631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Productivity Network Security User Tips Cybersecurity Malware Tech Term Smartphones Communications Microsoft Managed IT Services Backup Hardware Passwords Efficiency Hackers Google Business Internet Email Communication Software Browser Innovation Ransomware Business Management Android Outsourced IT Hosted Solutions Small Business Data Backup Windows 10 Data Recovery Mobile Device VoIP Wi-Fi Data Collaboration Microsoft Office Smartphone IT Services Internet of Things Network Social Media Holiday Cloud Computing Mobile Devices Applications Alert IT Support Save Money Access Control Users Miscellaneous Employer-Employee Relationship Saving Money Wireless Business Intelligence Bandwidth Router Computer Password Managed IT Services Apps Twitter Workplace Tips BDR Gadgets Government Word Office 365 Excel Blockchain Data Management Office Phishing Virtualization Automation Analytics Settings Patch Management VoIP Information Networking Vulnerability Business Continuity Data Breach Marketing Hacking Virus Retail Paperless Office Compliance Virtual Assistant Cost Management Website Workers IT Support VPN How To BYOD Remote Monitoring Law Enforcement Computers Wireless Charging Spam Company Culture Mobile Device Management Physical Security Artificial Intelligence Managed IT Service WiFi Cybercrime Data Protection Politics Gmail Scam Remote Monitoring and Management Windows Medical IT Dark Web Battery Cortana Data Security G Suite Mobility Tip of the week Tech Terms Remote Computing Connectivity Managed Service Productivity Chrome Facebook App E-Commerce Bring Your Own Device Recovery Authorization Laptop Specifications Printing Disaster Recovery Training Data loss eCommerce Unified Communications Cleaning Printers Storage Spam Blocking Spyware Business Technology Maintenance Hiring/Firing Eliminating Downtime Network Attached Storage Telecommuting Streaming Media Access Big Data Copy Apple Operating System CrashOverride Work/Life Balance Plug-In Payment News Technology Tips Hybrid Cloud Multi-Factor Security Conferencing Paper Managed IT Cables Security Cameras Licensing Staff Online Shopping RAM Error Email Management HP Sales Database Antivirus Wireless Internet Server Management Millennials Downloads Personal Information Office Tips Automobile Upgrade Paste WannaCry iPhone Environment Botnet Ink Education Smart Technology Proactive IT instant Messaging Telephone System Backup and Disaster Recovery Phone System Troubleshooting Content Filtering Voice over Internet Protocol Wearables Travel Websites Microsoft Teams Touchscreen Document Management Tablet Tactics Help Desk Trends SaaS Reporting HIPAA e-waste Hard Drives IT budget PowerPoint Vulnerabilities SSD Update Server Healthcare Live Streaming Managing Stress Staffing Microsoft Office 365 Two-factor Authentication Digital Knowledge Internet Explorer Certification Files Machine Learning Telephony A.I. Google Maps Telephone Systems Hard Drive File Sharing disposal IT Management User Tip Sports Information Technology Analysis Remote Support Inventory Gadget Outlook Amazon WhatsApp Dongle Authentication Tech Support Google Drive Edge Comparison Threat Safety Telecommute Voice over IP Movies Printer Server GDPR Remote Control Processors User Security Value Entertainment Biometrics Spotify Hosted Solution Lead Generation Mobile Security Shortcut Profitability Instagram DDoS Budget Unified Threat Management Competition Emergency Customer Relationship Management Money IP Address Leadership Employer Employee Relationship Current Events Fun Quick Tips Computer Care Freedom of Information Customer Service Mobile Office Regulation Net Neutrality Domains Encryption Gaming Console Yahoo Windows 10 Public Speaking Scalability Search Vendor Management Presentation Video Games Synergy Lithium-ion battery IaaS Worker Autocorrect Television Avoiding Downtime Cryptocurrency Augmented Reality Credit Cards Scheduling Wireless Technology 5G Dark Data Emoji HaaS Samsung IBM Printer Hacker The Internet of Things Managed Service Provider

Newsletter Sign Up