The increasing popularity of the tablet computer is revolutionizing some aspects of the business environment. Unlike some kinds of laptops, tablets are slim, small, and extremely lightweight, allowing workers and executives to carry them about and pop them out at a moment's notice.
Now, however, tablets are coming to be used in an entirely different way: as a key tool that can be used to mitigate some of the security risks inherent in any networked computing environment. An IT consultant can set up most tablets so that the input options can be ‘locked out’ or permanently turned off. This means that the tablets devices would allow users to view information but not delete it, add to it, or alter it in any way. This approach to data security is already being used at the Cancer Treatment Centers of America, which is providing its clients with view-only access to medical data.
Chad Eckes, who serves as Chief Information Officer for the organization, commented on the shift to mobile computing devices: "The mobile device wave reminds a lot of us of the transition from mainframe green screen terminals to moving over to PCs," he remarked. "Whether we like it or not, it's coming and we need to embrace that level of change."
IT solutions designed to harness new technologies for the benefit of small and medium businesses frequently benefit from being implemented under a managed programs approach. This is because this model automatically provides regular, ongoing monitoring and maintenance.