Home / About itWatch / Articles / Tablet

Which Tablet Suits Your Purpose?


It took two attempts for tablets to make them a success. As in many other cases, a critical factor was the proper bundling of functions (browser, video and audio) in combination with suitable conditions (extensive supply of broad band communication) and innovative handling. Until recently these capabilities were not yet provided for.

Let’s put it this way: The success for tablets was owed to the idea, to combine TV with a hi-fi system in a top design with innovative user interfaces, and later on the addition of a browser for the internet as well as for the loading of any application as key features. There is a wide range of devices available: With some of the devices not even changing of battery is possible, whereas others can be seen as fully qualified business computers

More Storage Available – If You Know How

Compared to notebooks the storage capacity of tablets is quite limited. However, there are several solutions available for this issue. One of them are mobile stores like USB sticks or disks, SD-cards and other mobile media.

To be able to use them, the appropriate interfaces have to be in place, a requirement not met by all of these media. Another alternative, that is storing the data in the cloud, is only viable, if suitable bandwidth, privacy, compliance or further SLAs is taken care of.

Less security requirements are to be met, when using a private cloud instead of a public cloud, because here SLAs related to privacy and integrity are easier to be fulfilled. Privacy can be ensured via local encryption of all inbound and outbound data, even if the data storage is outsourced – assuming, of course, the company chooses the appropriate encryption and key management. Here a critical requirement is a secure local key handling. For some tablets there are hardware-based add-ons available for transporting and storing the secure key information. If a secure local storing of keys is not possible, it has to be loaded online – adding further requirements to the authentication and confidential communication.

Read on: