Chapter 1Your BlackBerry Is Not an Edible FruitIn This Chapter A berry, berry long time ago Checking out your BlackBerry behind the scenes Seeing w
are trying to protect it. Included among those attacking the systemare those who are trying to steal corporate data for their advan-tage, as well as i
chatting or view some pictures online and download them? Youcan do all these things (and more) by using your BlackBerry.BlackBerry Pearl is also a ful
How It Works: The SchematicApproachFor those of you who always ask, “How do they do that?” you don’thave to go far; this little section is just for yo
Figure 1-1: Your e-mail travels to your BlackBerry via service providers.Connecting to your personal computerNowadays, a personal computer is a househ
to, say, London or Beijing. All you need to worry about is turningon your Pearl (and maybe the extra roaming charges). Becauseyour BlackBerry Pearl is
Oh, the Things You Can Do!Unlike the traditional BlackBerry, your Pearl is a work of art when itcomes to smart phones. But besides its looks, the alwa
With the growing popularity of the device, software developersoutside RIM are taking advantage of this growing market — whichmeans literally hundreds
conference calls with you as the moderator, your Pearl isn’t likeother cellphones out there. To learn more about your Pearl Phone,see Chapter 10.Look,
Memory managementWhen you first receive your BlackBerry Pearl, the device definitelyhas ample free memory. However, that memory — which is usedfor app
Comments to this Manuals