Doing the Two-Step With Google

Horror stories abound of electronic lives compromised by stolen passwords. One of the problems with a password-secured life is that the password is the single element that -- when compromised -- allows access. The User ID isn't protected, nor is any hardware. Shouldn't there be better methods? There are more secure systems. All you do is add further elements of authentication. This is called "two-factor authentication," and it's been around the computer industry for a long while.

Source: http://ectnews.com.feedsportal.com/c/34520/f/632000/s/249e1409/l/0L0Stechnewsworld0N0Crsstory0C764230Bhtml/story01.htm

QUEST SOFTWARE JDA SOFTWARE GROUP OPENWAVE SYSTEMS EASTMAN KODAK CO VARIAN SEMICONDUCTOR EQUIPMENT ASSOCIATES ORACLE ZORAN