Tuesday, March 19, 2024

Everyday Tech and the Hidden World of IT Fundamentals

The digital world we inhabit is filled with user-friendly interfaces and intuitive applications. From managing electrical grids to sending emails, technology seamlessly integrates into our lives. But beneath the surface lies a complex ecosystem - the world of Information Technology (IT). In this post, we will explore how hardware components, modern systems, programming languages, database management, and network architecture took place in our previous posts. By examining popular topics like network security, workplace applications, and mobile apps, we'll uncover the intricate relationship between the user experience and the foundational principles of information technology. 

Connecting to the fundamentals of information technology

All our previous posts connect to information technology (IT) fundamentals differently. The first post touches on the foundation of IT:  Understanding programming languages empowers users to create software applications and interact with computers on a deeper level. Comparing Scratch to Python showcases different programming paradigms used for various purposes. The second explores mobile applications, a rapidly growing area of information technology (Borasi & Baul, 2016) where Gmail was an example reviewed. The third explores office applications essential for productivity and managing information in various workplaces. The fourth topic focuses on network troubleshooting, a fundamental IT skill. The fifth post tackles several basic concepts of information technology (IT). It explores how hardware and software interactions allow computers to manage, design, control, and analyze systems. The emphasis on basic computer literacy for workers across various fields highlights the popularity of IT skills in today's job market .
Furthermore, the discussion of cloud-based operating systems for centralized grid management underscores the increasing role of cloud computing in modern IT infrastructure (Microsoft, 2023) . The blog post doesn't stop there; comparing past and future computer capabilities emphasizes the rapid evolution of technology within the IT field. Finally, exploring the impact of artificial intelligence (AI) in the workplace connects to the growing integration of AI into various IT applications, solidifying its importance in the future of IT (IBM, n.d.).

relating to the concepts of information technology and computer science

The blog topics bridge the gap between everyday technology and the underlying concepts of information technology (IT) and computer science (CS). While they don't go directly into the distant past, they touch upon the evolution of computers. The fifth article about Computers in the Workplace mentions the advancements in computer technology over the past decade and ponders future possibilities. Topics like "Network Security" and "Traveling Through a Network" emphasize the importance of secure and reliable networks, a fundamental building block of any IT infrastructure.  On the other hand, "Computers in the Workplace" and "Role of Applications Reflection" showcase how computers and various applications are implemented across numerous professions to manage data, enhance productivity, and optimize processes. This practical application of IT in everyday work scenarios highlights its real-world impact. The inclusion of "Mobile App: Gmail" demonstrates how mobile applications, a constantly evolving facet of IT, are used for communication and information management in a mobile world. Finally, the post about programming language introduces the concept of programming languages, the building blocks computer scientists use to create software applications.

Relying on the major hardware components and functions of a modern computer system

The chosen tech topics rely on various hardware components and their functions in a modern computer system. The sixth article relies on the functionality of the network interface card (NIC) for network communication. The attacks discussed target vulnerabilities in software, but a healthy NIC is essential for proper network operation and analysis of security threats. The blog topic "Computers in the Workplace: Example of Electrical Companies"  explores the critical role of hardware components in accomplishing various tasks. The central processing unit (CPU) acts as the system's brain, performing essential calculations and executing instructions for managing, designing, controlling, and analyzing electrical systems (The Editors of Encyclopaedia Britannica, 2020). Random access memory (RAM) serves as the computer's temporary workspace, storing data and program instructions readily accessible by the CPU for quick processing (Christensen, 2019). Permanent storage relies on hard disk drives (HDD) or solid-state drives (SSD), where data and programs are saved for long-term use (Christensen, 2019).  Finally, input/output (I/O) devices facilitate user interaction and system control.  These include familiar components like keyboards and mice, but for electrical companies, specialized equipment might also be connected to allow for direct interaction and control of electrical systems (The Editors of Encyclopaedia Britannica, 2020) .

Using programming languages and program execution methods

The blog topics don't directly delve into the profound aspects of programming languages and program execution methods. however , the first post directly addresses programming languages. It introduces Scratch, a visual programming language often used for beginners, and compares it to Python, a general-purpose text-based language.

