Friday, March 28, 2014

The iPad Versus the Android Tablet

By 

Expert Author Paul Clayton-Lea
So you want to buy an Android tablet for the first time, possibly for yourself, a friend or a family member. Confusing stuff isn't it? There are so many different Android tablets out there at the minute that it is darn right challenging for the first time buyer regardless of their age, whether they are the excited teenagers loving the latest technology or the 60+ year old granny who is as curious as she ever was. This information will help assist you in making the decision.
Tablets are great for replacing an old laptop, pottering around the house with or just plain having a laugh and playing some games on. Below is a quick guide that will help you on how to best choose the right one for you.
1.) Figure out what you need it for
Do you need a tablet for watching movies on? Typing business documents? Playing games? Reading e-books and articles? Does your new tablet need to have a keyboard with it? Does it need a front camera on it to Skype your favourite cousin that went abroad? Think of all of these options when going to buy your new tablet and write them down so you know exactly what you want it for.
2.) Features you'll want with the tablet
Screen size: You will need to decide on this first. If the tablet is for a child then a 7" tablet is perfect. That's not to say that an adult won't like a 7" tablet, it's really down to individual preferences. A 10" tablet is just a bit too big to hold for long periods of time, so we recommend at best if you want a bigger screen to go for a 9.7" tablet, perfect for typing up documents on, and gives a bigger viewing angle for watching movies. The 8" tablet would be the most practical size to go for, as it is in between the other sizes, and fits better in your hands.
High screen resolution: Definitely go for a high screen resolution on your tablet. It makes for much better viewing. If you opt for a 7" tablet do not pick one that has a resolution below 1024 x 600 pixels. For anything over a 7" screen size don't go for a resolution below 1024 x 768 pixels. And for a 9.7" don't go below 2048 x 1536 pixels because the graphics on the tablet will just look too stretched due to the bigger screen. The majority of tablets worth splashing money out on should have these screen resolutions. They ensure that you as our customers get the best experience possible out of your new tablet.
Dual-Core: The type core processor that is in an Android tablet will determine the speed of it. The type processors that come with Android tablets are single core, dual core and quad core. You would be far better off to go for a tablet that has at least a dual core processor (although for a child a single core processor should suffice). Quad core is really the best option to go for as all quad core tablets are the quickest and most efficient to use.
Wi-Fi or 3G: If you opt for choosing a 3G tablet then it will cost you far more than if you just go for the Wi-Fi enabled ones. There is free Wi-Fi pretty much everywhere these days so why pay for the 3G when you don't have to? Also, most Wi-Fi enabled tablets have a 3G support system which means that you can connect a modem in through the tablet via the USB port, thus giving your tablet the 3G ability.
Android Operating System: There have been many different operating systems that Android tablets have used throughout the years. Don't go for anything below Android 4.0, called Ice Cream Sandwhich, and Android 4.1 known as Jelly Bean. Strange names yes we know! We would advise to only go for the more recent one, that being Jelly Bean (4.2 and up is best) as it is a slightly more advanced operating system.
Ports: The more ports on your tablet the better. Make sure it at least has a Micro SD card slot, (this allows for expandable memory) and a USB port. Also good to have is a HDMI port. The HDMI is great as it allows you to hook up your tablet to a HDMI television, enabling you to watch a movie downloaded on your tablet, straight from your T.V. Bluetooth is also another good option for your tablet to have.
3.) Enjoy your tablet!
Tablets have become so popular as of late that nearly everyone wants one. We are lucky to be living in this amazing day and age with the technology that exists in our lives. After all, a tablet a few years ago was used to reduce a headache, a tweet was what woke you up at 6 in the morning by that same bird that just never shuts up, and if someone said that they were going to write on your wall, well, you probably would have thought they needed help! So enjoy what is up for grabs, and hopefully the above info and guidelines will have eased and guided you through the decision making process of buying your very first, brand new Android tablet.

