ads, and convincing phishing messages that target small and mid‑sized businesses on social media. These attacks trick employees into clicking malicious links that steal logins, install ransomware, or divert payments, and incident rates and losses are climbing. DNS filtering offers your business a practical, affordable way to block dangerous sites at the network level before a bad click turns into downtime.
Why AI-Driven Social Media Threats Matter for SMBs
AI deepfakes and fake ads can impersonate your brand or suppliers and lead to look‑alike scam sites.
AI-enhanced phishing leverages details from your website and social media to sound like real customers, partners, or executives.
Web‑based phishing and spoofing attempts are rising sharply year over year, driven by generative AI.
What DNS Filtering Does for Your Business
DNS filtering checks where your employees’ devices are trying to connect and blocks known or suspected malicious domains. For SMBs, this:
Prevents access to phishing pages and fake login screens linked from social media or email.
Reduces malware and ransomware risk by blocking communication with malicious servers.
Gives you visibility into risky browsing and helps enforce acceptable‑use policies.
Action Steps for Business Owners and IT
Document where and how your team uses social media for sales, support, and marketing.
Roll out DNS filtering to office networks, remote workers, and any company‑managed laptops or phones.
Integrate DNS filtering logs with your security monitoring to quickly investigate suspicious activity.
Establish a clear process for verifying unusual requests (wire transfers, password resets, gift card purchases) received via social media or email.
Sample Customer Questions and Answers
“Is it safe to click promotions I see about your business on social media?” We recommend visiting our official website or verified profiles directly, because scammers can create fake ads that lead to malicious sites.
“How do you protect my data from online scams?” We use layered security including DNS filtering to block malicious websites, alongside secure payment providers and strong internal controls.
How Farmhouse Networking Helps SMBs
Farmhouse Networking works with you to understand your business, social media use, and risk tolerance, then designs and manages a DNS filtering solution that fits your size and budget. We deploy, configure, and monitor the service, fine‑tune policies over time, and provide clear reports so you always know how your network is being protected. This is included at no additional cost to all our monthly managed IT services clients.
Call to Action: Email support@farmhousenetworking.com for more information about how Farmhouse Networking can help improve your business and defend against AI‑driven social media threats.
A small business owner working with their IT partner to prepare a CIRCIA‑ready cyber incident response plan.
Many small and midsize business owners assume CIRCIA is aimed only at Fortune 500 companies, but that is a risky assumption. Small and mid‑market organizations can be “covered entities” if they provide critical services or support critical infrastructure, and even those outside scope will feel the ripple effects through clients, insurers, and vendors.
CIRCIA in a Nutshell
CIRCIA (Cyber Incident Reporting for Critical Infrastructure Act) requires covered entities to report substantial cyber incidents to CISA within 72 hours.
Ransomware payments must be reported within 24 hours.
Coverage is based on critical infrastructure role, not just size; small entities can be included if their disruption would impact national or regional security, economy, or public health.
Even if you are not covered, your larger customers and partners may require you to meet CIRCIA-like standards to stay in their supply chain.
Concrete Steps for Owners and IT Teams
Owner-level actions:
Determine your exposure: Identify whether you operate in or support critical infrastructure sectors (healthcare, energy, transportation, government services, etc.).
Review contracts and insurance: Look for new clauses about cyber incident reporting, cooperation, and timelines.
Fund the basics: Approve budget for security monitoring, backups, and an incident response plan; these are now business necessities, not IT “nice‑to‑haves.”
IT / MSP actions:
Perform a security and asset inventory: Know what you have, where it is, and how it is protected.
Implement monitoring and logging: Centralized logs and alerts are essential to detect and investigate incidents fast enough for 72‑hour reporting.
Develop and test an incident response plan: Include decision trees for when to treat an incident as “substantial,” who to notify, and how to collect evidence.
Prepare for CISA reporting, even if “not covered”: Templates and processes for structured incident documentation will help with insurers, regulators, and major customers.
Questions Your Customers May Ask – Answer Set
“Are you compliant with CIRCIA?”
We have implemented incident detection, response, and reporting processes aligned with CIRCIA expectations, and we support our critical-infrastructure customers with the evidence they need.
“If a cyber incident hits you, how will it affect us?”
