Research In Motion

Displaying 1-40 of 134 results

  • White Papers // Mar 2014

    Information Technology & Business Management

    Business management is often about information management more than any other skill, as today's manager has quick access to every type of report about the operation of the business. An effective manager must be able to analyze all of the available information and sort out what is pertinent to the...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Overview - Snort Intrusion Detection System in Cloud Environment

    Now-a-days cloud computing has become very popular since it reduces infrastructure cost. Hence, the level of security measures also has to be increased. Intrusions Detection Systems (IDSs) are designed to handle attacks but many Intrusion Detection System (IDS) are designed for specific attack/attacks. It is evident that no single technique...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CAGDI: A New Conceptual Model of Early and Late Requirement Engineering for Non Fading Dataware House

    Building a data warehouse is a very challenging task. Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Java Based Distributed File System

    There are distributed file systems that are being used in businesses and individuals but still users face various challenges and problems in using those systems. The distributed file system based on Java resolve the difficulties that were occurring in the past systems and provides various functionalities to users such as...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Clustering - A New Perspective

    Although there has been a demarcation between development and evolution (maintenance) of software, this is increasingly irrelevant as fewer and very fewer systems are completely new. Additionally, after the system had gone through many changes during the maintenance, remembering the system's structure is less possible one. Software architecture is a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Survey on Association Rule Mining in Market Basket Analysis

    Data mining refers to extracting knowledge from large amount of data. Market basket analysis is a data mining technique to discover associations between datasets. Association rule mining identifies relationship between a large set of data items. When large quantity of data is constantly obtained and stored in databases, several industries...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Finding Execution Faults in Dynamic Web Application

    Pin down is a framework for root cause analysis on dynamic web application. Fault localization in dynamic web application is the problem of decisive where in the source code modifies has to be completed in order to fix the perceived failures. The cause of the failure is called as execution...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Efficient Data Mining Algorithm for Reducing High Toll Transactions

    Mining cost efficient item-sets from a transactional database refers to the discovery of transaction sets with cost efficient characteristics improving overall profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate item-sets for cost efficient item-sets....

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Comparative Approach to Reduce the Waiting Time Using Queuing Theory in Cloud Computing Environment

    Cloud computing is a model to provide different type of services like SaaS, PaaS and IaaS over the internet. Cloud is a collection of virtualized and interconnected computers dynamically presented as one or more unified computing resources based on service level agreement. Job scheduling is the very important issue in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Selection of n in K-Means Algorithm

    One of the most popular and widely used algorithms in data clustering is K-means algorithm. However, one of its main downsides is that user has to specify number of clusters that is n, before the algorithm is to be implemented anywhere. This paper reviews existing methods for choosing the available...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Security and Privacy issues in Cloud Computing and Providing Platform for E-learning

    Cloud computing is a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications. The goal of the cloud computing is to apply traditional supercomputing or high performance computing power. To do this cloud computing uses network of large group...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud SQL Security

    Cloud computing is an emerging paradigm which has become today's hottest research area due to its ability to reduce the costs associated with computing, dynamic resource pools, virtualization, increases the efficiency of computing and high availability. But there are some drawbacks such as privacy, security is very important aspects. In...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Data Encryption by Image Steganography

    In modern era data is heavily gaining importance as information is dependent on the raw facts i.e. data. The exchange of information is required to share resources among the distributed users which may be separated by locations. While transferring the data among the users the confidentiality and privacy should be...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion

  • White Papers // Feb 2014

    An Overview of Distributed Databases

    A database is a collection of data describing the activities of one or more related organizations with a specific well defined structure and purpose. A database is controlled by DataBase Management System (DBMS) by maintaining and utilizing large collections of data. A distributed system is the one in which hardware...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Accessible Cloud Computing Based E-learning Environment for Disabled People

    Cloud computing is multiple set of services which provide infrastructural resources using internet as network as interconnecting media, applications and data storage on a service provider's server (third party). The basic principle of e-learning is to achieve personal learning goals by acquiring skills and knowledge through computers or other network-enabled...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Analysis of Palmprint Authentication System Using Wavelet Based Multi-Resolution Analysis

    A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. Biometric has gained much attention in the security world recently. Many types of personal identification systems have been developed and palmprint...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Security and Privacy Issues in Wireless Ad Hoc, Mesh, and Sensor Networks