Why Should You Maintain An Inventory Of All Your Authorized And Unauthorized Devices?

By 

Nature of the Vulnerability
Several rogue nation-states and groups today employ systems to scan the address spaces continuously of organizations they target. They wait and attack any new and unprotected systems that are attached to the network, including test systems. Anything such as a laptop or a PDA, not up to date with patches could be their target. It is easy for any attacker anywhere in the world to find and exploit such systems via the Internet.
Once the attackers have gained internal access, they could quickly find and compromise other such improperly secured computer systems on the network. The local nighttime window is the most favored by the attackers to install backdoors into systems before they are hardened the next day.
With advancement of new technology, organizations allow employees to Bring Your Own Devices or BYOD to workplaces, where they are connected to the network of the organization. Many of these devices may already be compromised, and they can be used as a relay point to inflict damage to the organization.
Effect on the Organization
If compromised and exploited, such vulnerability could result in:
Unauthorized disclosure of data
Sensitive data, relating to purchase, accounts, inventory, Intellectual Property, resources, marketing and sales may be revealed.
Unauthorized modification to the system, its data, or both
Attackers may permanently lock an exploited system to its compromised state, thereby assuring a permanent entry point into the organization every time the system is used. Without a proper inventory control of the hardware and software devices used on the network, an organization will have no way of knowing the entry point of the attackers.
Denial of service, access to data, or both to authorized users
Similar to locking up an exploited system, attackers may disallow authorized users from accessing service and data. Passwords may be changed and an authorized user may find he is unable to login into his bank account or a CEO unable to access the latest sales projections for the upcoming AGM.
How to Mitigate the Threat?
Set up operational rules to make sure users in the organization are running only approved and licensed software on their machines. This has an additional benefit of tracking both under-utilized and over-deployed software licenses, since both issues are financially important to the organization.
Use appropriate software to provide constant automation for asset inventory discovery that will provide New MAC and New Host found alerts, whenever a new device is plugged into the network. Encouraging the use of a standard naming convention for all the hosts on the network makes it easy to detect the one standing out.
Separate virtual local area networks or VLANs may be created for untrusted devices such as BYOD systems.
Use automated tools to notify about an unauthorized asset plugged into the network, within two minutes and achieve isolation within five minutes.

Electronic Waste Recycling Technology

By 

Expert Author Gilbert Kibet Rono
Electronic waste or e-waste is a term used to describe all manner of electronic gadgets and equipment, for example TVs, radios, refrigerators, microwaves, electronic watches, computers, printers, scanners, cameras, laptops, light bulbs, cell phones and their accompanying peripherals that are rendered unusable for one reason or another and end up being dumped into the environment.
Why recycle electronic waste?
It is becoming a common trend to recycle electronic waste instead of just disposing it because first, this ensures that resources in the environment are reasonably and cost-effectively conserved. This is because some of the parts and components of electronic waste are usually reusable, for example plastic parts, metals in the micro-circuit boards, glass in the cathode ray tubes and so on.
Secondly, electronic waste is one of the main causes of environmental pollution. Apart from visual pollution some of the parts and components of the electronics, for example cathode ray tubes, contain harmful substances like lead which if left haphazardly in the environment may find their way into human consumption leading to ill effects on health. Recycling thus stops this from happening and goes a step towards creating a cleaner environment less prone to the risk of harmful substance exposure to humans.
The Electronic Waste Recycling Process
Electronic waste is generally recycled in a two step process; sorting and treatment.
Sorting is the thorough separation of the mass of electronic waste into distinct material categories, for example: plastics, metals, glass, wood, rubber and so on. Another way of sorting is according to particular components which undergo a particular treatment, for example: hard disks, cathode ray tubes, mother-boards, cell-phone circuitry, camera lenses, batteries, flash disks, CDs, DVDs, cables, switches, processors and so on.
Treatment is the actual processing of the groups or categories of sorted electronic waste, usually by different processing entities for each category of material or component.
E-waste processing methods
Plastics are melted down and remade into other useful articles.
Glass from cathode ray tubes is usually reused in making of new cathode ray tube monitors. (Cathode ray tubes contain high amounts of lead which is highly toxic.)
Mercury, a prevalent toxic substance is usually extracted and reused in dental practice while phosphorus obtained from bulbs is used to make fertilizer.
Wood from older generation electronics (speakers, radios and television sets) is usually shredded and used in agriculture or to make fuel material.
Component parts like hard disks which are made of aluminium are smelted and the resultant metal ingots used in making vehicle parts.
There are also certain machine parts that are expressly sent back to the manufacturer for recycling, for example printer toner cartridges. Here we see that recycling does not necessarily mean actively doing the treatment of the electronic waste, but may also be about categorizing and sending off the components back to the manufacturer (for those manufacturers who recycle).
Some metals such as barium are extracted via electrolysis and reused. Likewise extracted nickel and cadmium are reused in the making of fortified steels and dry cells.

Securing Your Data From the Bad Guys

By 

Expert Author Gareth Baxendale
Despite popular belief, hackers do not tend to don balaclavas or ensure their tie is straight before they begin their silent attacks on our infrastructures, however we do seem to associate this 'bank robber-esque' image with the activity of hacking and IT security.
In today's world, security is a way of life for all of us, you only have to go to the airport and you will be reminded of how serious it can get. For technologists the securing of data is no doubt 'business as usual', but as we evolve more complex methods to present our services and allow users to interact with them, the greater the risk becomes.
How secure is secure?
Securing your infrastructure can take considerable effort, and getting the correct level of security in place, at the right level, is key. It is easy to over-engineer a solution that may impact the entire user experience. On the other hand, a poorly designed solution will require greater effort at the other end in maintaining and monitoring, and may even result in sleepless nights...
When designing an approach, infrastructure, application and the data layer must be viewed as a whole, or you may secure one layer but leave another open to attack. Some questions to consider, do you want to use a DMZ ("demilitarized zone") and open ports on your internal Firewall for every service required? Or do you want to simply keep everything on the internal side so as not to turn your Firewall into 'Swiss cheese?'. Then there is the CMZ ("Classified Militarized Zone") which, by choice, contains your sensitive data and is monitored to an extreme degree to ensure it is protected at all costs. When presenting data do you use a staging database in a different subnet to limit the chance of a direct connection to your back-end data layer? Will you consider emerging proactive database monitoring tools such as Fortinet's FortiDB?
Of course, your approach will depend on the services you are exposing and every vendor will have a different set of options for you to choose from.
Good practise
The annual security review and PenTest, while still important, is now giving way to more 'live' security reporting and analysis to provide you with assurance that your data is safe. Many security vendors now offer proactive monitoring of your external services to ensure that known exploits have not accidentally been opened up by trigger happy Firewall administrators.
Some simple good practise can make a real difference, such as ensuring your have multi-vendor firewalls separating your networks. This may seem like an expensive luxury at first but It means that any would-be attacker has two highly complex firewall technologies to overcome instead of just one. It also means that in the rare case a vendor's firewall has a known weakness it is unlikely that the second vendor will have the same exploit, reducing the chances of an attackers success.
Ensuring your systems are patched to current levels is also an essential activity in the battle against the hacker.
But let's not just limit this to technology itself, 'change control', as a process, is an important defensive weapon against 'human error' that might otherwise cost you dearly. Knowing what needs to be changed, gaining approval, planning who will do the work and when, along with ensuring a full impact assessment is carried out, will save you a lot of pain later on.
Who are these bad guys?
So who are your would-be attackers? Well they can take many different forms from hobbyists or students experimenting with port scanners and looking to see if there are any ports open on your firewall to the more savvy hacker who knows how to handle SQL injection scripts. Some do it for fun, others do it for kudos but the serious hackers are often linked to organised crime and even cyber terrorism. Serious money can change hands for data that has been pillaged.
