Eye-catching graphics with the Google Charts API
Chart Your Heart Out
The Google Chart API is simple to use and easy to integrate into web applications. As shown here, you can use the API immediately – just embed a static link in your web page and let the browser request and render a chart each time the page is drawn.
To speed page rendering, you can request and cache the chart image on your own server, recreating the chart only when the underlying data changes. In addition to providing better efficiency, this technique better protects your raw data. A visitor to your site cannot "View Source" and copy the URL.
Of course, you can also mix the Google Chart API with AJAX techniques to modify charts on the fly in response to user input. Chart Maker  is a basic but effective demonstration of dynamic charting; others have used the Google Chart API to implement a loan calculator and executive dashboards.
Of course, Google Chart is often slower than charting tools that run on the desktop, such as Apple Numbers or Microsoft Excel. These latter applications use native drawing engines and do not require an Internet round-trip to transmit data and download a large graphic image. However, Google Chart is a free application that is available from anywhere. If you are serious about using Google Chart in a production setting, pre-flighting and caching can greatly improve response time.
- The pChart graphing framework for PHP: http://pchart.sourceforge.net/
- The Google Charts API documentation: http://code.google.com/apis/chart/
- BeeTagg: http://www.beetagg.com/
- Google's free Zebra Crossing barcode reader library: http://code.google.com/p/zxing/
- A guide to encoding data in QR codes: http://code.google.com/p/zxing/wiki/BarcodeContents
- A simple Google Chart generator: http://almaer.com/chartmaker/
- The JFreeChart charting library: http://www.jfree.org/jfreechart/
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm