Navigation
  • SEARCH HERE
  • SOLUTIONS
    • Information Security Solutions
      • Application Security Testing Solutions
      • Network & Infrastructure Security Solutions
      • Zero Trust Security
      • Security Information and Event Management
      • Remote Monitoring & Management (RMM)
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • IT Management Solutions
      • Identity and Access Management Solutions
      • Employee Activity Monitoring (EAM)
      • Digital Forensic Investigation
    • Software Development Solutions
      • Integrated Development Environments
      • Development Components
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • Services
    • Live Solution Walkthroughs
    • Implementation Services
    • Best Practices Consulting
    • Pre-Sales and Post-Sales Services
  • What's New
    • Our Event
    • Our Blogs
    • Special Offers
  • About
    • About LOGON Software Asia
    • Our Partnership
  • Publishers - Join our network
  • Resellers - Expand your portfolio
  • Procurement Managers
Site logo
  • Solutions
    • Information Security Solutions
          • Identity and Access Management
            • Privileged Access Management (PAM)
            • Multi-Factor Authentication (MFA)
            • Identification Verification (IV)
            • Self-Service Password Reset (SSPR)
          • Network & Infrastructure Security
            • DDoS Mitigation and Protection
            • Digital Forensic Investigation
            • Malware Detection & Analysis
            • Network Monitoring Software
            • Email Security
            • Log Monitoring
          • Endpoint & Device Security
            • Patch Management
            • Remote Monitoring & Management (RMM)
            • Employee Activity Monitoring (EAM)
            • Mobile Device Management (MDM)
          • IT Management
            • IT Service Management
            • IT Asset Management
            • Software Asset Management
            • Hardware Asset Management
            • Software License Management
            • Systems Administration Tools
          • Application Security
            • Application Security Testing (SAST, DAST, IAST, MAST, SCA)
            • Runtime Application Self-Protection
            • Web Application Firewall
          • Data Security
            • Data / Password Recovery
            • File Integrity Management
            • Data Loss Prevention
          • Cloud Security
            • Cloud Security Posture Management
            • Cloud Work Protection
          • External Attack Surface Management
            • Cyber Threat Intelligence
            • Third Party Risk Management
          • Security Operations & Incident Management
            • Security Information and Event Management
            • Security Orchestration, Automation and Response (SOAR)
          • Zero Trust Security
    • Software Development Solutions
      • Integrated Development Environments
      • Imaging Solutions
      • UI Tools
      • Charting Solutions
      • Developer Tools
      • Database
      • Networking Components
      • Office Components
      • Barcode Components
      • Release Automation & Management
      • Software Localization
      • Communication Components
      • Automated Testing
      • eLearning Authoring Solutions
      • Reporting Solutions
      • Text Retrieval / Enterprise Search
      • Testing & QA
  • Services
        • Live Walkthrough Sessions

          Experience the full feature of our key solutions through live platform

          View All Sessions >
        • Implementation Services
        • Pre-Sales and Post-Sales Services
        • Best Practices Consulting
  • Partners
    • Our Partners
    • Partner with LOGON Today!
      • Vendors - Join Our Network
      • Resellers - Expand Your Portfolio
      • Procurement Managers
  • Resources
        • ABOUT US

        • About Us
        • Our Locations
        • Careers@LOGON - We are hiring !
        • DISCOVER

        • Our BlogsNEW BLOGS
        • Our EventsJOIN UPCOMING EVENTS
        • LOGON to CyberSecurity PodcastNEW EPISODES
        • GET HELP

        • Contact Us
        • Help Desk
        • Request a Demo
        • Request a Quote
  • More results...

Spread COM

The original Excel-like COM spreadsheet control

Deliver a fully functional spreadsheet application in Visual Studio 6

  • Run-time visual template designer
  • Easy-to-use API
  • Source code available
Image

Key features of this Excel-like spreadsheet

Calculation Engine with Built-in Formulas

Spread includes a very comprehensive calculation engine to provide formula support, including providing over 100 of the most commonly used functions. In addition, you can easily add your own custom formulas to Spread. You can also use named expressions or relative cell addressing to reference the formulas.

