Research In Motion

Displaying 1-40 of 302 results

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

    In this paper, the authors discuss about the improvement of security and privacy issues in wireless ad-hoc network, wireless mesh network and wireless sensor network with the help of routing protocols, authentication and cryptographic tools. Ad hoc network is a collection of nodes that is connected through a wireless medium...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Well-Known Gartner's Seven Security Issues Which Cloud Clients Should Advert

    In this paper, the authors present an applied research study on cloud computing process based on Gartner's security issues. The main objective of this research study is to get knowledge about cloud computing security and the important role which will they pay for the selection of resources. Cloud computing is...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Public Key Cryptanalysis Scheme Using Hierarchical Structure in Wireless Sensor Networks

    The growth of wireless sensor networks is widely spread over different applications, need of security mechanism is been the main issue nowadays. Therefore it is necessary to communicate between the sensor node protectively .The key management mechanism plays a major role in providing security in wireless sensor network. The authors...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Cloud Computing Services and its Application

    Cloud computing is a web-based, distributed computing using which information, resources and software's are distributed among different types of users. This computing approach allows much easier, flexible and high availability of resources at a very lower cost. The distribution of resources and services are on web, so this has opened...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Analysis of Palmprint Authentication System Using Wavelet Based Multi-Resolution Analysis

    A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many types of personal identification systems have been developed and palmprint...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Securing PHP Based Web Application Using Vulnerability Injection

    In the past few years, vulnerability injection technique has been given relatively lesser attention by the research community. The probable reason might be positioned in its objective which is apparently contrary to the purpose of making applications more secure. However, the same technique can be used in various research applications...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Security Issues in WiMAX: A Critical Review

    WiMAX (Worldwide interoperability for Microwave Access) IEEE802.16 is a technology which provide the facility of wireless broadband access with the high speed data rates across whole cities or countries. WiMAX is the emerging technology of this generation. WiMax uses radio channel, which are open channel that's why security problem arises....

    Provided By Research In Motion

  • White Papers // Jan 2007

    An Approach to Improve the Data Security using Encryption and Decryption Technique

    Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. \"Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Automobile Security System Based on Face Recognition Structure Using GSM Network

    In this paper, the authors proposed embedded automobile security system Face Detection System (FDS) is used to detect the face of the driver and compare it with the predefined face. In the night when the vehicle owner is sleeping and someone has theft the vehicle, then FDS obtains the images...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Security in RFID Networks and Protocols

    RFID identification is a new technology that will become ubiquitous as RFID tags will be applied to every-day items in order to yield great productivity gains or \"Smart\" applications for users. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. The author...

    Provided By Research In Motion

  • White Papers // Oct 2007

    Hypervisor Security - A Major Concern

    In the last few decades, the world of computation moves for the cloud computing. Cloud computing is a new delivery model for enabling convenient, on-demand network access of the computing resources. The cloud computing is one of today's most exciting technologies, because it can reduce the cost and complexity of...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Cloud Computing: Advantages and Security Challenges

    Cloud computing is a new computing paradigm that has a lot of advantages due to its ability to reduce cost associated with computing while increasing flexibility and scalability for computers. Cloud computing is a new concept of providing scalable and virtualized resources, bandwidth, software and hardware on demand to consumers....

    Provided By Research In Motion

  • White Papers // Oct 2013

    Implementation of Secure Hash Algorithm-1 Using FPGA

    Hash functions play a significant role in today's cryptographic applications. SHA (Secure Hash Algorithm) is famous message compress standard used in computer cryptography, it can compress a long message to become a short message abstract. In this paper, SHA- 1 is implemented using Verilog HDL (Hardware Description Language). The SHA-1...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Secure and Efficient Data Storage in Multi-Clouds

    Any information is valuable as long as it has related data. If related data are not put together, the information is meaningless as unrelated data has no value. The mapped information is required only by authenticated users. So there is no necessity to store related information together. If the relations...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review on Concept of Green Databases

    Energy consumption in data centre is becoming one of the most important issues in today's world. The hardware designers are making efforts to produce the hardware that minimize the power consumption. But despite of best efforts hardware still consumes more energy even at idle state. Data centers impact the environment...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Warehousing

    Data warehouse and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Data warehouse provides an effective way for the analysis and statistic to the mass data and helps to do the decision making. In recent years, data warehousing...