    In this paper, the authors discuss about the improvement of security and privacy issues in wireless ad-hoc network, wireless mesh network and wireless sensor network with the help of routing protocols, authentication and cryptographic tools. Ad hoc network is a collection of nodes that is connected through a wireless medium...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Well-Known Gartner's Seven Security Issues Which Cloud Clients Should Advert

    In this paper, the authors present an applied research study on cloud computing process based on Gartner's security issues. The main objective of this research study is to get knowledge about cloud computing security and the important role which will they pay for the selection of resources. Cloud computing is...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Cloud Computing Services and its Application

    Cloud computing is a web-based, distributed computing using which information, resources and software's are distributed among different types of users. This computing approach allows much easier, flexible and high availability of resources at a very lower cost. The distribution of resources and services are on web, so this has opened...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Authentication & Verification of Secure Parking Using OCR Technique

    Intelligent Transportation System (ITS) has become an integral part of the Transportation Industry these days and it consists of License Plate Recognition (LPR) System. License Plate Recognition is also called Car Plate Recognition (CPR) or Automatic Number Plate Recognition (ANPR) System. In this paper an attempt has been made to...

    Provided By Research In Motion

  • White Papers // Jan 2014

    Public Key Cryptanalysis Scheme Using Hierarchical Structure in Wireless Sensor Networks

    The growth of wireless sensor networks is widely spread over different applications, need of security mechanism is been the main issue nowadays. Therefore it is necessary to communicate between the sensor node protectively .The key management mechanism plays a major role in providing security in wireless sensor network. The authors...

    Provided By Research In Motion

  • White Papers // Nov 2013

    Increased MSME and Global Entrepreneurship Due to Cloud Computing

    There has been a significant increase in the number of Medium, Small and Micro scale Enterprises (MSME) around the world which has helped young Entrepreneurs to build small scale businesses. Cloud computing has been one of the primary enabler of the same because of the multi-tenant, ubiquitous, on demand computing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Knowledge Management in Libraries

    The library will play a very crucial role in the extension and modification of knowledge. The development of knowledge management in recent years has become the key concern for librarian and libraries. Knowledge management requires more effective methods of information handling, speedy transfer of information. This paper is intended to...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Network Security-The Biggest Challenge in Communication

    Today one of the biggest challenges is to secure the internal network in communication. Understanding the fundamentals of any technology is vital if ever going to fully understand that technology. Without putting in ample time learning and practicing the fundamentals of security, it won't be able to learn the more...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Warehousing

    Data warehouse and On-Line Analytical Processing (OLAP) are essential elements of decision support, which has increasingly become a focus of the database industry. Data warehouse provides an effective way for the analysis and statistic to the mass data and helps to do the decision making. In recent years, data warehousing...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Data Communication through Mobile Agent with Pre- Processing Techniques in Electronic Environment

    Mobile agents are emerging as a major trend of distributed systems. Different mobile agent frameworks are being actively developed in the research community. Electronic commerce and information retrieval are two prospective directions for application of mobile agents. Nevertheless, security and reliability are two crucial concerns for such systems, especially when...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Automobile Security System Based on Face Recognition Structure Using GSM Network

    In this paper, the authors proposed embedded automobile security system Face Detection System (FDS) is used to detect the face of the driver and compare it with the predefined face. In the night when the vehicle owner is sleeping and someone has theft the vehicle, then FDS obtains the images...

    Provided By Research In Motion

  • White Papers // Oct 2013

    A Study of Hierarchical Clustering Algorithm

    Clustering is the process of grouping the data into classes or clusters, so that objects within a cluster have high similarity in comparison to one another but these objects are very dissimilar to the objects that are in other clusters. Clustering methods are mainly divided into two groups: hierarchical and...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Combating Packet Sniffing

    For years, computer-network administrators have used packet sniffers to monitor their networks to diagnose and solve problems. However, sniffers today have the potential to cause personal harm because they allow a hacker to confiscate confidential information. Organizations cannot afford inside agents to sniff out important data which could harm their...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Ensuring Cloud Security Using Cloud Control Matrix

    Cloud computing is the most evolutionary technology prevalent today, which is widely accepted by organizations due to cost-affordability, efficiency and flexibility. It enables the virtual organization to share geographically distributed resources as they pursue common goals, assuming the absence of central location, omniscience and an existing trust relationship. It shifts...

    Provided By Research In Motion

  • White Papers // Oct 2013

    Deriving Business Intelligence from Unstructured Data

    The bulk of an organization's data is unstructured that is the information that doesn't nicely fit into the typical data-processing format. It remains stored, but unanalyzed. The information hidden or stored in unstructured data can play a critical role in making decisions, understanding and complying with regulations, and conducting other...