Print Support

Spread gives you control over printing with options such as page ranges, data ranges, headers and footers, margins, orientation, grid lines, and colors.

Print Preview control

The included print preview control makes it easy to preview the printed spreadsheet. There are several options for controlling how your customer will preview the data, including the number of pages that will be previewed on the screen and zooming options.

Visual Template Designer

Design spreadsheets with our run-time design tool. It lets you set properties, formatting, data sources, calculations, and more without writing code.

Data Binding and Automatic Display

Spread can automatically retrieve and display information from ActiveX objects (ADO), Data Access Objects (DBO), and Remote Data Objects (RDO). Once the connection has been made, Spread will create the appropriate columns, configure headers, and create the proper cell types. Spread also allows the user to update the database. All this can be done without code, but you are free to customize behavior using the API.

Unbound Mode

While Spread’s bound mode is powerful, it is equally effective when loading data from many other sources such as Microsoft Excel, CSV, tab-delimited files, and custom-delimited files.

File Export

Spread will export your data to multiple file formats including Excel, XML, HTML, .SS* (Spread proprietary format), tab-delimited, and comma-delimited.

Cell Types and Data Validation

One of the most powerful features of Spread is the ability to validate data automatically while the user is entering the information or the data is being programmatically assigned. Spread provides twelve cell types that are configured to accept only a certain type of data input, thus eliminating the need for you to manually validate data.

Multiple Operation Modes

Operation modes control how your customers can interact with Spread. For example, you can make Spread read-only or have it act as a list box.

Cell Borders

All border design properties including thickness, color, and style are supported.

Cell Notes and Text Tips

Add cell notes and text tips to give users additional information. Cell Notes are indicated by a red dot in the corner of the cell and when clicked, information appears. Text tips are similar except they appear on hover.

Sheet and Cell Protection

Lock specific cells or entire sheets from editing.

Privacy Policy Company Overview

COMPANY

Our Location Career with LOGON Our Partners

SERVICES

Training Services Implementation Services Pre-Sales and Post-Sales Services Best Practices Consulting

GET IN TOUCH

Phone:
Hong Kong: +852 2512 8491
India: +91 70220 22744 / +91 63668 26133
Email: [email protected] ©2025 LOGON International Ltd. All rights reserved
logon logo WHITE Image Image Image

Search engine

Use this form to find things you need on this site

More results...

Fill in the form below
  • This field is for validation purposes and should be left unchanged.
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form

Watch On-demand Webinar

  • This field is for validation purposes and should be left unchanged.

Get Your Free UserLock Trial

  • This field is for validation purposes and should be left unchanged.

Download Your Free Trial 10-Day Trial Today

  • Downloading and evaluating Smart Package Studio is quick and easy
  • Includes a short introductory guide that suggests smart features to try
  • Access the full functionality of Smart Package Studio during the trial
  • This field is for validation purposes and should be left unchanged.

Request for Priority Support with our support team

  • This field is for validation purposes and should be left unchanged.
  • Drop files here or
    Max. file size: 30 MB.

    Get Free Assessment of your Web Asset

    Request a free non-intrusive security assessment of your website. Get a report with an overview of client-side security risks.

    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form

    Recommend a Topic

    • This field is for validation purposes and should be left unchanged.

    Partner with Us on the next episode

    • This field is for validation purposes and should be left unchanged.

    Request Quote for Lansweeper

    Oops! We could not locate your form.

    Advertisement

    Watch On-demand Webinar

    • This field is for validation purposes and should be left unchanged.
    Start PreCrime Network for Free

    Oops! We could not locate your form.

    Advertisement

    Book a Free Demo Today

    Get Your Free Trial

    Oops! We could not locate your form.

    Advertisement
    Get Your Free Trial
    • This field is for validation purposes and should be left unchanged.
    • This field is hidden when viewing the form
    • This field is hidden when viewing the form
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote

    Oops! We could not locate your form.

    Advertisement
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Request for Training Quote
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    • Image
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • DD slash MM slash YYYY
    Request for Training Quote
    • This field is for validation purposes and should be left unchanged.
    • Please enter a number from 1 to 20.
    • This field is hidden when viewing the form
    Advertisement