TITLE

Google Me an Access System

AUTHOR(S)
Zalud, Bill
PUB. DATE
July 2006
SOURCE
Security: Solutions for Enterprise Security Leaders;Jul2006, Vol. 43 Issue 7, p34
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the emergence of web-hosted access control solutions for security systems in the United States. Google Lab has launched its Google Spreadsheets which can be used to create basic spreadsheets that can be saved online. Access control system manufacturers have also shifted to a browser graphical user interface. Web-based access systems can be integrated into security systems.
ACCESSION #
21657429

 

Related Articles

  • Software Development Kits Can Help Customize Access Systems. Lowen, Andy; Engebretson, David J. // SDM: Security Distributing & Marketing;Oct2004, Vol. 34 Issue 10, p39 

    Focuses on the use of software development kits to help customize access control systems. Ability to develop graphical user interface; Open architecture necessary to accommodate user customization on many different levels; Control of meeting spaces, information technology centers or laboratory...

  • WALLPAPER, BROWSER, FREE SOFTWARE. Reid, John P. // Maine Antique Digest;Sep2007, Vol. 35 Issue 9, p1 

    The article offers news briefs related to the computer industry. New wallpapers for the antiquer's computer desktop have been developed, including the Santa Fe Stucco from Windows XP and antique related wallpapers from AntiqueCollector.uk.com. A new internet browser has been developed, the...

  • Tighten those loose OPC defences. Tindill, Donovan // Process & Control Engineering (PACE);Apr2005, Vol. 58 Issue 3, p25 

    Reports on the implementation of a cyber security on Information Technology departments for the prevention of computer worms and viruses to the world's most used desktop operating system, the Windows. Development of a distributed component object model for the provision of a communication...

  • Drawing Borders Efficiently. Iwama, Kazuo; Miyano, Eiji; Ono, Hirotaka // Theory of Computing Systems;Feb2009, Vol. 44 Issue 2, p230 

    A spreadsheet, especially MS Excel, is probably one of the most popular software applications for personal-computer users and gives us convenient and user-friendly tools for drawing tables. Using spreadsheets, we often wish to draw several vertical and horizontal black lines on selective...

  • JColorGrid: software for the visualization of biological measurements. Joachimiak, Marcin P; Weisman, Jennifer L; May, Barnaby CH // BMC Bioinformatics;2006, Vol. 7, p225 

    Background: Two-dimensional data colourings are an effective medium by which to represent three-dimensional data in two dimensions. Such "color-grid" representations have found increasing use in the biological sciences (e.g. microarray 'heat maps' and bioactivity data) as they are particularly...

  • Dashboards in driver's seat: Everything in a single place. Spinelli, Lisa // Accounting Today;4/18/2005, Vol. 19 Issue 7, p5 

    Illustrates the increasing popularity of dashboards, a customized graphical interfaces that deliver real-time data in the form of alerts, charts, gauges, spreadsheets and tables, in the U.S. Impact of dashboards on Brad Jones, CEO at Retail Management Solutions; Results of a survey on...

  • A Tool to Assist With Emplacing Support Units on the Battlefield. Henry, James; Smith, William // Army Sustainment;Jul/Aug2014, Vol. 46 Issue 4, p62 

    The article discusses a Microsoft Excel spreadsheet model for use in placing brigade support battalion on their designated battlefield. Topics include the use of spreadsheet model in securing the location of support units outside the enemy weapons, the integration of relational map in the...

  • Mac 911. Breen, Christopher // Macworld;Jun2009, Vol. 26 Issue 6, p82 

    The article presents question and answers related to technical problems including how to reset one's Keychain account password, how to manage photos into iMovie and how to identify Mac Model.

  • A Tabular Steganography Scheme for Graphical Password Authentication. Tsung-Hung Lin; Cheng-Chi Lee; Chwei-Shyong Tsai; Shin-Dong Guo // Computer Science & Information Systems;2010, Vol. 7 Issue 4, p823 

    The article discusses a proposed graphical password authentication protocol for problems in password memorization. It mentions that its technology involves clicking on images that replace input characters. It notes that graphical user interface can aid users to easily create and remember their...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics