Research In Motion

Displaying 1-40 of 305 results

  • White Papers // Nov 2012

    An Efficient Approach for Cloud Computing Based on Hierarchical Secure Paravirtualization System Resource Model

    Paravirtualization is an enhancement of virtualization technology in which guest operating system is recompiled prior to installation inside a virtual machine. Paravirtualization allows for an interface to the virtual machine that can differ from an underlying hardware. Cloud computing depends on paravirtualization for more efficient system resources like processors and...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // May 2009

    Pushing It to the Streets: (or to the Device)

    Research In Motion (RIM) has made its name by providing email to wireless devices for more than ten years. It has made wireless email available around the globe and has pioneered a number of the technologies that are needed to provide seamless integration between corporate and desktop email systems and...

    Provided By Research In Motion

  • Downloads // Mar 2010

    Introducing BlackBerry® Enterprise Server Express

    Get BlackBerry Enterprise Server Express for Free Connect two people via BlackBerry? smartphones and ideas get bigger. Progress happens faster. Answers get smarter. So imagine what happens when you give a business the freedom to connect all its employees. BlackBerry? Enterprise Server Express enables businesses of any size...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Mar 2009

    BlackBerry Enterprise Solution

    This paper describes the security features that the BlackBerry Enterprise Server version 5.0, BlackBerry Desktop Software version 5.0, and BlackBerry Device Software version 5.0 support, unless otherwise stated. To determine if an earlier software version supports a security feature, see the documentation for earlier versions of the BlackBerry Enterprise Server,...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution and RSA SecurID

    BlackBerry? devices are becoming ubiquitous throughout the enterprise, as organizations improve employee connectivity and communications. The BlackBerry? Enterprise Solution?designed and manufactured by Research In Motion (RIM)?is a flexible, Information Technology (IT)-friendly solution that provides mobile users with secure wireless access to their enterprise email and critical business applications

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Sep 2013

    Multiple Distinguishing Factors Based Measure for Data Misuseability Detection

    Data Anantapur (Autonomous), India. is valuable for any business. The power of organization lies in the data it maintains. Preserving such data and securing it has to be given paramount importance. Misuse of such data is a challenge to organizations. The data in an organization is used by the insiders....

    Provided By Research In Motion

  • White Papers // Sep 2013

    Analysis of Parallelization Techniques and Tools

    Parallel computing solves computationally large problems by partitioning into multiple tasks and running simultaneously on multicore or multiprocessor environment based on shared or distributed memory architectures. New multicore era demands software programmer to develop parallel programs to completely utilize the hardware parallelism. Writing parallel program manually for complex problem is...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Low Power SRAM Design with Reduced Read/Write Time

    In this paper the authors explore the design and analysis of Static Random Access Memories (SRAMs) which focuses on optimizing delay and power. CMOS SRAM cell consumes very less power and have less read and write time. Higher cell ratios can decrease the read and write time and improve stability....

    Provided By Research In Motion

  • White Papers // Jan 2007

    MARTE Genetic Algorithm for Uncovering Scenarios Leading to Data Races in Concurrent Systems

    Identifying the concurrency problems early in the design process is most important. Because, these problems caused to disturbance or damage when building larger and more complex systems. The recent trend is Model Driven Development (MDD), so there is a method used for the detecting concurrency problems, which is based on...

    Provided By Research In Motion

  • White Papers // Jan 2007

    SADS - Self Annihilating Data Storage system in Cloud Storage Service

    Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control....

    Provided By Research In Motion

  • White Papers // Jan 2007

    Self Annihilating Data Storage and Location Based nonterminating Video Streaming Services for Mobile Users in CLOUD Environment

    Cloud computing has become a popular buzzword and it has been widely used to refer to different technologies, services, and concepts. With the use of cloud computing, here the authors are trying to give the location based efficient video information to the mobile users. Location Based Service (LBS) is an...

