Hi, welcome to my home page. My name is Ali Razmkhah Shendi; i was born on December 1985 in Iran.
I received my B.Sc. and M.Sc. degrees in computer science and computer networks (IT) from Amirkabir University of Technology and Sahand University of Technology, Iran, in 2007 and 2010 respectively. Now i am working on software designing & implementing, distributed systems, real time processing systems and industrial machine controller systems.
Additionally, my research field is computer networks; my last academically research field is optical networks, dynamic bandwidth allocation regarding quality of service (QOS).

IT news

1)Blame the iPad for the crash in tablet sales

Blame the iPad for the crash in tablet sales

Best Buy CEO Hubert Joly told the tech industry blog Re/code this week that tablet sales have "crashed"

2)Mobile management: Making sense of your options

Smartphones, tablets, social networks, and cloud services are all popular, incredibly useful — and a security risk. These days, the security focus is on mobile devices, as they tend to be used a lot to work with corporate information, but the variety of platforms, the fact many are employee-owned, and uneven security capabilities mean it’s a real challenge — sometimes an impossible challenge — to manage them in the same way as the corporate PC.

3)Mobile security: A mother lode of new tools

Long, complex passwords that must be input on tiny screens, often while on the move: Such hassles make password-based security unworkable in a mobile world. But change is coming, thanks to an industrywide backlash that gave rise to a gold rush of new technologies.

Eventually mobile security may no longer hinge on whether a password is long enough, but on how well the device knows the user.

4)BYOD morphs from lockdown to true mobility

Many companies that have had BYOD policies for a while have matured their thinking. They've grown from looking at employees' personal devices as something to lock down to allowing them in a limited fashion to fully embracing them.

They have moved from allowing only company-provided phones to supporting "COPE" devices (which are corporate-owned, personally enabled tools) to sanctioning true bring-your-own device setups, says Chris Marsh, an enterprise mobility analyst at Yankee Group.

5)IoT inspires innovations in energy, wireless

The expected boom in demand for small, often isolated devices in the Internet of Things is driving developers to craft new types of components.

Two developments announced this week should help IoT come together. On Wednesday at a trade show in Tokyo, researchers showed off a prototype of a tiny power supply that harvests energy from vibrations in the air so remote sensors and other parts don't need batteries. And on Thursday, U.K. chip company Imagination Technologies announced a design for radio chips that can be used in small, power-sipping devices.

6)The mobile health apps gold rush may already be over


The new gold rush is mobile health apps, both to track medical conditions and fitness.

7)Business leaders know: Let in the smartphones, tablets, laptops

Kraft Foods, a forward-thinking giant when it comes to consumer taste, was anything but when it came to IT. Simply put, the company was mired in the old-school culture of rigid centralized information technology. Not anymore.

Kraft was one of the first major enterprises to recognize the value that consumer devices could produce for business — and it recognized that value early. Kraft began deploying the iPhone back in 2008, well before smartphones had become must-carry devices.

8)What you need to know about using Bluetooth beacons

What you need to know about using Bluetooth beacons

Courtesy Estimote

9)Ping Identity wants to replace sign-ons with smartphones

Ping Identity wants to replace sign-ons with smartphones

Credit: iStockphoto

10)Boost your security training with gamification -- really!

Getting employees to take security seriously when security is not their job is an old challenge that now has a new answer: Gamification.

That's right; game-like elements can be used to enhance security awareness and modify users' behaviors. The results are tightly connected to the real world.