In most cases the attack vector will be your database. This is where an attacker can collect personal details about your customers, harvest passwords and login details, collect credit card data, or even worse, medical history and other 'sensitive' data. While these data assets may be hashed and salted using complex encryption techniques the reality faced is that many organisations suffer immense reputational damage having to admit publicly that the data was stolen in the first place even if there is no chance the data could be unencrypted.
Attacks from within, by members of staff, are also now common place. Take the recent account of Aviva where two members of staff acquired data on customers recent insurance claims and sold it to claims management companies.
It's also wise to not assume that a hacker will always attack from the perimeter of your network from an obscure eastern country. Keeping the front door locked but leaving the back door open can be a perfect way for a determined hacker to gain access. Local attacks are as much a risk as remote attacks...
The Tiger hunts...
For example if a hacker know's where your office is located (Let's be honest, Google will show them the front door!) he may attempt to access your premises as the air-conditioning or printer repair man. Of course he's not on the list of expected visitors, so off reception go to find out the score from facilities management leaving the reception desk unattended. Our hacker printer repair man pulls out a WiFi router and loops it to the back of the reception PC and hides it behind the desk. The receptionist returns and informs our hacker printer repair man, that no repairs are scheduled... "It must be a mix up at HQ" he says and politely leaves. He now heads for his car and connects over WiFi to the router he has just planted, he now has access to your LAN and the attack begins... This activity is often done by 'Ethical Hackers' who are paid by companies to find weaknesses in their security processes and is known as a 'Tiger Attack'. It could however be a real event if your data is valuable enough to an organised crime syndicate or someone who wants to damage your companies reputation.
Sadly, the weakest link in data security is almost always the Human. Socially engineered attacks are the first weapon in the arsenal of the hacker. With it they can pose as your local Service Desk team and email unsuspecting staff of an 'urgent security breech' that requires them to change their password immediately. Your staff are super trained in security and data protection, the email has the company logo and looks genuine, so the security conscious staff member clicks on the link to change their password. Once complete the member of staff feels proud that they have dutifully followed the security advice and probably begins encouraging the rest of the team to do the same... Little do they know they have just typed their username and password into a fake (phishing) website page where our hacker will harvest and use the details entered to access services like Outlook Web Access in order to read sensitive emails, or a VPN service to gain remote access to the network.
However, since we always use different passwords for all our internet accounts there is absolutely no chance that our hacker might use the same harvested details to access our personal eBay, PayPal or other financially related site... right?
My account(s) is/are secure!
One of the best examples of how determined hackers can be using your login details is the account of Mat Honan who works as a writer for Wired.com, it's a cautionary tale that all should read. In this example the hacker actually used multiple account/password recovery methods to ultimately gain access to Mat's Twitter account, along the way they left a trail of digital devastation... One thing it highlights is the risk posed by login and recovery processes not following a standard.
So there you have it, how secure do you feel right now? I write this particular article not to fill you with dread or fear, but just to trigger some 'common sense' thinking around how you protect both your organisations and your personal on-line security and ultimately defend yourself from those pesky bad guys who all wear balaclavas and nice ties...