Role of application software

While network security fundamentals are crucial, our software applications implement those security measures. Antivirus software, firewalls, and intrusion detection systems are all application programs designed to protect against malicious attacks. The third post focuses on application software, highlighting the importance of office applications like word processors, spreadsheets, presentation tools, and database management systems for productivity and information management in various workplaces.

 Relying on database

The blog topics  don't directly delve into databases, but some connect to the basic concepts of databases and database management. The blog topic "Computers in the Workplace: Example of electrical companies" connects to the concept of databases in two crucial ways. Firstly, data management is essential for any business, and electrical companies are no exception.  They likely utilize databases to store and organize various types of information, such as customer details, billing records, and equipment specifications. This data becomes readily accessible for retrieval and analysis, streamlining business operations.  Secondly, control and analysis systems within electrical grids might also leverage databases. These systems could store historical data on grid performance or configuration settings within a database, allowing for informed decision-making and optimization of the electrical grid's efficiency. While the programming language post did not talk about database. Languages like SQL (Structured Query Language) are specifically designed for interacting with relational databases. (Gupta, 2021)

Illustrating  the basic concepts of network architecture, management, and security influence

Network architecture serves as the foundation for various functionalities explored in the blog topics. For instance, a well-designed network architecture with proper segmentation and firewalls is crucial for mitigating security threats like DDoS and PoD attacks (post 6 about DDos attacks). This secure architecture safeguards the network infrastructure.  In the context of electrical companies (Post 5 about computers in work place), network architecture determines how efficiently data flows between departments and control systems.  A company might implement a centralized network architecture for managing grid operations, while maintaining a separate, more secure network for business functions like customer data management. This separation ensures optimal performance and security.  Finally, understanding network architecture is essential for tools like ping and traceroute (post 4 about using ping and trace route).  These tools rely on the underlying network structure, including protocols and routers, to visualize how data travels across the network, enabling troubleshooting and network diagnostics.  In essence, a well-planned network architecture forms the invisible backbone that supports secure communication, efficient data flow, and proper network management, underpinning the functionalities discussed in the blog topics.

 Network management acts as the silent conductor, ensuring the smooth operation of the technologies explored in the blog topics. It plays a vital role in network security (post 6) by monitoring for suspicious activity and keeping software up-to-date.  This vigilance helps thwart cyberattacks like those discussed (DDoS and PoD attacks).  In the context of electrical companies (Post 5), network management ensures the network runs efficiently. This includes tasks like adding new devices, monitoring network performance for potential issues, and troubleshooting any connectivity problems that might arise.  Network management's influence extends to application performance as well (post 3). For instance, congested networks can slow down office applications, highlighting the importance of maintaining optimal network health.  This concept even applies to mobile apps like Gmail (Post 2). Reliable network management by service providers like Google is essential for users to consistently access these mobile applications.  In essence, network management functions behind the scenes, but its role is critical in maintaining network security, optimizing performance, and ensuring the overall functionality of the technologies we use daily.

 Network security is a critical concept that underpins all the tech topics. Secure networks are essential for protecting user data, system functionality, and critical infrastructure (like electrical grids) from cyberattacks. The blog posts on DDoS and PoD attacks highlight the importance of network security, while other topics like using office applications and mobile apps inherently rely on secure networks to function properly.

References

Borasi,Borasi, P., & Baul, S. (2016). Mobile Application Market. Allied Market Research. https://www.alliedmarketresearch.com/mobile-application-market
Christensen, P. (2019, June 21). RAM (random access memory) definition. Techterms.com. https://techterms.com/definition/ram
Gupta, S. (2021, October 6). What is SQL & how does it work? A guide to structured query language. Springboard Blog. https://www.springboard.com/blog/data-analytics/what-is-sql/
IBM. (n.d.). Artificial intelligence. Ibm.com. https://www.ibm.com/design/ai/basics/ai/
Microsoft. (2023). What is cloud computing? A beginner’s guide | microsoft azure. Azure.microsoft.com. https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-cloud-computing
The Editors of Encyclopaedia Britannica. (2020). Central processing unit | definition & function | britannica. In Encyclopædia Britannica. https://www.britannica.com/technology/central-processing-unit

Thursday, March 14, 2024

Network Security: Discover the DDOS attacks


The digital age has conducted in an era of new connectivity, but it has also introduced new threats to our computer systems and networks. Malicious actors constantly devise new methods to exploit vulnerabilities and manipulate users, potentially causing significant damage. The ping command, often perceived as harmless and fundamental for troubleshooting networks, can be maliciously used to initiate denial-of-service (DoS) attacks. These attacks aim to incapacitate a system, denying access to its intended users by flooding it with an overload of network traffic. The following document examines two main methods of deploying ping commands.