    Provided By Research In Motion

  • White Papers // Jan 2007

    SADS - Self Annihilating Data Storage system in Cloud Storage Service

    Personal data stored in the cloud may contain account numbers, passwords, notes, and other important information that could be used and misused by a miscreant, a competitor, or a court of law. These data are cached, copied, and archived by Cloud Service Providers (CSPs), often without users' authorization and control....

    Provided By Research In Motion

  • White Papers // Jan 2007

    Self Annihilating Data Storage and Location Based nonterminating Video Streaming Services for Mobile Users in CLOUD Environment

    Cloud computing has become a popular buzzword and it has been widely used to refer to different technologies, services, and concepts. With the use of cloud computing, here the authors are trying to give the location based efficient video information to the mobile users. Location Based Service (LBS) is an...

    Provided By Research In Motion

  • White Papers // Jan 2007

    Business Process Modeling and Its Perspectives

    In this paper the authors devoted to the analysis of business process modeling and its perspective in the organization. Over the years, the scope of business processes has been increased and it has been become infect interesting field for further research. Business Process Modeling (BPM) is an emerging discipline for...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CMiS: A Cloud Computing Based Management Information System

    Cloud computing is gaining its importance in day to day business scenario because of its scalability, robustness and cost saving capabilities. Management information system is one of the major components of any business organization. It helps to adopt future operating strategy, to determine day to day operating procedure, analysis of...

    Provided By Research In Motion

  • White Papers // May 2013

    Support System- Pioneering approach for Web Data Mining

    World Wide Web is an adequate source to find various kind of information. With an explosive growth of WWW, websites are playing an important role in providing an information and knowledge to the end users. With the broad use of internet, web data mining has gradually become the focus of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Printer: A Survey

    Cloud printing services enable any application on any device to print to any cloud connected printer. The file is securely sent to the printer over the web .it does not matter printer is in the same room or on another continent. Today, people shift towards cloud based application of web...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Big Data Analytic and Mining with Machine Learning Algorithm

    Big data concern large-volume, complex, growing data sets with multiple, autonomous sources. With the fast development of networking, data storage, and the data collection capacity, big data are now rapidly expanding in all science and engineering domains, including physical, biological and biomedical sciences. This data-driven model involves demand-driven aggregation of...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Cloud Computing with Azure PaaS for Educational Institutions

    Many universities provide the provision for online admissions, filling exam form online, declaring results online. Filling exam form online requires uploading the previous semester mark sheets and verifying subject for the current semester. Lacs of students are hitting the university server at certain duration to fill online exam form, which...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Refinement of Web Search using Word Sense Disambiguation and Intent Mining

    Searching or retrieving information on the Internet using any web search engine displays documents in enormous amounts. Information retrieval is the activity of tracing and obtaining relevant information from a collection of information resources. It is a challenging task for retrieving relevant information over the Internet. Although there are search...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Instant Messaging Service on Android Smartphones and Personal Computers

    Android is an operating system for Smartphone's, tablets and now will be used for personal computers also. It includes a touch screen user interface, widgets, camera, network data monitoring and all the other features that enable a cell phone to be called a Smartphone. Basically, multi-purpose chat application allows users...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Study on Cost Estimation of Service Delivery in Cloud Computing Environment

    The term cloud computing is sometimes used to refer to a new paradigm; some authors even cited a new technology that offers IT resources and services over the Internet. Cloud computing is becoming a powerful network architecture to perform large-scale and complex computing. The economic crisis can bring with enterprise...

    Provided By Research In Motion

  • White Papers // Feb 2014

    IDS in Cloud Environment as Service Based Manner

    Every service of security provided by IDS will work as a subscription based service, so that the host can deploy some part of IDS facilities, as part of their own LAN. Intrusion detection as a part of cloud infrastructure will fulfill the need of proposed work IaaS (Infrastructure as a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Overview - Snort Intrusion Detection System in Cloud Environment

    Now-a-days cloud computing has become very popular since it reduces infrastructure cost. Hence, the level of security measures also has to be increased. Intrusions Detection Systems (IDSs) are designed to handle attacks but many Intrusion Detection System (IDS) are designed for specific attack/attacks. It is evident that no single technique...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Novel Approach for Query Expansion Using Genetic Algorithm

    In this paper the authors focused towards query expansion, which is an important technique for improving retrieval efficiency of an information retrieval system. Specifically the paper proposes a novel evolutionary approach for improving efficiency of Pseudo Relevance Feedback (PRF) based query expansion. In this method the candidate terms for query...

    Provided By Research In Motion

  • White Papers // Feb 2014

    An Overview of Distributed Databases

    A database is a collection of data describing the activities of one or more related organizations with a specific well defined structure and purpose. A database is controlled by DataBase Management System (DBMS) by maintaining and utilizing large collections of data. A distributed system is the one in which hardware...

    Provided By Research In Motion

  • White Papers // Feb 2014

    CAGDI: A New Conceptual Model of Early and Late Requirement Engineering for Non Fading Dataware House

    Building a data warehouse is a very challenging task. Most of the data ware house project fails to meet the business requirements and business goals because of the improper requirement engineering phase. The chaos all through the development of requirements evolves due to disparity between users and developers resulting in...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Java Based Distributed File System

    There are distributed file systems that are being used in businesses and individuals but still users face various challenges and problems in using those systems. The distributed file system based on Java resolve the difficulties that were occurring in the past systems and provides various functionalities to users such as...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Clustering - A New Perspective

    Although there has been a demarcation between development and evolution (maintenance) of software, this is increasingly irrelevant as fewer and very fewer systems are completely new. Additionally, after the system had gone through many changes during the maintenance, remembering the system's structure is less possible one. Software architecture is a...

    Provided By Research In Motion

  • White Papers // Feb 2014

    A Survey on Association Rule Mining in Market Basket Analysis

    Data mining refers to extracting knowledge from large amount of data. Market basket analysis is a data mining technique to discover associations between datasets. Association rule mining identifies relationship between a large set of data items. When large quantity of data is constantly obtained and stored in databases, several industries...

    Provided By Research In Motion

  • White Papers // Feb 2014

    Finding Execution Faults in Dynamic Web Application

    Pin down is a framework for root cause analysis on dynamic web application. Fault localization in dynamic web application is the problem of decisive where in the source code modifies has to be completed in order to fix the perceived failures. The cause of the failure is called as execution...

    Provided By Research In Motion

  • White Papers // May 2009

    Prorecting the BlackBerry Device Platform Against Malware

    This document describes the third-party Java application control features of the BlackBerry? Enterprise Solution and provides an overview of how you might use those features and place the BlackBerry Enterprise Solution within your corporate network architecture to contain the threat of malware on your BlackBerry? devices and your corporate network.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Devices with Bluetooth - Security Overview

    This whitepaper from looks at how the BlackBerry? Enterprise Solution is designed to encrypt data in transit at all points between the BlackBerry device and the BlackBerry? Enterprise Server to protect your organization from data loss or alteration.

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Server IT Policy

    "This free whitepaper from Research in Motion outlines how IT Managers can assign IT policies to BlackBerry? devices to satisfy organization's security policy requirements and to reflect the needs of users who use the BlackBerry devices"

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution - Security Technical Overview

    This free to access whitepaper describes the security features of the BlackBerry? Enterprise Solution and provides an overview of the BlackBerry security architecture

    Provided By Research In Motion

  • White Papers // May 2009

    BlackBerry Enterprise Solution and RSA SecurID

    BlackBerry? devices are becoming ubiquitous throughout the enterprise, as organizations improve employee connectivity and communications. The BlackBerry? Enterprise Solution?designed and manufactured by Research In Motion (RIM)?is a flexible, Information Technology (IT)-friendly solution that provides mobile users with secure wireless access to their enterprise email and critical business applications

    Provided By Research In Motion

  • White Papers // May 2009

    Placing the BlackBerry Enterprise Solution in a Segmented Network

    A segmented network is designed to isolate potential attacks within the organization's LAN and contain them on one computer. The BlackBerry? Enterprise Server supports installation in a segmented network, and permits you to run BlackBerry Enterprise Server components in different network segments.

    Provided By Research In Motion

  • White Papers // Apr 2012

    CIO survey: The effect of consumer-led IT

    With the arrival of the smartphone and tablet, the IT industry has seen one of the most profound revolutions since the invention of the silicon chip and the launch of the web. As a Fortune 1000 CIO says, "IT consumerisation is having a dramatic effect on everything we do". From...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Three keys to combining BYOD and security

    Employee devices, from smartphones to tablets, are ubiquitous in the workplace now. They help workers to be more mobile and empower them to make decisions away from their desks. But mobility can be risky if not handled properly, and it's no longer a simple answer of cracking down on bring-your-own-device...