How to Choose the Right Data Management Software Supplier for Your Business

By 

When you open a business that benefits from having financial data, it is important to choose the right software supplier for you. This is because you will want software that completely fills your needs as a company.
You do not want a software platform where you are only using some of the features, but you have to pay for all of them, because that would be a waste of money.
Therefore, you should not rush into a decision. You should do your research and find a piece of software that suits you completely. Even if this means that you have to wait a while for the software to be extended and evolved.
If you know that there is some software coming out later, but you need something in place now, you would be better using a less technological method, until the technology is available. This could mean that a member of your staff is analyzing data for a while and you might be interested in a provider that aligns its product roadmap with your internal roadmap.
If you are in the process of looking for a data and risk management software company, then read on for some tips on how to find one.
Integration
The first thing that you should look for is integration. This is where the software that you choose will integrate with other software packages and work in conjunction with them.
The data and risk management software should analyze the data that it has collected and then produce a statement about the risk of lending to certain people. The integration part comes from collecting data that the user has inputted in the other software. It just takes the information that it needs to make an informed decision about the risk.
Software that works in tandem with other software reduces the work needed by the user and is quicker to make a decision. Software decisions are more reliable because they are not susceptible to a sob story if the user refuses the request.
Pricing Models
You should choose a company that has different pricing models for different needs. This is because you will want to try and save some money and only pay for the features that you need now.
You should be able to unlock new features in the future, when you expand and you want more data and risk management features. You should be able to do this by contacting the company and then they should give you instructions or a product key, for you to be able to make the changes yourself.
You should choose a company that offers you free upgrades on the software. This is because technology and the needs of businesses change so often that if you didn't get free upgrades, you would be buying new software every single year.
The company that you choose should allow you to connect to their server and your own IT officers should be able to download and install the software updates themselves. You should not have to wait for their technician to attend your premises, before you can do the upgrades because this could mean a lengthy waiting period and it could have connotations for certain risk decisions that you have made.

locking IP Addresses And Why That Is Important For A Web Administrator

By 

Expert Author Alex H D
A particular set of users may be attempting to compromise your website or your online infrastructure. There could be a whole host of reasons for this; such as to prevent you from doing business - ie. a competitor. For example, if you sell widgets online at $1 and your competitor sells them online at $1.5, he may want to take your website down, so the users buy more widgets from him.
This may also happen if your website is associated with a particular country. For example, American websites have largely been targeted by hackers from Pakistan and Afghanistan, and Russia and China for political reasons.
An IP Manager allows website owners to block a single or range of IP addresses. There could also be other reasons to block out an entire block of IP addresses from accessing your infrastructure. For example, if you are in the Securities Marketing business, you may have to comply with SEC rules if you are soliciting clients from the U.S. but you do not need to comply with these rules if you are only soliciting clients from outside the U.S. - some rules apply if you are soliciting American clients - such as filing certain disclosures etc. with the Securities and Exchange Commission (SEC).
The IP Manager feature is popularly offered through many web hosting control panels and can be a great tool to prevent an entire class of people from accessing your infrastructure.
If you notice many fraudulent transactions on your e-commerce website and want to block all users from Russia from accessing your website - you could block all Russian IP addresses. For example, if you are in the business of selling guns, and it is illegal to sell guns in UK - without some licensing compliance - and you have not got the license to sell guns in the UK - you may want to block out all UK users from accessing your website, lest the UK authorities take it to mean that you are acting unlawfully.
This feature also allows you block a fully qualified domain name if the server can resolve the IP. This allows website owners to block specific IPs that may be causing abuse.
You can also use a more complicated version of this feature to direct users from a particular country to a particular sub domain. You may want to do this if you want people from a particular country to see a different website, than users from another country. For example, if you price your products differently for users from different countries. For example, if car rental companies have different cars available at different locations, they may want to direct users from a different location to their local site.
This can be done using Java or php, depending on the exact requirement of the website. PHP is great, because it causes faster loading of the website and gives the user a better experience. You can also use the htaaccess to redirect users to different subdomains. This is a very efficient way as well, because it happens directly at the apache level. You may want to consult a networking expert if you wish to undertake a modification to the htaaccess file.

Laptops Vs Tablets Vs E-Readers: Which Should I Choose?

