Research In Motion

Displaying 1-40 of 306 results

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // May 2009

    Pushing It to the Streets: (or to the Device)

    Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and...

    Provided By Research In Motion

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • Webcasts // Jan 2009

    Dealing With Intellectual Property and How to Use This to Enhance the Value of Your Business

    The presenter of this webcast shows how to deal with intellectual property and how to use this to enhance the value of your business.

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Mar 2009

    BlackBerry Enterprise Solution

    This paper describes the security features that the BlackBerry Enterprise Server version 5.0, BlackBerry Desktop Software version 5.0, and BlackBerry Device Software version 5.0 support, unless otherwise stated. To determine if an earlier software version supports a security feature, see the documentation for earlier versions of the BlackBerry Enterprise Server,...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Automatic Fall Detection for Elderly - Providing Timely Aid Using GSM Modem

    The number of persons above the age of 60 years is fast growing, especially in India. Falls are one of the major problems in the elderly and are considered one of the \"Geriatric Giants\". In the paper, the authors propose a camera based automatic fall detection method to facilitate the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A 33kV Distribution Network Feeder Reconfiguration by Using REPSO for Voltage Profile Improvement

    The complexity of modern power system has contributed to the high power losses and over load in the distribution network. Due to that reason, Feeder Reconfiguration (FR) is required to identify the best topology network in order to fulfill the power demand with reduced power losses while stabilizing the magnitude...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Robotic Control with Android & PC Using X-Bee

    In this paper, the authors concerned with the Android-Arduino communication and computer-communication by integrating mobile wheel robots with X-Bee communication protocol. Arduino controls tasks such as obstacle and collision avoidances following, autonomously movement, and indoor localization of group robots are implemented toward an autonomously control of robot. Mobile robotics is...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance Analysis of Artificial Nueral Network Based Shuntactive Power Filter

    In this paper, the authors investigate a 3-wire Shunt Active Power Filter (SAPF) with Artificial Neural Network (ANN) smart controllers for mitigating the harmonics of the distribution system. To improve the performance of the conventional controller based on hysteresis controller and take advantage of smart-controllers, a feed forward-type (trained by...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Hybrid Query Generation Schemas for Full Text Retrieval in P2P Networks

    Now-a-days millions of users to search and download desired data such as Napster and Gnutella as they are Peer-To-Peer (P2P) files sharing applications. In order to improve performance in unstructured P2Ps replication strategies are used. Efficient and effective full-text retrieval over unstructured p2p networks was developed in order to address...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Analysis of Gateway Relocation Strategies in 802.16 Heterogeneous Networks

    IEEE 802.16-series are expected to provide broadband wireless access for a variety of multimedia services. To minimize handover delay and packet loss the authors defined a two-tiered mobility management in WiMAX Forum. WiMAX standards define the Access Service Network GateWay ASN GW relocation procedures and do not identifying when the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Graphical Password Authentication System for Touch Screen Based Devices

    Mobile devices equipped with touch screens dominate the current mobile market because of high flexibility and good usability. Many privacy sensitive applications run on such devices. For authentication typing a text password is challenging task in touch screen based devices. A graphical based password is one of the most promising...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Location-Aware E-passport: Enhancing Security and Privacy

    In E-passport identification process reading RFID are used. In the related work RFID's are embedded inside a chip which is holding the information of authentication. In this paper the implementation of E-passport using mobile devices to authenticate and access information stored by using context aware information to get access to...

    Provided By Research In Motion

  • White Papers // Jul 2014

    CB-Asymmetric Coplanar L Strip-Fed Dual Band Antenna for GSM/WLAN Application

    In this paper is to give a conductor backed asymmetric coplanar inverted Lstrip fed antenna for dual band applications. The antenna exhibit resonance at 1. 8GHz (1. 6-1. 85GHz) and 5. 2GHz (5. 08-5. 35GHz) with impedance band width of about 150MHz and 200MHz (return loss>-10dB) which is used for...

    Provided By Research In Motion

  • White Papers // Jul 2014

    LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted Value for Multi-hop Wireless Networks

    In multi-hop wireless networks the communications rely on intermediate nodes that require collaboration; however, selfish nodes make use of the cooperative nodes to relay their packets and do not relay other nodes' packets. In this paper, the authors propose LESIPT: Lightweight Enhanced Secure Incentive Protocol with Trusted value for multi-hop...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review of Data Warehouse

    Data warehousing and OLAP have become the most important aid for the decision makers of any industry. Basically data warehousing refers to collecting and storing historical data into single repository, which is known as data warehouse and using that warehouse to produce analytical results. Being the helping hand for the...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review on Concept of Green Databases

    Energy consumption in data centre is becoming one of the most important issues in today's world. The hardware designers are making efforts to produce the hardware that minimize the power consumption. But despite of best efforts hardware still consumes more energy even at idle state. Data centers impact the environment...

    Provided By Research In Motion

  • White Papers // Jul 2011

    Mobile Agent Applications within Intrusion Detection Technology

    Intrusion Detection System (IDS), based on mobile agents, that detects intrusion from outside the network segment as well as from inside. Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself...