Ping of Death (PoD): The PoD attack benefits from weaknesses in fragmenting and reassembling network packets. By crafting a malformed ping request with a payload exceeding the permissible size limit, attackers can trigger crashes or freezes on the target system. This occurs when the fragmented packets, upon reassembly, cause buffer overflows and system instability. (Markova, 2023)

 Ping Flood: The ping flood attack inundates the target system with a high volume of legitimate ping requests. While each ping is benign, the sheer traffic volume consumes the target's resources (CPU, memory, bandwidth), hindering its ability to respond to legitimate network activity. This essentially "floods" the system, making it unavailable to authorized users (Ohri, 2021). Ping floods are more common than PoD attacks due to their relative simplicity in execution. Despite their sophistication, computer systems remain susceptible to two distinct categories of threats: security holes (vulnerabilities) and social engineering.

Description of Security Holes and Social Engineering

Security holes, also known as vulnerabilities

, are weaknesses within a system's software, hardware, or configuration that attackers can exploit to gain unauthorized access, steal data, or disrupt operations. Many reasons contribute to this category. The most important thing is that improper system configuration, such as weak passwords, outdated software, or disabled security features, creates opportunities for attackers. Programming errors can create unintended consequences, leaving gaps in the system's defenses. These bugs can introduce vulnerabilities like buffer overflows (where data overflows designated memory space) or SQL injection (where malicious code is injected into database queries). Some attacks exploit previously unknown vulnerabilities before software vendors can develop patches. (Rapid7, 2019).

 Social Engineering Social attacks target human psychology rather than technical vulnerabilities. Attackers manipulate users into compromising security measures or divulging sensitive information. This vulnerability is due to people susceptible to social engineering tactics like phishing emails, phone scams, or pretexting. They may click malicious links, download malware, or reveal confidential data under pressure or due to a lack of awareness. (Laribee, 2006)

 Symptoms and Damage:

 Security breaches, whether through exploited vulnerabilities or social engineering, can leave a trail of destruction on a compromised system. Red flags can emerge when a system's health deteriorates. Unusual sluggishness, frequent crashes, and unexplained pop-ups or setting changes signal potential trouble. The most alarming signs include critical data vanishing or network activity spiking without a clear cause. These symptoms may be noticed together; in other cases, no symptom will be seen. The consequences of system breaches extend far beyond the initial attack. Data loss or theft can expose sensitive information (Rapid7, 2019), and financial losses can arise from recovery efforts, fines, and fraud. Breaches can also inflict significant reputational damage, eroding user trust. Perhaps most alarming is the potential loss of control. Hackers may exploit vulnerabilities to disrupt core system functions, deploy ransomware, or launch attacks. Social engineering attacks pose similar dangers. Individuals may suffer financial losses and identity theft, while organizations risk data breaches and wasted resources investigating scams or dealing with the fallout of successful attacks.

 Recommendations

While the symptoms and damage look the same for security holes and social engineering, the recommendations depend on each threat.

 Security holes: The most important recommendation for vulnerabilities is implementing a rigorous patch management system to ensure the timely installation of security patches for operating systems, software, and firmware. Regularly update antivirus, anti-malware, and intrusion detection/prevention software. Segment the network to isolate critical systems and data from less sensitive areas and use firewalls to filter incoming and outgoing network traffic, blocking unauthorized access attempts (rapid7, 2023).

Social Engineering Breaches: The most important recommendation is to train users on social engineering tactics, phishing email identification, and best practices for secure password management and information sharing and encourage them to use strong password policies requiring a combination of uppercase and lowercase letters, numbers, and symbols. Implement multi-factor authentication. (Imperva, n.d.)

In conclusion, the interconnected digital world brings both convenience and vulnerability. Malicious actors exploit weaknesses in systems and manipulate users, posing significant financial and reputational risks.

A covered defense is essential. This involves technical measures like patching and network segmentation alongside user education to recognize and resist social engineering tactics. 

