631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Cybersecurity Microsoft Malware Google Smartphones Communications Managed IT Services Communication Tech Term Backup Business Hardware Email Passwords Efficiency Hackers Business Management Outsourced IT Internet Data Software Innovation Android Ransomware Hosted Solutions Small Business Windows 10 Browser Users Collaboration IT Support Mobile Device Mobile Devices VoIP Data Backup Wi-Fi Data Recovery IT Services Holiday Internet of Things Social Media Network Save Money Alert Smartphone Cloud Computing Managed IT Services Microsoft Office Applications Workplace Tips Miscellaneous Router Saving Money Access Control Wireless Password Bandwidth Twitter Computer Apps Business Intelligence Employer-Employee Relationship Phishing Office 365 Virtualization Excel Office Chrome Networking Automation Word Analytics VoIP Information Government BDR Data Breach Paperless Office Business Continuity Marketing Settings Blockchain Gadgets Data Management Patch Management Vulnerability Law Enforcement Website Dark Web Computers VPN WiFi Cybercrime Compliance Workers Scam Artificial Intelligence Tip of the week Remote Computing BYOD Spam Virus Company Culture Mobile Device Management Battery Politics Cortana G Suite Remote Monitoring and Management App Hacking How To Windows Tech Terms Connectivity Medical IT Wireless Charging Virtual Assistant Productivity Cost Management Data Security Physical Security Managed IT Service IT Support Data Protection Mobility Gmail Facebook Managed Service Retail Remote Monitoring Maintenance WannaCry Environment Big Data E-Commerce Files Telephony Cleaning Printers Server Management Downloads Authorization Telephone Systems File Sharing Training User Tip Access Ink Storage Remote Support CrashOverride Backup and Disaster Recovery Eliminating Downtime Google Drive Comparison Document Management Tactics Time Management WhatsApp Websites Microsoft Teams Hard Drives User Security Antivirus HIPAA e-waste Upgrade Plug-In Payment Voice over IP Trends Remote Control SSD Server Cables Security Cameras Personal Information IT budget PowerPoint Error Hosted Solution Wireless Internet Specifications Education Smart Technology Digital Internet Explorer Google Maps Chrome OS Phone System Managing Stress Spam Blocking Business Technology Hard Drive disposal Proactive IT instant Messaging eCommerce Machine Learning A.I. Troubleshooting Inventory Voice over Internet Protocol Wearables Telecommuting SaaS IT Management Sports Touchscreen Copy Apple Help Desk Multi-Factor Security Conferencing Edge Threat Two-factor Authentication Reporting News Dongle Email Management Sales Processors Value Spotify Vulnerabilities Licensing Online Shopping Staffing Telecommute Movies Update Lead Generation Mobile Security Healthcare Millennials Microsoft Office 365 Paste iPhone Hiring/Firing Certification Content Filtering Information Technology Laptop Printing Tech Support Telephone System Gadget Bring Your Own Device Outlook Tablet Spyware Analysis Cryptocurrency Travel Data loss Unified Communications Safety Operating System Work/Life Balance Amazon Printer Server Network Attached Storage Streaming Media Authentication Managed IT Entertainment Biometrics Paper GDPR Shortcut Technology Tips Hybrid Cloud Profitability Knowledge Disaster Recovery HP Database Office Tips Automobile Live Streaming Recovery Staff RAM Botnet IP Address Encryption Leadership Yahoo Current Events Customer Service Computer Care Mobile Office Search Quick Tips Domains Vendor Management Net Neutrality Autocorrect Regulation Windows 10 Avoiding Downtime Emergency Gaming Console Public Speaking Scheduling Dark Data Samsung Scalability Presentation Synergy Video Games Lithium-ion battery Managed Service Provider Worker Augmented Reality Instagram IaaS DDoS 5G Money Television Credit Cards Wireless Technology Emoji IBM Employer Employee Relationship Printer The Internet of Things HaaS Hacker Fun Budget Freedom of Information Unified Threat Management Customer Relationship Management Windows 7 Competition

Newsletter Sign Up