It, too, has a memory card reader for MicroSD cards, just in case you wanted to offload some photos and didn't have the tablet in its PC Station stand.
And when doing these sorts of look backs it is always so very tempting to pick something that hasjust happened for it burns more brightly in the memory.
Techniques such as extracting operating parameters, comparing application profiles across VMs (to look for signs that one has been successfully attacked), and analyzing application behavior in memory (as opposed to just code stored on disk) are far easier in a virtual environment and provide a huge advantage for stopping the most sophisticated threats.