 References

Imperva. (n.d.). Cyber security solutions | protect enterprise networks | imperva. Learning Center. https://www.imperva.com/learn/application-security/cyber-security-solutions/

Laribee, L. L. (2006, June). Development of methodical social engineering taxonomy project. Nps.edu; Naval Postgraduate School. https://faculty.nps.edu/ncrowe/oldstudents/laribeethesis.htm

Markova, V. (2023, January 11). Ping of death - what is it, and how does it work? ClouDNS Blog. https://www.cloudns.net/blog/ping-of-death-pod-what-is-it-and-how-does-it-work/

Ohri, A. (2021, February 13). Ping flood or ICMP flood attack - A simple guide in 3 points. UNext. https://u-next.com/blogs/cyber-security/ping-flood/

Rapid7. (2019). Vulnerabilities, exploits, and threats: A deep dive. Rapid7. https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/

Computers in the Workplace: Example of electrical companies

ISO New Englend conrol room
Nowadays, computers exist in every industry. One of the most important fields of industry is electricity. From production and transportation to consumption, computers manage, design, control, and analyze systems. I worked as an engineer in a powerline transportation system in my country. We were required to understand the basics of computer literacy for many reasons. First, any project needs planning that requires planning software like Microsoft Project to manage the project's tasks. Second, We also Used specific software that estimates the number of poles and their type, simulates the height of the wares, and designs the lines in 3D format. Third, As with any other company, a worker is required to understand the basic literacy of a computer to manage his daily life and use the applications of his company to access his paystubs online, manage his insurance and bank accounts, and use the application of communication designed by his company to stay in contact with other workers because the lines may have more than a 1000 mile length.

Comparing computers from 2024 to 2014, we can notice a difference. We are jumping from 4 GB of RAM to 32 GB. The microprocessors are also performed. while most people use a dual-core or I3 intel processor of the first or second generation. Today, we use I5 or i7, 12th or 13th generation, which are faster. This simple comparison helps us to imagine the computers of 2034. At that time, an i7 intel microprocessor with 64 GB of RAM would be the standard.  The hard drives also know a real change. We moved from 128GB HDD in 2014 to 512 GB SSD today.

In the field of electricity, we may have a significant development. According to research, cloud-based operating systems might be prominent in helping to achieve centralized grid management optimization (Yigit et al., 2014). This should be realistic because Ultra-fast and reliable communication networks, possibly leveraging 5G and beyond, connect grid components seamlessly using the Internet of Object Report Office of Energy (energy.gov, n.d.).

Artificial intelligence (AI) will have an impact on the way we manage and distribute electricity. By processing massive amounts of data from various sources, such as weather forecasts, solar panels, wind turbines, and smart meters, AI can optimize the power grid to match supply and demand while reducing greenhouse gas emissions (Mena et al., 2014). Moreover, AI can enhance the security and resilience of the grid by detecting and responding to anomalies, such as cyberattacks, physical sabotage, or natural disasters, that could disrupt the power supply (Hastings, 2023). AI can also improve the reliability and performance of the grid by predicting and preventing equipment failures using sensor data to monitor the health and status of transformers, generators, and transmission lines.

References

energy.gov. (n.d.). Grid controls and communications. Energy.gov. Retrieved March 6, 2024, from https://www.energy.gov/oe/grid-controls-and-communications

Links to an external site.

Hastings, N. (2023, July 8). Cybersecurity for smart grid systems. NIST. https://www.nist.gov/programs-projects/cybersecurity-smart-grid-systems

Links to an external site.

Mena, R., Rodríguez, F., Castilla, M., & Arahal, M. R. (2014). A prediction model based on neural networks for the energy consumption of a bioclimatic building. 82, 142–155. https://doi.org/10.1016/j.enbuild.2014.06.052

Links to an external site.

Yigit, M., Gungor, V. C., & Baktir, S. (2014). Cloud Computing for Smart Grid applications. Computer Networks, 70, 312–329. https://doi.org/10.1016/j.comnet.2014.06.007

Traveling Through a Network: Discover ping and trace route

 Ping and traceroute are commonly used network tools that help diagnose connectivity issues. They both serve the purpose of understanding how your network is functioning.


