631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Suffolk Computer Consultants has been serving the Speonk area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Privacy Cloud Technology Cybersecurity Managed IT Services Communications Backup Network Security Malware Hardware Hackers Business Management Ransomware Business Outsourced IT Microsoft Alert Smartphones Email Small Business Tech Term Android VoIP Wi-Fi Productivity Save Money Passwords Software Router Hosted Solutions Twitter Smartphone Employer-Employee Relationship Google Social Media Applications Internet Computer Communication Microsoft Office IT Services Data Recovery VoIP Business Intelligence Data Breach Settings Mobile Devices Password Data Apps Government Data Backup Data Management Bandwidth Windows 10 Phishing Innovation Miscellaneous Cloud Computing Patch Management Vulnerability Collaboration IT Support Office Excel Network Paperless Office Hacking Company Culture IT Support Office 365 Website Analytics Law Enforcement Remote Monitoring Wireless Charging Data Protection Saving Money Cybercrime WiFi Blockchain Gmail Windows Spam Mobile Device Management Computers Battery Virtual Assistant App Networking Remote Computing Internet of Things Tip of the week VPN Virus Productivity Word Gadgets Cost Management Browser Politics Tech Terms BDR How To Automation User Tips Holiday Managed IT Service Physical Security Business Continuity Scam Virtualization Wireless Efficiency Managed IT Services Artificial Intelligence Retail Chrome Workers Cortana Access Control Apple Marketing Copy Threat Edge Telecommute Conferencing Multi-Factor Security Movies BYOD Amazon Phone System Managed IT Mobile Security Online Shopping Licensing iPhone Paste Automobile Printing Office Tips Laptop Work/Life Balance Data loss Content Filtering Unified Communications Workplace Tips Operating System Travel Paper Staff RAM Gadget Environment WannaCry Hard Drives Lead Generation Live Streaming File Sharing Facebook Telephone Systems Ink Google Maps Websites User Tip Disaster Recovery Dark Web Microsoft Teams Printer Server Cleaning Shortcut e-waste HIPAA Two-factor Authentication WhatsApp User Security Remote Control PowerPoint IT budget Managing Stress Printers CrashOverride disposal Hard Drive Tech Support Safety Business Technology Spam Blocking Sports IT Management Spotify Dongle Telecommuting Smart Technology Education G Suite Value Processors Hiring/Firing News Sales Email Management Connectivity Botnet Millennials Big Data Bring Your Own Device Users Spyware Telephone System Tablet Streaming Media Network Attached Storage Technology Tips Hybrid Cloud Staffing Database HP Knowledge Downloads Information Technology Server Management Backup and Disaster Recovery Telephony Files Entertainment Cables Remote Support Recovery Tactics Document Management Server Comparison Maintenance Google Drive Trends Biometrics SSD Voice over IP Voice over Internet Protocol Hosted Solution Internet Explorer Digital Specifications Antivirus A.I. Access Machine Learning Inventory eCommerce Information Hacker Employer Employee Relationship Customer Relationship Management SaaS IP Address Scalability Synergy IaaS Encryption Customer Service Mobile Office Credit Cards Mobile Device Domains Emoji HaaS Plug-In Vendor Management Public Speaking Unified Threat Management Proactive IT Scheduling Lithium-ion battery Current Events Samsung Augmented Reality Computer Care Remote Monitoring and Management Instagram Net Neutrality The Internet of Things Gaming Console Budget Competition Freedom of Information Fun Video Games Worker Yahoo Upgrade Television Printer Autocorrect Search Windows 10 Avoiding Downtime Presentation Dark Data Leadership 5G Wireless Technology DDoS Money Managed Service Provider IBM Emergency Personal Information

Newsletter Sign Up