We all use spreadsheets as data-containers - is that really smart?
Currently, there are thousands of spreadsheets living in all private and public organizations that actually acts as data-containers. Originally, spreadsheets were developed to calculate things i.e. budgets, cost calculations, engineering
calculations etc. but with time spreadsheet usage evolved into more database related tasks as well.
As the capacity of personal computers increased, that spreadsheet could contain more and more data, and at some point, the PCs had so much space and power available, that it could store rows and columns enough to solve daily problems like
sales statistics, contact lists, inventory transactions etc.
The question is: Are spreadsheets really the right tool for these type of database related tasks? If not are affordable alternatives present?
Here are a number of screenshots from a web application. Download the demand specification spreadsheet by clicking the icon below.
Can be installed for administrators to register users or for users to register themeselves. In this case the users can register themeselves, where they receive a confirmation email afterwards.
Images and colors are stated when you define the application. Normally, images are 1024x768 pixel. You can also define logo, description and copyright statements..
List in tables, cards or just as names. We can create user groups in the security system where you define if users should be able to see all records or only own records.
Detail screen for each record that also enables you to see related data i.e. contact persons under a company. You can also access files and images attached to individual records.
Forms where users can create and update records, nicely grouped into field groups. If the table has many fields, we can choose to show fields in tabs.
The system allows you to create user groups and attach users to these groups. You can specify which groups can see menus, view records, add records, update records, delete records and export records down to table level.
Menus and lists behaves according to security setup depending on who is logged into the system.