    Provided By Research In Motion

  • White Papers // May 2013

    Emulation of FTP Service Using Virtual Honeypot

    Security, over the last decade, has become a huge priority for the network administrators. They dedicate lots of time to make sure that each network has the best and latest security patches, firewalls, and intrusion detection systems. Unfortunately, the security patches such as firewalls and intrusion detection systems are not...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Survey Paper on Workflow Scheduling Algorithms Used in Cloud Computing

    Cloud computing is one of the emerging technologies which expand the boundary of internet by using the centralized servers to maintain data and resources. It enables the users and the consumers to use various applications provided by the cloud provider. But one of the major problems in front of this...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Performance Analysis of Intrusion Detection System over Mobile Cloud System

    The usage of Smartphone is increasing day-by-day and the security is a great concern for web accessing, in the smart phone for example the authors are performing banking transactions by using smart phones like transferring the amount from one account to another account to their mobile phones. there is no...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Data Experience Elevation through Network Intervention

    The main element or the main factor driving the mobile network communication is the data. Data mainly refers to packet data connection that a mobile handsets use to fetch information from the internet also known as World Wide Web (WWW). 3G also known as the 3rd generation internet is the...

    Provided By Research In Motion

  • White Papers // Jul 2014

    An Efficient Model for Share Market Prediction Using Data Mining Techniques

    Share market acts as one of the key role for building economy of any developing nation. It is highly complex to determine booms and crashes in the market, so it became one of the interesting and challenging topics for all the business researchers to predict an accurate share value. In...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Fault Data Aggregator Recovery Process in Wireless Sensor Networks

    A wireless sensor network is collected with thousands of miniature resource insufficient sensor nodes, set with controller, transceivers and non-rechargeable batteries. The transmission of data from each sensor node to other nodes consumes more energy than data processing in the controller unit of sensor nodes. To enlarge the network lifetime...

    Provided By Research In Motion

  • White Papers // Jul 2014

    A Survey on Multi-Relational Database based Classification Approaches

    In real world, data are stored in multiple relational databases. many problems like expensive join operation and semantic losses in classifying objects stored in multiple tables (relations) involves. Multi relational classification is the process of building a classifier based on information stored in multiple relations This approach has been developed...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Performance and Analysis of Reconfigurable Video Game Design Using FPGA

    FPGA (Field Programmable Gate Array) is widely used in different applications like image processing, signal processing, and digital system design, wired and wireless communications. Due to reconfigurability nature of FPGA a video game is designed in Spartan-3E target device. The video game is designed in three different hardware description programming...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Visualization of Big Data: Its Tools and Challenges

    The rapid development of the heterogeneous networking and social websites is leading to the exponential growth in the amount of the data. To examine the bulky amount of data, from concealed patterns and unidentified correlations, the big data analysts require visualization tools. The visualization tools help in gaining insight about...

    Provided By Research In Motion

  • White Papers // Jun 2014

    Notation based Content Extraction from Disparate Databases Using Ontology

    In knowledge-discovery and data mining, the method of finding huge volumes of data for patterns using tools such as categorization, clustering, etc. is very common. The data thus has received too many parameters. For someone who is a non skilled in data mining, the obtained policy are too far away,...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Survey Paper on Concurrency control mechanisms in a Distributed Database Environment

    In this paper, the various mechanisms used for concurrency control in a distributed database are summarized and their respective advantages and disadvantages are listed. Distributed databases have become a large part of the current information era. Millions of users access the data stored on these databases at a time. This...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Replication in a simply Distributed, Mobile Ad-hoc, Cloud, Internet and Peer to Peer Environment: A Multi Dimensional Analysis and the scope for extension

    Replication has been a popular technique that provides increased data or service availability in case of failure or crash of server or the node which is responsible to serve the requested data or service. Replication improves data availability, data accessibility, fault tolerance and reliability of the network that is targeted...

    Provided By Research In Motion

  • White Papers // Jul 2014

    Mining High Profit Itemsets using Heuristic Rule Framing Algorithm from Transactional Database

    Data mining is the process of eliciting data from the Brobdingnagian datasets. It is hard to compute when the database is having irrelevant data and also it occupies more space. The authors' normal lives will fully moving beyond to the computers. So the number of data to be stored has...

    Provided By Research In Motion

  • White Papers // May 2014

    Secure Data Transaction Using Cryptographic Algorithm in ARM

    Wireless network is the contrivance used to transmit data over wide field and its significance is mounting worldly in many crucial applications medical, industries, military etc. Authentication is the security factor must be implied for secure data transmission. Encrypted data is usable and beneficial in the field where invader interruption...

    Provided By Research In Motion