    Provided By Research In Motion

  • White Papers // Apr 2012

    BYOD costs: Balancing savings and risk

    Smartphones and tablets have changed the face of corporate IT. With bring-your-own-device (BYOD), users demand access to the same technologies they have at home. Having to certify, provide and manage consumer-grade devices can add complexity and costs, as well as increasing the risk of data loss and leakage. That's on...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Adapting BYOD security strategies to protect data

    The consumerisation of IT in the workplace goes way beyond bring-your-own-device usage: there is also the issue of social networking sites and services to address. IT security managers face a major headache in engineering a protective security umbrella to keep sensitive data safe. This Research In Motion (RIM) white paper...

    Provided By Research In Motion

  • White Papers // Apr 2012

    How to benefit from mixing business and personal devices

    Working from home used to mean you had to lug home a briefcase full of paper or the heavy company laptop. Now, chances are employees have a laptop or desktop computer of their own at home that is at least as powerful as the one on their desk at work,...

    Provided By Research In Motion

  • White Papers // Apr 2012

    Choosing a consumer-friendly IT strategy

    There are two trends causing IT managers to rethink their strategies: the growing popularity of consumer technology among business users, and the shift of business applications and data to the cloud. These technologies give IT departments both real and perceived difficulties when it comes to integrating them into the business....

    Provided By Research In Motion

  • Webcasts // Jan 2009

    Dealing With Intellectual Property and How to Use This to Enhance the Value of Your Business

    The presenter of this webcast shows how to deal with intellectual property and how to use this to enhance the value of your business.

    Provided By Research In Motion

  • White Papers // Oct 2008

    BlackBerry Push APIs: Accessing the Power of BlackBerry Push Technology

    One of the cornerstones of the BlackBerry solution has been the ability to proactively deliver, or "Push", data to BlackBerry devices. BlackBerry Push Technology has been used to push emails to users and to synchronize calendar information. However, although BlackBerry Push Technology has been available to developers creating enterprise-based solutions...

    Provided By Research In Motion

  • White Papers // May 2009

    Realizing Rapid ROI Through Mobility

    IT teams ratcheting up mobility deployments end up pleasing not only business users, but also the CFO. Here's one reason: They can show a rapid Return On Investment (ROI) in hard dollars with a simple shift in use policy. Savings can prove substantial when IT standardizes on one device type...

    Provided By Research In Motion

  • White Papers // Mar 2009

    BlackBerry Enterprise Solution

    This paper describes the security features that the BlackBerry Enterprise Server version 5.0, BlackBerry Desktop Software version 5.0, and BlackBerry Device Software version 5.0 support, unless otherwise stated. To determine if an earlier software version supports a security feature, see the documentation for earlier versions of the BlackBerry Enterprise Server,...

    Provided By Research In Motion

  • White Papers // Jul 2009

    BlackBerry Internet Service

    The BlackBerry Internet Service uses the security of the wireless network that it connects to. Email messages that are sent between the BlackBerry Internet Service and BlackBerry device are not encrypted. However, email messages that are sent between the BlackBerry Internet Service and messaging server can be encrypted using SSL...

    Provided By Research In Motion

  • White Papers // Aug 2009

    BlackBerry Smart Card Reader

    The BlackBerry Smart Card Reader is an accessory that, when used in proximity to certain Bluetooth enabled BlackBerry devices and computers, permits users to authenticate with their smart cards and log in to Bluetooth enabled BlackBerry devices and computers. The BlackBerry Smart Card Reader is designed to perform communicate with...

    Provided By Research In Motion

  • White Papers // Dec 2008

    Enforcing Encryption of Internal and External File Systems on BlackBerry Devices

    The BlackBerry Enterprise Solution encrypts data traffic in transit between the BlackBerry Enterprise Server and the BlackBerry devices automatically. By default, the BlackBerry Enterprise Solution generates the master encryption key and message key that the BlackBerry Enterprise Server and BlackBerry devices use to encrypt and decrypt all data traffic between...

    Provided By Research In Motion

  • White Papers // Aug 2008

    The Promise of Mobile Unified Communications

    Mobile unified communications allows organizations to provide employees with the ability to collaborate and communicate efficiently, as well as access information on-demand. An exclusive Computerworld online survey offers insight into how companies can develop cost-effective strategies for implementing or improving mobile applications and foster an efficient workplace. Much of the...

    Provided By Research In Motion