631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Tech Term Communications Backup Productivity Smartphones Internet Microsoft Communication Hackers Efficiency Browser Business Hardware Passwords Outsourced IT Software Hosted Solutions User Tips Ransomware Google VoIP Business Management Wi-Fi Android Email Small Business Save Money Data Backup Social Media Data Recovery Alert Managed IT Services Microsoft Office Twitter Users Innovation Smartphone Miscellaneous Saving Money Windows 10 Internet of Things Cloud Computing Employer-Employee Relationship Business Intelligence Network Applications Computer Data Collaboration Mobile Device Bandwidth Router Password Marketing Blockchain Gadgets Data Breach Access Control Government IT Services Networking Information Excel Data Management Office Wireless Mobile Devices Patch Management Settings Phishing Automation Vulnerability Virtualization Analytics BDR Workplace Tips VoIP IT Support Apps Productivity Chrome Battery Tip of the week Remote Computing Business Continuity Virus Cortana App Computers Word Retail Hacking Website Office 365 Artificial Intelligence Paperless Office How To Workers IT Support VPN Cost Management Wireless Charging Spam BYOD Physical Security Managed IT Service Data Protection Remote Monitoring Mobile Device Management Law Enforcement Gmail Holiday Company Culture WiFi Cybercrime Politics Managed Service Tech Terms Connectivity Scam Dark Web Windows Virtual Assistant Compliance Technology Tips Hybrid Cloud Plug-In Hosted Solution Gadget Paper Information Technology RAM Cables HP Database Error Specifications Staff Printer Server Wireless Internet eCommerce WannaCry Environment Spam Blocking Business Technology Server Management Downloads Spotify Big Data Backup and Disaster Recovery Facebook Proactive IT Copy Shortcut Apple Ink Entertainment Biometrics Troubleshooting Telecommuting Websites Microsoft Teams Recovery Voice over Internet Protocol News Document Management Tactics Disaster Recovery Touchscreen Multi-Factor Security Conferencing Cleaning Printers Licensing Online Shopping HIPAA e-waste Maintenance Reporting Email Management Sales Hiring/Firing Trends Millennials SSD Remote Monitoring and Management Paste CrashOverride iPhone IT budget PowerPoint Access Update Managing Stress Telephone System Digital Internet Explorer Microsoft Office 365 Content Filtering Work/Life Balance Travel Hard Drive disposal Antivirus Medical IT Tablet Managed IT Machine Learning A.I. Outlook Office Tips Automobile Inventory Analysis Botnet IT Management Sports Dongle G Suite Amazon Phone System Edge Threat Education Smart Technology Authentication Live Streaming Two-factor Authentication Processors Value GDPR Knowledge Telecommute Movies SaaS Profitability Files Telephony Lead Generation Mobile Security Telephone Systems File Sharing Hard Drives Bring Your Own Device Remote Support Laptop Printing Authorization User Tip Staffing WhatsApp Tech Support Spyware Storage Google Drive Comparison Server Data loss Unified Communications Eliminating Downtime Voice over IP Google Maps Operating System Remote Control User Security Safety Network Attached Storage Streaming Media Avoiding Downtime The Internet of Things Credit Cards Hacker Television Quick Tips Dark Data Budget Emoji Scheduling HaaS Emergency Samsung Customer Relationship Management Printer Regulation Competition Managed Service Provider IP Address DDoS Unified Threat Management Instagram Customer Service Money Employer Employee Relationship Upgrade Current Events Mobile Office Leadership Fun Domains Computer Care Freedom of Information Windows 10 Net Neutrality Personal Information Public Speaking Gaming Console Yahoo Encryption Presentation Lithium-ion battery Augmented Reality Scalability Search Video Games Synergy Vendor Management Wireless Technology 5G IaaS IBM Worker Autocorrect

Newsletter Sign Up