Research In Motion

Displaying 1-40 of 302 results

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • White Papers // Dec 2011

    Static Data Mining Algorithm with Progressive Approach for Mining Knowledge

    Frequent itemsets generation is an important area of data mining. This paper is concerned with applying progressive approach to extract interesting information from a static database using dynamic approach. This provides an intelligent environment to discover frequent itemsets while reading a particular set of transaction from static database. The authors...

    Provided By Research In Motion

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Built-In Self-Repair Mechanism for Embedded Memories Using Totally Self-Checking Logic

    Today's deep submicron technologies allow the integration of multiple memories on a single chip. Embedded memories are one of the most universal cores, which occupy around 90% area in System-on-Chip (SoC) architecture due to the demand for high data storage. So, the embedded memory test process has become an essential...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Performance Evaluation of Bender's Decomposition Algorithm

    In cloud computing, provisioning an optimal resource to consumer gets more and more crucial. Cloud computing consumers are able to use the set of computing resources by net. Cloud providers will receive some amount for these computational resources depending on usage of cloud resource. The provisional resource plans are reservation...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Web Usage Mining: Identification of Trends Followed by the User Through Neural Network

    For proper website management it is important that the authors study individual trends followed by the users and then customize website according to customers. One such technique which can be used to mine data stored in web logs is web mining. Web mining has three main thrust areas web usage...

    Provided By Research In Motion

  • White Papers // Oct 2007

    K-Means Clustering Technique on Search Engine Dataset Using Data Mining Tool

    Today World Wide Web is growing wide as its name. It seems a bit difficult to manage all the information with search engine, as new modules have to be added into it. For that purpose, a technique name clustering comes in to everyone's mind. Clustering provided an organized way to...

    Provided By Research In Motion

  • White Papers // Oct 2007

    Search Results Improvement through Ranking Approach

    Recommender systems provide plenty of benefits to both users and the businesses. Due to web related applications, user-generated information is more freestyle and less ordered, which increases the difficulties in mining helpful information from these data sources. Innumerable dissimilar types of recommendations are ready on the web daily, with movies,...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Ensuring Cloud Security Using Cloud Control Matrix

    Cloud computing is the most evolutionary technology prevalent today, which is widely accepted by organizations due to cost-affordability, efficiency and flexibility. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. It shifts...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Cloud Computing: Security and Privacy Issues

    Cloud computing is the most growing technology these days. It has a flexible architecture with the concept of pay-as-the user-go. It has proper cost and time management those servers the clients satisfactorily. Being a promising technology, cloud still poses privacy and security as the major challenges. This paper deep dives...

    Provided By Research In Motion

  • White Papers // Oct 2007

    Grid Computing Vs. Cloud Computing

    Cloud computing has become another buzzword nowadays. However, there are dozens of different definitions for cloud computing and there seems to be no consensus on what a cloud is. On the other hand, cloud computing is not a completely new concept; it has intricate connection to the relatively new but...

    Provided By Research In Motion

  • White Papers // May 2013

    Analysis of Entropy Based DDoS Attack Detection to Detect UDP Based DDoS Attacks in IPv6 Networks

    Distributed Denial of Service (DDoS) attacks is an important thread in internet. In IPv6 internet worms are difficult to identify, because of the total amount of traffic which does not allow the instant investigation of fine points. In Internet Protocol Version 6 (IPv6) networks one of the common traffic flows...

    Provided By Research In Motion

  • White Papers // Apr 2010

    An Ant-Based Routing Algorithm for Detecting Attacks in Wireless Sensor Networks

    In this paper, the authors propose a routing algorithm that detects congestion and hence DDoS attack using age, energy and reliability as parameters. Although researchers have proposed number of mechanisms for preventing congestion and attacks in WSN but very few of them have thought of deploying ants as intelligent entities....

