631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Tech Term Backup Network Security Microsoft Smartphones Hardware Passwords Communication Ransomware Software Business Management Hackers Outsourced IT Hosted Solutions Business Wi-Fi Email Productivity Small Business Google Android Alert Social Media Save Money VoIP Smartphone Computer Employer-Employee Relationship Microsoft Office Data Backup Router Data Recovery Business Intelligence Applications Twitter Internet Collaboration Government Data IT Support IT Services Excel Internet of Things Apps Data Management Office Phishing Network Automation Browser Virtualization Analytics BDR VoIP Bandwidth Innovation User Tips Miscellaneous Windows 10 Saving Money Cloud Computing Password Blockchain Settings Data Breach Patch Management Vulnerability Efficiency Mobile Devices Hacking Retail Artificial Intelligence Paperless Office Cost Management Networking Workers Tip of the week Remote Computing IT Support VPN Chrome Information Access Control Virus Productivity Remote Monitoring Word Law Enforcement Gadgets Holiday Company Culture WiFi Cybercrime Politics Tech Terms Scam Website How To Office 365 Compliance Virtual Assistant Wireless Charging Windows Physical Security Managed IT Service Battery Data Protection Cortana Business Continuity Managed IT Services Wireless Gmail Spam Mobile Device Management App Computers Websites Recovery Microsoft Teams Dark Web User Tip Document Management Tactics Disaster Recovery Two-factor Authentication Remote Support Voice over Internet Protocol Cleaning Trends Printers Google Drive Comparison Reporting HIPAA e-waste Maintenance WhatsApp Hiring/Firing Remote Monitoring and Management SSD CrashOverride Voice over IP IT budget PowerPoint Access Remote Control User Security Work/Life Balance Managing Stress Digital Internet Explorer Hosted Solution Tech Support Machine Learning A.I. Safety Specifications Medical IT Hard Drive Antivirus disposal Managed IT Business Technology Analysis Office Tips Automobile Inventory eCommerce Botnet IT Management Sports BYOD Marketing Spam Blocking Dongle G Suite Phone System Telecommuting Edge Education Threat Smart Technology Copy Apple Amazon Telecommute Movies Multi-Factor Security Conferencing GDPR Processors Value News Email Management Sales Managed Service Lead Generation Mobile Security Big Data Licensing Online Shopping Hard Drives SaaS Connectivity Bring Your Own Device Millennials Laptop Printing Users Paste iPhone Workplace Tips Server Data loss Unified Communications Staffing Content Filtering Spyware Telephone System Tablet Google Maps Operating System Travel Network Attached Storage Streaming Media Technology Tips Hybrid Cloud Gadget Paper Information Technology Plug-In Staff RAM HP Database Cables Downloads Printer Server Knowledge WannaCry Environment Live Streaming Server Management Proactive IT Spotify Backup and Disaster Recovery Facebook Shortcut Files Telephony Entertainment Ink Biometrics Telephone Systems File Sharing Instagram Presentation DDoS Unified Threat Management Lithium-ion battery Money Employer Employee Relationship Current Events Augmented Reality Leadership Wireless Technology 5G Fun Computer Care Freedom of Information IBM Net Neutrality The Internet of Things Emergency Personal Information Hacker Budget Encryption Gaming Console Competition Yahoo Customer Relationship Management IP Address Scalability Search Mobile Device Vendor Management Video Games Storage Synergy Customer Service Mobile Office Worker Upgrade Autocorrect IaaS Avoiding Downtime Credit Cards Domains Television Scheduling Error Dark Data Emoji Regulation Samsung Printer Windows 10 HaaS Public Speaking Managed Service Provider

Newsletter Sign Up