Research In Motion

Displaying 1-40 of 304 results

  • White Papers // Dec 2011

    Static Data Mining Algorithm with Progressive Approach for Mining Knowledge

    Frequent itemsets generation is an important area of data mining. This paper is concerned with applying progressive approach to extract interesting information from a static database using dynamic approach. This provides an intelligent environment to discover frequent itemsets while reading a particular set of transaction from static database. The authors...

    Provided By Research In Motion

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution and RSA SecurID

    BlackBerry? devices are becoming ubiquitous throughout the enterprise, as organizations improve employee connectivity and communications. The BlackBerry? Enterprise Solution?designed and manufactured by Research In Motion (RIM)?is a flexible, Information Technology (IT)-friendly solution that provides mobile users with secure wireless access to their enterprise email and critical business applications

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // May 2009

    Pushing It to the Streets: (or to the Device)

    Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Cloud Computing: Security and Privacy Issues

    Cloud computing is the most growing technology these days. It has a flexible architecture with the concept of pay-as-the user-go. It has proper cost and time management those servers the clients satisfactorily. Being a promising technology, cloud still poses privacy and security as the major challenges. This paper deep dives...

    Provided By Research In Motion

  • White Papers // May 2010

    Necessity to Design of New DBMS Platforms for Data Analysis in Market-Oriented Cloud Computing: Properties and Limitations of Data Analysis

    Adopting a cloud computing strategy can help businesses conduct their core business activities with less hassle and greater efficiency. Companies can maximize the use of their existing hardware to plan for and serve specific peaks in usage. Thousands of virtual machines and applications can be managed more easily using a...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Refinery with Big Data Aspects

    Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process the data within time. Another reason that big data is a hot topic in the market today and new technology that enables an organization to take advantage of...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Reincarnating Traditional Relational Database Through NoSQL

    Day-by-day data is getting bigger and bigger the authors need to increase the mode of data storage as well, a common problem encountered with their traditional relational database is the problem of data bottleneck which still exists with the traditional methods of data storage this gave birth to NoSQL databases,...

    Provided By Research In Motion

  • White Papers // Dec 2011

    Green Database

    Green is the word of greatest concern these days. Green as clear to almost everyone actually refers to the environment friendliness. The authors are developing new technologies and new methods for the betterment of their life but they usually forget to take into consideration the adverse effects of those on...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review on Concept of Green Databases

    Energy consumption in data centre is becoming one of the most important issues in today's world. The hardware designers are making efforts to produce the hardware that minimize the power consumption. But despite of best efforts hardware still consumes more energy even at idle state. Data centers impact the environment...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Warehousing

    Data warehouse and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Data warehouse provides an effective way for the analysis and statistic to the mass data and helps to do the decision making. In recent years, data warehousing...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review of Data Warehouse

    Data warehousing and OLAP have become the most important aid for the decision makers of any industry. Basically data warehousing refers to collecting and storing historical data into single repository, which is known as data warehouse and using that warehouse to produce analytical results. Being the helping hand for the...

    Provided By Research In Motion

  • White Papers // Sep 2013

    A Survey: Various Segmentation Approaches to Iris Recognition

    Biometrics refers to the authentication of an individual's identity based on his physical or behavioral traits. The iris, one of the biometrics stands out among other biometric techniques because of its unique features like stability and accuracy, segmentation of iris has its own major applications in the field of surveillance,...

    Provided By Research In Motion

  • White Papers // May 2013

    Performance Comparison of Fake Iris Detection Methods

    Among several available biometric systems - iris recognition systems are said to be the most secure system because the iris patterns are unique and texture of the iris is hard to make a copy of it. But now by using colored lenses and textured lenses miscreant can breach the secure...

    Provided By Research In Motion

  • White Papers // May 2013

    Authentication and Authorization Issues For Multi-Hop Networks

    In this paper, the authors treat the problem of authentication through the multi-hop communication, authorization to services access, and efficient collaboration between ad hoc nodes in order to assure efficient packet relaying during services access, thus alleviating major problems in ad hoc networks deployment. A novel solution is proposed allowing...

    Provided By Research In Motion

  • White Papers // Apr 2010

    An Alternative Approach to Two Phase Encryption Using Back-Propagation Feed Forward Neural Technique

    The computer society make use of the various automated tools for the storage of the data and the file protection. For a distributed architecture, like the timesharing and the real time system, the information exchange via an unsecured network is worry for different organization. Cryptography is probably the most important...

    Provided By Research In Motion

  • White Papers // Jul 2013

    A Hybrid Fault Detection and Correction AES for Space Application

    The demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use encryption on board. The Advanced Encryption Standard (AES), which is a very popular choice in terrestrial communications, is slowly emerging as the preferred option in the aerospace industry...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Security Issues in WiMAX: A Critical Review

    WiMAX (Worldwide interoperability for Microwave Access) IEEE802.16 is a technology which provide the facility of wireless broadband access with the high speed data rates across whole cities or countries. WiMAX is the emerging technology of this generation. WiMax uses radio channel, which are open channel that's why security problem arises....

    Provided By Research In Motion

  • White Papers // Jan 2007

    An Approach to Improve the Data Security using Encryption and Decryption Technique

    Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. \"Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Automobile Security System Based on Face Recognition Structure Using GSM Network

    In this paper, the authors proposed embedded automobile security system Face Detection System (FDS) is used to detect the face of the driver and compare it with the predefined face. In the night when the vehicle owner is sleeping and someone has theft the vehicle, then FDS obtains the images...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Security in RFID Networks and Protocols

    RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or \"Smart\" applications for users. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. The author...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Novel Technique of Securing Mobile Adhoc Networks using Shared Trust Model

    Mobile Ad-hoc NETworks (MANETs) are mostly used in the conditions where any fixed backbone infrastructure is not available. They are easy to implement but they are more prone to attacks and threats. Being mobile and using distributed services are few of the weak points of security in MANETs. As the...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Data Aggregation in Wireless Sensor Network: A Survey

    Wireless Sensor Networks (WSNs) consist of sensor nodes. These networks have huge application in habitat monitoring, disaster management, security and military, etc. Wireless sensor nodes are very small in size and have limited processing capability very low battery power. This restriction of low battery power makes the sensor network prone...

    Provided By Research In Motion

  • White Papers // May 2013

    Trust Evaluation Based Security in Wireless Sensor Network

    The multi-hop routing in Wireless Sensor Networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routing protocols, including sinkhole attacks, wormhole attacks and Sybil attacks. The situation is further aggravated by...

    Provided By Research In Motion