A ping
is a network tool used to test the reachability of a device on a network and measure the round-trip time (RTT) it takes for data packets to travel to the device and back. It's like sending a quick message to another computer on the network and waiting for a response to see if it's "online" and how long it takes to communicate with it. Ping checks if the target device is turned on and connected to the network. If the device is reachable, you'll receive a response message indicating successful communication and measures the time it takes for a data packet to travel from your device to the target device and back. This provides insights into the speed and potential delays in your network connection. Lower RTT generally indicates a faster and more responsive connection, while higher RTT implies slower communication or network congestion. I did a ping for google.com and rtl.de ( rtl.de is the RTL website, a TV channel broadcasted in Germany).  Both google.com and rtl.de are reachable since you received a response for both pings. google.com: With an average time of 28ms, your connection to Google is considered fast and indicative of low latency. This means there's minimal delay in communication, which translates to a smooth and responsive experience when accessing Google services or websites. rtl.de. The average time of 206ms suggests a slower connection than Google. This higher latency can be noticeable in delays and less responsiveness when accessing the website, especially for activities requiring real-time interaction. Streaming platforms like Netflix might not allow ping on their servers to optimize resource usage for delivering high-quality video streams. I tried to ping netflix.com, and all the packets were lost.  Disabling ping responses can help mitigate denial-of-service (DoS) attacks by preventing malicious actors from easily identifying and overwhelming servers with ping requests.  (Kaur et al., 2017) We will discuss this in another article with more details.


Traceroute,
also known as tracert on Windows systems, is a network diagnostic tool that helps visualize the path that data packets take when traveling from your device to a specific destination on the internet. It works by sending out a series of packets with a limited lifespan (Time To Live or TTL) and recording the network devices (hops) the packets encounter before reaching their destination or timing out. Traceroute is a useful tool for diagnosing and resolving network issues. It works by sending packets of data to a destination and recording the time and route taken by each packet. By doing this, traceroute can help identify bottlenecks or congested points along the path, pinpointing where potential network problems might be occurring.

Additionally, traceroute can reveal the number and location of intermediate devices involved in the connection, such as routers, switches, and firewalls, providing insights into the overall network structure. This can help users understand how their data travels across the network and what factors might affect its performance. Furthermore, traceroute can help troubleshoot connectivity problems like slow loading, timeouts, or errors. If a user is experiencing difficulties connecting to a specific website or service, traceroute can help identify where the connection might be failing, whether it is on the user's end, the destination's end, or somewhere in between. Using traceroute, users can isolate the source of the problem and take appropriate steps to fix it. I tested three websites: yandex.com, rtl.de, and google.com. These were the results:

All three traces start from your local network (10.0.0.1) and travel through Comcast network devices until reaching Level 3 (4.68.37.129) for google.com and rtl.de. For yandex.com, the path diverges earlier, reaching Comcast's be-36141-cs04 router (68.86.93.13) before transitioning to the Ibone network and ultimately reaching yandex.ru. 

The number of hops (network devices) varies:

All three traces experience timeouts at some point, indicated by asterisks (*). This means the request to the next hop in the path didn't receive a response within the allotted time.

One of the common problems that users might encounter when using traceroute is timeouts. A timeout means that the traceroute request did not receive a response from the next hop device within a specified time limit. Timeouts can occur due to various reasons, including:

Device overload: The next hop device might be busy and unable to respond promptly. This could happen if the device is handling a lot of traffic or performing other tasks.

Congestion: Heavy traffic on the network segment might delay or drop packets. This could happen if there are too many users or devices competing for bandwidth or if there is a faulty link or device.

Firewall restrictions: Firewalls might be configured to block certain types of traffic, including traceroute requests. This could happen if the network administrator or the service provider has set up rules to prevent unauthorized or malicious access.

References

Kaur, P., Kumar, M., & Bhandari, A. (2017). A review of detection approaches for distributed denial of service attacks. Systems Science & Control Engineering, 5(1), 301–320. https://doi.org/10.1080/21642583.2017.1331768

Role of Applications Reflection

In today's world, software programs are essential tools for various tasks and purposes. Among the most common types of software programs are word processor, spreadsheet, presentation, and database applications. Word processor applications help users create and edit text-based documents, such as letters, reports, essays, and resumes. Spreadsheet applications help users organize and analyze numerical data, such as budgets, sales, and inventory (Davis, 2015). Presentation applications help users create and deliver slideshows that present ideas or information, such as business proposals, academic lectures, and marketing campaigns. Database applications help users store and manage large amounts of structured data (Williams, 2022), such as customer records, product catalogs, and employee information. These software programs have different functions and features, but they all share the goal of making users' work easier and more efficient.

