631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Managed IT Services Malware Communications Tech Term Network Security Backup Smartphones Hardware Microsoft Passwords Hackers Hosted Solutions User Tips Productivity Business Ransomware Business Management Google Communication Software Outsourced IT Save Money Social Media Internet VoIP Wi-Fi Email Small Business Android Alert Browser Efficiency Twitter Innovation Data Backup Smartphone Data Recovery Employer-Employee Relationship Cloud Computing Business Intelligence Applications Computer Data Bandwidth Collaboration Router Microsoft Office Password Data Breach Access Control Miscellaneous Saving Money Government Excel Internet of Things IT Services Windows 10 Office Mobile Devices Data Management Network Automation Patch Management Phishing Settings Virtualization Vulnerability Analytics VoIP BDR Apps Gadgets IT Support Blockchain Business Continuity Managed IT Services Chrome Tip of the week Remote Computing Battery Virus Cortana Compliance Website Office 365 Computers Retail Word App Artificial Intelligence Hacking Workers Wireless Networking Paperless Office VPN Spam How To Mobile Device Management Cost Management IT Support Wireless Charging Data Protection Information Physical Security Managed IT Service Remote Monitoring Company Culture Gmail Law Enforcement Tech Terms Politics Holiday WiFi Cybercrime Scam Dark Web Mobile Device Productivity Virtual Assistant Windows Marketing Hosted Solution Staff RAM HP Database Storage Printer Server Server Management Downloads Big Data Specifications WannaCry Environment Facebook Shortcut Spam Blocking Business Technology Backup and Disaster Recovery Plug-In Entertainment Biometrics Users eCommerce Ink Error Recovery Copy Apple Websites Microsoft Teams Spotify Cables Disaster Recovery Telecommuting Document Management Tactics Cleaning Printers News Trends Maintenance Multi-Factor Security Conferencing HIPAA e-waste PowerPoint Hiring/Firing CrashOverride Email Management Sales SSD Proactive IT Access Licensing Online Shopping IT budget Touchscreen Paste iPhone Managing Stress Voice over Internet Protocol Millennials Digital Internet Explorer Telephone System Machine Learning A.I. Work/Life Balance Antivirus Content Filtering Hard Drive disposal Reporting IT Management Sports Managed IT Tablet Inventory Remote Monitoring and Management BYOD Travel Microsoft Office 365 Phone System Dongle G Suite Office Tips Automobile Education Smart Technology Two-factor Authentication Edge Threat Botnet Telecommute Movies Processors Value Medical IT Live Streaming Connectivity Knowledge Lead Generation Mobile Security Analysis SaaS Authentication Telephone Systems File Sharing Bring Your Own Device Amazon Tech Support Files Telephony Laptop Printing Hard Drives Staffing Safety Remote Support Data loss Unified Communications User Tip Spyware GDPR WhatsApp Network Attached Storage Streaming Media Server Google Drive Comparison Operating System Managed Service Authorization Gadget Remote Control User Security Technology Tips Hybrid Cloud Google Maps Workplace Tips Information Technology Voice over IP Paper Competition Avoiding Downtime Emoji Customer Relationship Management IP Address Scheduling Printer Dark Data HaaS Quick Tips Samsung Emergency Unified Threat Management Customer Service Managed Service Provider Mobile Office Instagram Upgrade DDoS Regulation Money Current Events Domains Leadership Employer Employee Relationship Computer Care Windows 10 Fun Net Neutrality Public Speaking Freedom of Information Personal Information Presentation Gaming Console Lithium-ion battery Encryption Augmented Reality Yahoo Scalability Wireless Technology 5G Video Games Synergy IBM Search Hacker Vendor Management Worker The Internet of Things IaaS Credit Cards Television Budget Autocorrect

Newsletter Sign Up