    Provided By Research In Motion

  • White Papers // Jul 2011

    Mobile Agent Applications within Intrusion Detection Technology

    Intrusion Detection System (IDS), based on mobile agents, that detects intrusion from outside the network segment as well as from inside. Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself...

    Provided By Research In Motion

  • White Papers // May 2011

    Study and Analysis of Data Mining Techniques

    Data mining is a rapidly expanding field in many disciplines. It is becoming increasingly necessary to find data mining packages appropriate for a given analysis. Data mining techniques have been advantageously functional in a variety of disciplines including Intrusion detection, manufacturing, process control, fraud detection, marketing, and network management. Over...

    Provided By Research In Motion

  • White Papers // Oct 2012

    Anonymity Trust Management Scheme (ATMS) for Clustered Wireless Sensor Networks

    Wireless sensor networks consists of sensor nodes that are capable of sensing information in the area of interest and maintaining security is a very important issue. The existing trust management scheme is prone to security issues and adversaries can determine the trust values by adapting traffic analysis attack. In this...

    Provided By Research In Motion

  • White Papers // Sep 2013

    CcMS: A Cloud Computing Based Content Management System

    The amount of digital content is increasing at a rapid rate. These contents are being accessed using a wide range heterogeneous set of devices. Managing all these data is becoming difficult and time consuming without an efficient and robust content management system. In this paper, a cloud computing based content...

    Provided By Research In Motion

  • White Papers // May 2013

    Gathering Information From Wireless Sensor Network to Cloud and Accessing It Using Smartphone Application

    The field of wireless sensor networks has produced a range of supporting hardware and software technologies that facilitate the creation of sensor network applications. Despite these advances, the implementation of wireless sensor network applications remains a complex task that requires domain experts and a significant investment of time and money....

    Provided By Research In Motion

  • White Papers // Nov 2013

    Increased MSME and Global Entrepreneurship Due to Cloud Computing

    There has been a significant increase in the number of Medium, Small and Micro scale Enterprises (MSME) around the world which has helped young Entrepreneurs to build small scale businesses. Cloud computing has been one of the primary enabler of the same because of the multi-tenant, ubiquitous, on demand computing...

    Provided By Research In Motion

  • White Papers // May 2010

    Necessity to Design of New DBMS Platforms for Data Analysis in Market-Oriented Cloud Computing: Properties and Limitations of Data Analysis

    Adopting a cloud computing strategy can help businesses conduct their core business activities with less hassle and greater efficiency. Companies can maximize the use of their existing hardware to plan for and serve specific peaks in usage. Thousands of virtual machines and applications can be managed more easily using a...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Refinery with Big Data Aspects

    Big data usually includes data sets with sizes beyond the ability of commonly used software tools to capture, curate, manage, and process the data within time. Another reason that big data is a hot topic in the market today and new technology that enables an organization to take advantage of...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Reincarnating Traditional Relational Database Through NoSQL

    Day-by-day data is getting bigger and bigger the authors need to increase the mode of data storage as well, a common problem encountered with their traditional relational database is the problem of data bottleneck which still exists with the traditional methods of data storage this gave birth to NoSQL databases,...

    Provided By Research In Motion

  • White Papers // Dec 2011

    Green Database

    Green is the word of greatest concern these days. Green as clear to almost everyone actually refers to the environment friendliness. The authors are developing new technologies and new methods for the betterment of their life but they usually forget to take into consideration the adverse effects of those on...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Securing PHP Based Web Application Using Vulnerability Injection

    In the past few years, vulnerability injection technique has been given relatively lesser attention by the research community. The probable reason might be positioned in its objective which is apparently contrary to the purpose of making applications more secure. However, the same technique can be used in various research applications...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review on Concept of Green Databases

    Energy consumption in data centre is becoming one of the most important issues in today's world. The hardware designers are making efforts to produce the hardware that minimize the power consumption. But despite of best efforts hardware still consumes more energy even at idle state. Data centers impact the environment...

    Provided By Research In Motion