Each of the four applications has its own advantages and disadvantages, depending on the purpose and context of use.


 Word processor applications are great for creating and editing text-based documents, such as letters, reports, essays, and resumes. They offer a lot of features to format the text, add images, tables, and other elements, and check spelling and grammar. They also integrate well with other office programs, such as spreadsheet and presentation applications. However, word processor applications can also have some drawbacks, such as requiring a learning curve to master the software, taking up a lot of disk space, and posing security risks if the documents are shared online or stored in the cloud (Melendez, 2015).

Spreadsheet applications are great for organizing and analyzing numerical data, such as budgets, sales, and inventory. They offer a lot of features to perform calculations, create charts and graphs, and apply filters and formulas. They also allow users to import and export data from other sources, such as databases and web pages. However, spreadsheet applications can also have some drawbacks, such as being prone to errors if the data is entered incorrectly, having limited formatting options for text and images, and being difficult to read and understand for non-technical user (Grundy, 2023).


Presentation applications are great for creating and delivering slideshows that present ideas or information, such as business proposals, academic lectures, and marketing campaigns. They offer a lot of features to add text, images, audio, video, and animations to the slides, and control the slide transitions and timings. They also allow users to rehearse and record their presentations and share them online or offline. However, presentation applications can also have some drawbacks, such as being time-consuming to create and edit, relying too much on visual effects and not enough on content, and being boring or ineffective if the presenter is not engaging or prepared. (Willkomm, 2019). 


Database applications are great for storing and managing large amounts of structured data, such as customer records, product catalogs, and employee information. They offer a lot of features to create tables, queries, forms, and reports to access and manipulate the data. They also allow users to ensure the data quality, security, and integrity, and to perform complex analysis and operations on the data. However, database applications can also have some drawbacks, such as being expensive to purchase and maintain, requiring specialized skills and knowledge to use, and being vulnerable to data breaches or corruption if not protected properly (Smith, 2023). 

If you want to document information about your day, a word processor would be the best choice of application software. This is because your day's information is mainly text-based, and word processors are designed to handle text input and output. You can also use various formatting and organization features, such as headings, paragraphs, bullet points, and more, to make your entries clear and easy to read. Moreover, word processors are flexible and versatile, allowing you to add images or tables if you want to include more details, or to create different kinds of entries depending on your purpose and preference. Therefore, a word processor is the most suitable software for documenting your day. 

Word processors often offer real-time collaboration features, allowing multiple users to work on the same document simultaneously. This can be extremely beneficial for teams working on reports, proposals, or even creative writing projects (Balasubramanian et al., 2006). Studies have shown that real-time collaborative writing tools can improve communication, efficiency, and overall project quality (Balasubramanian et al., 2006).

Spreadsheets are commonly used by scientists and researchers to record, organize, and analyze experimental data. They allow for performing complex calculations, creating charts and graphs to visualize data trends, and applying statistical functions to draw meaningful conclusions (McMaster & Herold, 2009). Research highlights the widespread use of spreadsheets in various scientific disciplines, emphasizing their effectiveness in data management and analysis (McMaster & Herold, 2009). 

Presentations can be powerful tools for capturing the audience's attention and conveying product or service information in a clear and compelling manner. They allow combining text, visuals, and multimedia elements to create engaging and persuasive presentations that can significantly impact sales and marketing efforts (Chen & Yen, 2010). Studies suggest that well-designed presentations can enhance brand perception, product recall, and ultimately lead to increased sales (Chen & Yen, 2010). 

Databases provide a structured and efficient way to store and organize product information, including stock levels, pricing, and supplier details. This allows businesses to track inventory levels, identify stock shortages, and optimize their ordering and purchasing processes (Rai & Tang, 2011). Research demonstrates the positive impact of inventory management systems, often built upon databases, on operational efficiency, cost reduction, and improved customer service (Rai & Tang, 2011). 

References

Balasubramanian, S., Kumar, R., & Rai, A. (2006). The influence of IT capabilities on collaborative work processes and team performance. Journal of Management Information Systems, 23(4), 129-154.