    Provided By Research In Motion

  • White Papers // Dec 2011

    A Critical Review of Data Warehouse

    Data warehousing and OLAP have become the most important aid for the decision makers of any industry. Basically data warehousing refers to collecting and storing historical data into single repository, which is known as data warehouse and using that warehouse to produce analytical results. Being the helping hand for the...

    Provided By Research In Motion

  • White Papers // Sep 2013

    A Survey: Various Segmentation Approaches to Iris Recognition

    Biometrics refers to the authentication of an individual's identity based on his physical or behavioral traits. The iris, one of the biometrics stands out among other biometric techniques because of its unique features like stability and accuracy, segmentation of iris has its own major applications in the field of surveillance,...

    Provided By Research In Motion

  • White Papers // May 2013

    Performance Comparison of Fake Iris Detection Methods

    Among several available biometric systems - iris recognition systems are said to be the most secure system because the iris patterns are unique and texture of the iris is hard to make a copy of it. But now by using colored lenses and textured lenses miscreant can breach the secure...

    Provided By Research In Motion

  • White Papers // May 2013

    Authentication and Authorization Issues For Multi-Hop Networks

    In this paper, the authors treat the problem of authentication through the multi-hop communication, authorization to services access, and efficient collaboration between ad hoc nodes in order to assure efficient packet relaying during services access, thus alleviating major problems in ad hoc networks deployment. A novel solution is proposed allowing...

    Provided By Research In Motion

  • White Papers // Apr 2010

    An Alternative Approach to Two Phase Encryption Using Back-Propagation Feed Forward Neural Technique

    The computer society make use of the various automated tools for the storage of the data and the file protection. For a distributed architecture, like the timesharing and the real time system, the information exchange via an unsecured network is worry for different organization. Cryptography is probably the most important...

    Provided By Research In Motion

  • White Papers // Jul 2013

    A Hybrid Fault Detection and Correction AES for Space Application

    The demand to protect the sensitive and valuable data transmitted from satellites to ground has increased and hence the need to use encryption on board. The Advanced Encryption Standard (AES), which is a very popular choice in terrestrial communications, is slowly emerging as the preferred option in the aerospace industry...

    Provided By Research In Motion

  • White Papers // Dec 2011

    Queuing Algorithms Performance Against Buffer Size and Attack Intensities

    Distributed Denial of Service (DDoS) attack is one of the biggest threats now days. This paper aims at providing the simulation results of buffer size and attack intensities effect on various queuing algorithms such as DropTail (DT), Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), Deficit Round Robin (DRR) and Random...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Anti-Trust Rank for Detection of Web Spam and Seed Set Expansion

    In the recent times, the web has been the most popular and perhaps the most efficient platform for sharing, storing as well as retrieving information. Finding the required information from the web is facilitated by search engines. Search engines form the interface between the web and the users. Given the...

    Provided By Research In Motion

  • White Papers // Oct 2010

    Feature Ranking Algorithm for Classification of Spam E-mail Data

    The feature ranking algorithm RELIEF-d is investigated for feature selection from spam E-mail Database. Spam is a unsolicited, unwanted email that was sent indiscriminately, directly or indirectly, by a sender having no current relationship with the recipient. In most classification models, identifying the more relevant features is as important as...

    Provided By Research In Motion

  • White Papers // Nov 2012

    New Logic Module for Secured FPGA Based System

    Field Programmable Gate Arrays (FPGAs) are used as a primary element in various domains of human life like aero-space, automotive, military etc which require them to operate in different types of environments. Security of FPGAs is of major concern as the IP developed after of research can be stolen within...

    Provided By Research In Motion

  • White Papers // Jun 2011

    A Novel 2D Cat Map Based Fast Data Encryption Scheme

    The security is an essential part of any communication system. Presently there are many types of encryption methods are available in symmetric and asymmetric key schemes because of long time requirement asymmetric schemes are not preferred for the large data encryption. Symmetric scheme is much better when compared for decoding...

    Provided By Research In Motion