By 

Expert Author John Balch
If you're in the market for a new portable electronic device, there seems to be an increasingly overwhelming amount of information to consider. Laptops are versatile. Tablets are popular. E-readers are inexpensive. So how do you know what the best fit is for you? In the end, it depends on your needs and on your budget.
First, think about the features that will be necessary on the device for you to perform. Perhaps you often travel for leisure, casually browse the web and watch the odd film. While the versatility of a laptop might be nice in the unlikely event that you'll take up a design project or engage in academic research, this device is probably too inconvenient and costly for your overall needs. A tablet would be much more practical, especially because it's such an easy device to travel with.
On the other hand, if you mostly read books and want to have something that can replace all of the print books that you carry with you every day, then an e-reader is probably your best choice.
Next, think about how much you would like to spend. While tablets don't have as much functionality as a laptop, they're generally (but not always) less expensive. Consider the value element here, as casual computer users and Internet browsers will prefer the cheaper option, despite the more limited scope of applications to explore with a tablet. There is some overlap in cost, however, in the high-end tablet and low- to medium-end of the laptop market, and it's important to carefully weigh function and convenience to price.
Overall, when trying to decide between a laptop, tablet and e-reader, the "winner" is always the most preferable choice for your specific needs. Here are some factors to consider:
Laptops
Pros
Laptops have the most functionality and versatility compared to tablets and e-readers.
They're ideal for frequent web browsing, e-mailing, research, document and presentation creation, audio/video playback, gaming and/or keyboard use.
Laptops come with full keyboards, allowing you to type much faster and more accurately compared to a touch screen device.
Laptops have back-lit, LCD screens that are great for web browsing, viewing photos and audio/video playback.
Laptops also have large screens and high screen resolution, which is ideal for viewing photos, browsing the web or enjoying entertainment content.
Laptops are also more durable than tablets, and you won't have to worry about scratching or damaging the touchscreen display.
Cons
Laptops are generally more expensive than tablets and e-readers and are not as simple to use.
Their back-lit, LCD screens are not ideal for reading e-books on, as they don't use the same "e-ink" displays that e-readers have. Prolonged reading can lead to eye strain.
Laptop screens also tend to be reflective, and are not ideal for reading in bright sunlight or under certain types of artificial light.
Laptops require a boot-up sequence.
Laptops are heavy (typically 3 to 6 lbs) and relatively large (typically 13 - 15" screen sizes) compared to tablets and e-readers.
Tablets
Pros
Tablets are notebook computers that rely on a touch screen interface for all input.
You can use a tablet for almost anything that you might want to do on a laptop computer. Tablets are ideal for casual web browsing, moderate gaming or watching movies. Tablets can also be used in a variety of specialized careers such as music and design.
Most tablets have back-lit, LCD screens that are great for web browsing, viewing photos and audio/video playback.
Tablets have instant on/off functionality, compared to a laptop that requires going through a boot-up sequence.
Tablets are battery efficient compared to laptops. You should be able to get around 10 hours between battery charges, depending on the types of applications you're running.
There are plenty of handy apps that can significantly extend the functionality of your tablet.
Tablets are very lightweight (typically 1 - 1.5 lbs), compact (typically 8" - 10" screen sizes) and easy to carry compared to a laptop.
Cons
The most obvious difference between a tablet and a laptop is the lack of a keyboard. This is fine when navigation primarily involves pointing, dragging or tapping, but inputting text into a program, such as in an e-mail or a document, can be more difficult. Since you're typing on a virtual keyboard, most people cannot type as quickly or as accurately as they could on a regular keyboard. You can add an external keyboard to most tablets; however, this adds costs and peripherals to a device that is generally intended to be portable and cost-saving.
Tablets do not possess the same processing power as a laptop. Their functionality as a computing device is limited, although sufficient for many people's uses.
Tablets require learning about how the programs you regularly use can be supplanted by application equivalents.
Tablets are not ideal for heavy researching, frequent keyboard use, document and presentation creation or hardcore gamers.