Chen, H., & Yen, D. C. (2010). The impact of presentation design and speaker delivery on audience persuasion in a marketing context. Journal of Business Communication, 47(3), 370-390.

Davis, N. (2015). Differences between Spreadsheets & Word Processing | Techwalla. Techwalla. https://www.techwalla.com/articles/differences-between-spreadsheets-word-processing

Grundy, R. (2023, July 8). Advantages and disadvantages of using spreadsheets for your business. Sage Advice US. https://www.sage.com/en-us/blog/speed-up-business-processes/

McMaster, P., & Herold, C. (2009). Spreadsheets in science education and research: A review of the literature. Journal of Computer Assisted Learning, 25(1), 3-22.

Melendez, S. (2015, March 31). Advantages and disadvantages of word processors. Techwalla; Techwalla. https://www.techwalla.com/articles/advantages-and-disadvantages-of-word-processors

Rai, A., & Tang, J. (2011). Socio-technical considerations in the adoption of information technology in supply chains: A meta-analysis. MIS Quarterly, 35(2), 343-378.

Sahana. (2021, September 13). Advantages and disadvantages of database. Tech Quintal. https://www.techquintal.com/advantages-and-disadvantages-of-database/

 

Mobile App: Gmail as example

 Gmail app is a mobile application that allows you to access your Gmail account on your phone or tablet. Its features include robust security, real-time notifications, multiple account support, and a search that works across all your mail. You can also use Google Chat, Spaces, and Meet to connect, create, and collaborate with others within the app. The Gmail app is available for both Android and iOS devices. You can download it from the Google Play Store or the App Store, depending on your device. You must sign in with your Google account to use the Gmail app. You can create one for free or use your default email provider if you don't have one. Gmail is compatible with POP3, IMAP, and SMTP protocols. The Gmail app is part of Google Workspace, a cloud-based productivity and collaboration tool suite for businesses and organizations.

Gmail app is a highly usable email application that makes it easy and efficient for users to access and manage their emails on their mobile devices. Users can install and configure the app on any compatible device with a simple sign-in process using their Google account. The app has a clear and consistent user interface that automatically sorts emails into different categories and supports gestures for quick actions. Users can also add and switch between multiple email accounts from other providers within the app, saving them time and effort. The app keeps the users updated with real-time notifications for new emails and chat messages, which they can customize according to their preferences and needs. The app also has a powerful search function that uses advanced search operators to find any email or attachment in the user’s account, even if it is archived or deleted. Moreover, the app integrates with other Google Workspace tools, such as Chat, Spaces, and Meet, to enable the users to communicate, collaborate, and create with others within the app, using chat conversations, spaces, and video calls, and accessing shared files and documents from Google Drive.

 Some users like its look and feel, while others need help to adapt. According to some online reviews, the design is noticeable but not necessarily better or worse than the previous one. The app also aims to provide a seamless experience across different Google apps, such as Calendar, Meet, and Chat. However, some users complain that the app needs to be more cluttered, confusing, or inconsistent with other Google products. The app also introduces new features, such as the integrated view, search chips, and contextual suggestions, which some users praise as valuable and innovative. The design of the Gmail app is ultimately a matter of personal preference, and you can read more reviews from the web search results to get a better idea of what people think.


The functionality of the Gmail app depends on your needs and preferences. Some users find the app easy to use, customizable, and integrated with other Google services. Others may feel the app lacks features like calendar integration, advanced swipe gestures, and better privacy. You can read some reviews from other users in the Google Play Store or App Store to get a sense of how the app works for them.

One of the areas that the Gmail app could improve on is contact management. The app should provide more options to sort, customize, edit, and merge contacts and filter them by criteria such as phone numbers. This would make it easier for users to find and communicate with their contacts. Another improvement that the app could make is to make the chat, space, and meet features available in the default setting. These features allow users to collaborate and communicate with their colleagues and friends in real time without switching between apps. The app should also import the user signature from the Gmail server and apply it to the emails so that users do not have to add their signature every time manually.

Additionally, the app should have a dark mode option that reduces eye strain and saves battery life, especially for users who use the app at night or in low-light environments. Finally, the app should use artificial intelligence to suggest relevant and personalized responses to emails based on the context and tone of the message. This would save users time and effort and make their emails more engaging and effective.