Search Blog
  • Alan Fustey
  • Becky Wong
  • Bert Griffin
  • Blair MacDougall
  • Blake Goldring
  • Brett Baughman
  • Camillo Lento
  • Chris Delaney
  • Cynthia Kett
  • Darren Long
  • Desmond Jordan
  • Don Shaughnessy
  • Doug Lamb
  • Ed Olkovich
  • Eva Sachs
  • Evelyn Jacks
  • Gail Bebee
  • Gerald Trites
  • Gordon Brock
  • Guy Conger
  • Guy Ward
  • Heather Phillips
  • Ian Burns
  • Ian R. Whiting
  • Ian Telfer
  • Jack Comeau
  • James Dean
  • James West
  • Jeffrey Lipton Fairmont Gloucester
  • Jim Ruta
  • Jim Yih
  • Joe White
  • Jonathan Chevreau
  • Kenneth Eng
  • Larry Weltman
  • Malvin Spooner
  • Mark Borkowski
  • Marty Gunderson
  • Michael Kavanagh
  • Monty Loree
  • Nick Papapanos
  • Norma Walton
  • Pat Bolland
  • Patrick O’Meara
  • Paul Brent
  • Peter Deeb
  • Peter Lantos
  • Riaz Mamdani
  • Richard Crenian
  • Richard Warke
  • Rick Atkinson
  • Rob Peers
  • Robert Bird
  • Robert Gignac
  • Sam Albanese
  • Stephane Ruah
  • Steve Nyvik
  • Steve Selengut
  • Tammy Johnston
  • Terry Cutler
  • Trade With Kavan
  • Trevor Parry
  • Trindent Consulting
  • Wayne Wile
  • Categories
    October 2013
    M T W T F S S
    « Sep   Nov »


    Tablets vs Laptops

    Gerald Trites, FCA, CPA

    Tablets, smartphones and other highly mobile devices have become a standard part of the technological landscape. And such devices have been creating a good deal of change and hype.

    The concept of BYOD (Bring Your Own Device) has been causing organizations around the world to develop and adopt new strategies that work for them in integrating mobile devices of various kinds into their IT systems. Given the variety of devices, this is not an easy task.

    One of the major aspects of BYOD is security. Many of the devices do not have sufficient security features to meet the demands of most businesses. This is a serious issue and if Blackberry survives, this may be the reason, because Blackberries are the exception – they do have a reasonable level of security.

    Tablets vary too in their level of security, and often do not measure up. Therefore, the companies adopting a BYOD policy need to identify the uses to which the devices will be put so they can control the data that will be available to those devices and minimize their risk in this way.

    The idea of determining the uses to which the devices will be put extends beyond the BYOD policies of businesses and other organizations. That’s because laptops and tablets are useful in different ways. The functionality of laptops is much stronger than that of tablets, therefore making them useful for more complex computing tasks, as well as more complex word and spreadsheet documents. On the other hand, tablets are very good for obtaining information from the internet, and given their portability, are more useful for people in the field who just need to obtain some basic information and perhaps do some quick input and then move on. It’s possible to structure a system such that if employees are required to use tablets to obtain information in the field, then the information they can access would be restricted to that which is necessary. That’s the basic general principle for security in any event.

    There has been some debate as to whether tablets will eventually replace laptops. The answer is a resounding “no”. A recent survey carried out by Dell, supported this conclusion. When asked whether tablets would become the primary computing device at their organization, 54.1% of the respondents said no. We know that most organizations are introducing tablets into their computing environment, either through purchase of BYOD policies (or both), therefore, they ned to co-exist and their functions need to be allocated appropriately.

    The same applies in the daily use of laptops and tablets outside of the business. Most people would prefer to avoid carrying both devices when the are on the move. So it takes some planning as to what they will be doing while away from their desk. It’s an issue we all are trying to deal with.


    The MONEY® Network