We maintain backups, response playbooks, and communication plans aimed at minimizing downtime and providing transparent updates.
“Will you tell us quickly if our data is involved?”
Yes. Our procedures require rapid notification to affected customers and support for any regulatory or contractual reporting they must perform.
How Farmhouse Networking Helps SMBs Turn CIRCIA into an Advantage
Farmhouse Networking helps small and midsize businesses use CIRCIA as a catalyst to get modern, business-grade cybersecurity in place:
Determining whether your business or key customers are likely covered entities and what that means for your contracts and obligations.
Implementing security controls—MFA, EDR, monitoring, backups, segmentation—that both reduce incident likelihood and support fast, evidence-based reporting.
Building, documenting, and testing an incident response and communication plan tuned to 72‑ and 24‑hour windows.
Acting as your ongoing IT and security partner so you can answer customer and regulator questions with confidence.
Call to action: Email support@farmhousenetworking.com to find out how Farmhouse Networking can help your small business prepare for CIRCIA and improve your overall cybersecurity resilience.
How to Take Back Control of Your Credentials and Phones
When an MSP controls your passwords and phone system, your entire small business can be held hostage by vendor lock‑in and security risks.
If your MSP controls all your admin passwords and has your phone service in their name, they effectively hold the keys to your entire business. In a dispute, a security incident, or even an acquisition of their company, you could find yourself locked out of critical systems that drive revenue and customer service.
The Real Dangers of MSP Lock‑In
Some providers refuse to release credentials or slow‑roll off‑boarding, forcing clients into “hostage” situations that require legal escalation or aggressive technical takeovers. At the same time, attackers increasingly target MSPs because one compromised technician account can reach many customers’ environments.
When your phone system is outdated or fully tied to that MSP, you pay more each year for less functionality, struggle with remote work, and depend on them for every change. The combination of technical dependence and credential lock‑in is a business‑continuity risk you can’t afford to ignore.
Action Steps for Owners and Their IT Teams
Reassert ownership of core assets
Ensure your company owns master accounts for email, cloud services, line‑of‑business apps, domains, DNS, and phone numbers, with internal admin rights documented.
Centralize credentials in a business‑owned vault
Use a secure password manager or encrypted repository where your business controls the master key and you grant time‑bound, role‑based access to MSP staff.
Implement strong identity and access controls
Enforce MFA everywhere, require strong unique passwords, and use least‑privilege and role‑based access so no external user has unchecked power.
Build clean exit ramps into contracts
Document how credentials, documentation, and phone services will be handed back, and set deadlines and formats for off‑boarding deliverables.
Prepare for the worst‑case scenario
Maintain independent backups, keep an internal “break‑glass” account, and have a written playbook for revoking vendor access and rotating credentials quickly.
Questions Your Customers May Ask
Q: Could your IT company access or leak my data? A: We control the master credentials and use MFA, logging, and access controls so any vendor only has tightly scoped, monitored access to what they need to support us.
Q: What happens if your IT provider is hacked? A: We follow best practices for identity security, vendor risk management, and backups so a single compromised account at an MSP cannot easily cascade into your data.
Q: Are you able to stay operational if you change IT providers? A: Yes—because we own our accounts and phone numbers and have a documented exit process, we can transition providers while keeping systems and support running.
How Farmhouse Networking Helps SMBs
Farmhouse Networking works with business owners to document every critical system, transfer licensing and phone services into the company’s control, and consolidate credentials into secure, business‑owned vaults. We then implement MFA, break glass accounts, role‑based access, and incident‑response plans so neither a single technician nor an MSP relationship becomes a single point of failure.
We can also help you renegotiate or replace MSP contracts with clear off‑boarding terms and test those processes before you ever need them in an emergency.
Email support@farmhousenetworking.com to make sure no MSP can ever hold your credentials, phones, or business hostage again.
And God will generously provide all you need. Then you will always have everything you need and plenty left over to share with others. As the Scriptures say,
“They share freely and give generously to the poor. Their good deeds will be remembered forever.”
For God is the one who provides seed for the farmer and then bread to eat. In the same way, he will provide and increase your resources and then produce a great harvest of generosity in you. - 2 Corinthians 9:8-10
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.