Tablets are also not practical for reading e-books on, as they don't use the same e-ink displays that e-readers have. Tablets are fine for reading in short periods, but prolonged reading can lead to eye strain.
Tablet screens tend to be reflective, and are not ideal for reading in bright sunlight or under certain types of artificial light.
Screens can also be susceptible to scratching or damage.
E-Readers
Pros
E-readers are great if you primarily want to read e-books, due to their special "e-ink" technology. Reading on an e-ink screen is almost identical to reading printed text. The displays are also not back-lit, so won't get as much eye strain as you would when reading on a tablet or laptop computer, both of which use backlit screens.
Another benefit of e-ink displays is that they only draw power when a page is being updated. E-readers can therefore last for weeks before a battery charge, compared to hours on a laptop or tablet.
E-readers allow you to carry a collection of thousands of books around in a device that is smaller and lighter than the average paperback book. An e-reader generally weighs less than 0.5 lbs, and is slightly smaller than a tablet (5" - 6" screen size is common).
Finally, e-readers are good value for money. They generally cost much less than laptops and tablets, and there are plenty of choices available for $100 - $150.
Cons
Many e-readers are only available in monochrome displays, which limits you to black and white.
Although e-ink displays are for reading purposes, they have a slow refresh rate, which makes them unsuitable for watching video on.
Although some e-readers have web browsing capabilities, the experience is poor at best, given that they can't play video and are often only available in black and white. E-readers with web browsing capabilities are generally best suited for choosing and downloading new books to read, and sending the odd e-mail when your other devices aren't handy.
E-reader screens can also be susceptible to scratching or damage.
Summary
Laptops:
  • Full functionality and excellent versatility
  • Ideal for frequent web browsing, e-mailing, research, document and presentation creation, audio/video playback, gaming or keyboard use
  • Back-lit LCD display
  • Full keyboard
  • Colour display
  • Battery life measured in hours
  • Requires a boot-up sequence
  • Not ideal for prolonged reading sessions
  • Good durability
  • Large screen (typically 13" - 15")
  • Relatively heavy (typically 3 - 6 lbs)
  • Expensive (generally between $500 - $1,000)
Tablets:
  • Generally a companion device for travel or leisure purposes
  • Ideal for casual web browsing, viewing photos, audio/video playback and moderate gaming
  • Simple and easy to use
  • Back-lit LCD display
  • Touch screen
  • Colour display
  • Battery life measured in hours
  • Instant on/off functionality
  • Not ideal for prolonged reading sessions
  • Screen susceptible to scratching
  • Relatively small screen (typically 8" - 10")
  • Lightweight (typically 1 - 1.5 lbs)
  • Moderately expensive (generally between $200 - $600)
E-Readers:
  • Primarily for reading e-books
  • Simple and easy to use
  • E-ink technology display
  • Often monochrome- only display
  • Battery life measured in weeks
  • Ideal for reading for long periods. No eye strain.
  • Inefficient for web browsing. No video playback.
  • Screen susceptible to scratching
  • Small screen (typically 5" - 6")
  • Very lightweight (typically 0.5 lbs or less)
  • Inexpensive (generally between $100 - $150)
Conclusion
Choose a laptop if you...
  • Are shopping for a primary computer
  • Need a device that requires high performance (e.g., for work, school, data entry, research, document or presentation creation, photo editing, design or games)
  • Type a lot (e.g., to compose e-mails or create documents)
  • Frequently browse the web
  • Read for short periods at a time
  • Read material that uses a lot of colour and/or graphics
  • Are not on a tight budget and are happy to spend a fairly large amount on a device with full functionality
Choose a tablet if you...
  • Already have a laptop or desktop computer and want a secondary device for travel or leisure purposes
  • Are comfortable navigating using point interaction
  • Are looking for a device that's very simple and easy to use
  • Have basic needs, such as casual web browsing, checking e-mail or posting to social networks
  • Want something purely for entertainment (movies, TV, music, moderate gaming, etc.)
  • Read for short periods at a time
  • Read material that uses a lot of colour and/or graphics
Choose an e-reader if you...
  • Read books, magazines and newspapers that don't have a lot of graphical content
  • Read for prolonged periods of time
  • Battery efficiency is important to you
  • Don't browse the web very often or have other means of browsing
  • Don't want to spend a large amount of money on a secondary device