631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Communications Tech Term Productivity Backup Smartphones Microsoft Hackers Hardware Passwords Communication Hosted Solutions Browser Ransomware User Tips Business Google Internet VoIP Business Management Android Email Outsourced IT Small Business Efficiency Software Save Money Social Media Alert Wi-Fi Applications Microsoft Office Twitter Innovation Collaboration Smartphone Miscellaneous Saving Money Employer-Employee Relationship Bandwidth Data Backup Computer Router Data Windows 10 Data Recovery Cloud Computing Business Intelligence Gadgets Patch Management Settings Vulnerability Excel Internet of Things Users Office Government Network IT Services IT Support Automation BDR Data Management Access Control Analytics VoIP Phishing Mobile Devices Blockchain Virtualization Managed IT Services Mobile Device Data Breach Apps Workplace Tips Password Networking Cortana Gmail Compliance Workers App VPN Hacking Website Office 365 Dark Web Paperless Office Tech Terms IT Support Chrome Company Culture Cost Management Tip of the week Remote Computing Spam Virus Politics Wireless Remote Monitoring Mobile Device Management Virtual Assistant Information Law Enforcement Word Holiday Windows WiFi Cybercrime Business Continuity Scam Computers How To Artificial Intelligence Wireless Charging Retail Battery Marketing Data Protection Productivity Physical Security Managed IT Service Managing Stress Maintenance Storage Digital Internet Explorer Cleaning Printers Machine Learning Live Streaming A.I. CrashOverride Hard Drive disposal Knowledge Access Plug-In Telephone Systems Inventory File Sharing Spotify Big Data IT Management Files Sports Telephony Dongle Remote Support G Suite Antivirus Error Edge Threat User Tip Cables Telecommute WhatsApp Movies Hiring/Firing Processors Google Drive Value Comparison BYOD Connectivity Voice over IP Phone System Proactive IT Lead Generation Remote Control Mobile Security User Security Education Smart Technology Troubleshooting Voice over Internet Protocol Hosted Solution Bring Your Own Device Touchscreen Work/Life Balance Laptop Printing Data loss Unified Communications Reporting Managed IT Spyware Specifications SaaS Network Attached Storage Streaming Media eCommerce Remote Monitoring and Management Botnet Spam Blocking Operating System Business Technology Update Office Tips Automobile Staffing Copy Technology Tips Apple Hybrid Cloud Microsoft Office 365 Paper Telecommuting Two-factor Authentication Staff News RAM Medical IT HP Multi-Factor Security Database Conferencing Server Management Licensing Downloads Online Shopping Gadget Analysis Hard Drives WannaCry Email Management Environment Sales Information Technology Outlook Amazon Paste Backup and Disaster Recovery iPhone Authentication Ink Millennials Tech Support Websites Telephone System Microsoft Teams GDPR Server Document Management Tactics Content Filtering Printer Server Travel Trends Facebook Shortcut Managed Service Safety HIPAA e-waste Tablet Entertainment Biometrics Google Maps Recovery SSD Disaster Recovery Authorization IT budget PowerPoint Dark Data Budget Scheduling Customer Relationship Management Current Events Competition Leadership Samsung Managed Service Provider IP Address Quick Tips DDoS Instagram Computer Care Customer Service Net Neutrality Regulation Money Personal Information Mobile Office Employer Employee Relationship Upgrade Gaming Console Fun Domains Freedom of Information Emergency Scalability Windows 10 Video Games Synergy Public Speaking Yahoo Worker Encryption Presentation IaaS Credit Cards Lithium-ion battery Television Search Emoji Augmented Reality Printer Vendor Management Wireless Technology 5G HaaS IBM Autocorrect Hacker Unified Threat Management Avoiding Downtime The Internet of Things

Newsletter Sign Up