    Provided By Research In Motion

  • White Papers // May 2011

    Study and Analysis of Data Mining Techniques

    Data mining is a rapidly expanding field in many disciplines. It is becoming increasingly necessary to find data mining packages appropriate for a given analysis. Data mining techniques have been advantageously functional in a variety of disciplines including Intrusion detection, manufacturing, process control, fraud detection, marketing, and network management. Over...

    Provided By Research In Motion

  • White Papers // May 2013

    Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks

    Distributed Denial of Service (DDoS) attacks is an important thread in internet. In IPv6 internet worms are difficult to identify, because of the total amount of traffic which does not allow the instant investigation of fine points. In Internet Protocol Version 6 (IPv6) networks one of the common traffic flows...

    Provided By Research In Motion

  • White Papers // Apr 2010

    An Ant-Based Routing Algorithm for Detecting Attacks in Wireless Sensor Networks

    In this paper, the authors propose a routing algorithm that detects congestion and hence DDoS attack using age, energy and reliability as parameters. Although researchers have proposed number of mechanisms for preventing congestion and attacks in WSN but very few of them have thought of deploying ants as intelligent entities....

    Provided By Research In Motion

  • White Papers // May 2013

    Gathering Information From Wireless Sensor Network to Cloud and Accessing It Using Smartphone Application

    The field of wireless sensor networks has produced a range of supporting hardware and software technologies that facilitate the creation of sensor network applications. Despite these advances, the implementation of wireless sensor network applications remains a complex task that requires domain experts and a significant investment of time and money....

    Provided By Research In Motion

  • White Papers // Nov 2013

    Increased MSME and Global Entrepreneurship Due to Cloud Computing

    There has been a significant increase in the number of Medium, Small and Micro scale Enterprises (MSME) around the world which has helped young Entrepreneurs to build small scale businesses. Cloud computing has been one of the primary enabler of the same because of the multi-tenant, ubiquitous, on demand computing...

    Provided By Research In Motion

  • White Papers // Oct 2012

    Anonymity Trust Management Scheme (ATMS) for Clustered Wireless Sensor Networks

    Wireless sensor networks consists of sensor nodes that are capable of sensing information in the area of interest and maintaining security is a very important issue. The existing trust management scheme is prone to security issues and adversaries can determine the trust values by adapting traffic analysis attack. In this...

    Provided By Research In Motion

  • White Papers // Sep 2013

    CcMS: A Cloud Computing Based Content Management System

    The amount of digital content is increasing at a rapid rate. These contents are being accessed using a wide range heterogeneous set of devices. Managing all these data is becoming difficult and time consuming without an efficient and robust content management system. In this paper, a cloud computing based content...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Finding Execution Faults in Dynamic Web Application

    Pin down is a framework for root cause analysis on dynamic web application. Fault localization in dynamic web application is the problem of decisive where in the source code modifies has to be completed in order to fix the perceived failures. The cause of the failure is called as execution...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Survey on Association Rule Mining in Market Basket Analysis

    Data mining refers to extracting knowledge from large amount of data. Market basket analysis is a data mining technique to discover associations between datasets. Association rule mining identifies relationship between a large set of data items. When large quantity of data is constantly obtained and stored in databases, several industries...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Comparative Approach to Reduce the Waiting Time Using Queuing Theory in Cloud Computing Environment

    Cloud computing is a model to provide different type of services like SaaS, PaaS and IaaS over the internet. Cloud is a collection of virtualized and interconnected computers dynamically presented as one or more unified computing resources based on service level agreement. Job scheduling is the very important issue in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Efficient Data Mining Algorithm for Reducing High Toll Transactions

    Mining cost efficient item-sets from a transactional database refers to the discovery of transaction sets with cost efficient characteristics improving overall profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item-sets for cost efficient item-sets....

    Provided By Research In Motion

  • White Papers // Jan 2007

    A Comparative Performance Analysis of Various Variants of Round Robin Scheduling Algorithm

    As processor is one of the most important computer resources, it becomes obvious to use this resource in a most efficient way such that its utilization is maximum and hence waiting time, turnaround time, response time and context switch of processes submitted to it is reduced. Various scheduling algorithm are...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Selection of n in K-Means Algorithm

    One of the most popular and widely used algorithms in data clustering is K-means algorithm. However, one of its main downsides is that user has to specify number of clusters that is n, before the algorithm is to be implemented anywhere. This paper reviews existing methods for choosing the available...

    Provided By Research In Motion

  • White Papers // Jan 2007

    A Fully Homomorphic Encryption Implementation on Cloud Computing

    The cloud computing has been the most promising innovation in the computing world in past decade. Its usage is still hindered by the security concerns related with critical data. The encryption of remotely stored data has been the most widely used technique to bridge this security gap. The speculated vast...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Security and Privacy issues in Cloud Computing and Providing Platform for E-learning

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of the cloud computing is to apply traditional supercomputing or high performance computing power. To do this cloud computing uses network of large group...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion