631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Suffolk Computer Consultants is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 631-905-9617 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Cybersecurity Network Security User Tips Malware Tech Term Managed IT Services Backup Communications Microsoft Productivity Smartphones Internet Communication Business Business Management Google Hardware Outsourced IT Email Hosted Solutions Passwords Efficiency Software Hackers Browser Data Backup Data Recovery Android VoIP Wi-Fi Small Business Ransomware IT Services Social Media Windows 10 Alert Cloud Computing Applications Mobile Device Save Money IT Support Microsoft Office Smartphone Users Innovation Network Miscellaneous Employer-Employee Relationship Saving Money Bandwidth Business Intelligence Mobile Devices Router Computer Managed IT Services Data Collaboration Apps Twitter Internet of Things Automation Data Management Analytics Workplace Tips Wireless Phishing Networking VoIP Virtualization Holiday Settings Patch Management Data Breach Vulnerability Business Continuity Password BDR Marketing Blockchain Information Gadgets Access Control Excel Government Office Website Office 365 Computers BYOD Word Paperless Office Cost Management IT Support Artificial Intelligence Managed Service Company Culture Remote Monitoring How To Politics Spam Law Enforcement Wireless Charging Compliance Mobile Device Management Data Protection Windows Physical Security Managed IT Service WiFi Cybercrime Gmail Scam Tech Terms Connectivity Battery Dark Web Cortana Retail Productivity Remote Monitoring and Management Virtual Assistant App Tip of the week Remote Computing Chrome VPN Hacking Workers Virus Apple Authentication Ink Telecommuting Amazon Backup and Disaster Recovery Copy Document Management Tactics Education Smart Technology Multi-Factor Security Conferencing Mobility Work/Life Balance Websites Microsoft Teams Phone System News GDPR Email Management Sales Profitability Managed IT Upgrade Trends Licensing Online Shopping HIPAA e-waste Paste iPhone Authorization Botnet IT budget PowerPoint SaaS Millennials Office Tips Automobile SSD Digital Internet Explorer Content Filtering Managing Stress Telephone System Storage Tablet Eliminating Downtime Machine Learning A.I. Staffing Travel Hard Drive disposal Hard Drives IT Management Sports Plug-In Inventory Edge Threat Information Technology Cables Two-factor Authentication Dongle G Suite Gadget Error Knowledge Wireless Internet Server Telecommute Movies Live Streaming Processors Value Telephone Systems File Sharing Troubleshooting Printer Server Files Telephony Proactive IT Google Maps Lead Generation Mobile Security Laptop Printing Entertainment Biometrics User Tip Voice over Internet Protocol Tech Support Bring Your Own Device Facebook Shortcut Remote Support Touchscreen Disaster Recovery Google Drive Comparison Help Desk Data loss Unified Communications Recovery WhatsApp Reporting Safety Spyware Remote Control User Security Update Network Attached Storage Streaming Media Cleaning Printers Voice over IP Operating System Maintenance Microsoft Office 365 Paper Access Spotify Technology Tips Hybrid Cloud CrashOverride Hosted Solution HP Database Specifications Certification Staff RAM Medical IT Spam Blocking Business Technology Outlook Hiring/Firing Big Data Server Management Downloads eCommerce Analysis WannaCry Environment Antivirus Personal Information Employer Employee Relationship Net Neutrality Customer Service Fun Gaming Console Freedom of Information Mobile Office Domains Scalability Encryption Windows 10 Video Games Yahoo Synergy Quick Tips Public Speaking IaaS Worker Presentation Television Credit Cards Search Emoji Vendor Management Regulation Lithium-ion battery Autocorrect Augmented Reality HaaS Printer Wireless Technology 5G Avoiding Downtime Unified Threat Management Scheduling IBM Dark Data The Internet of Things Samsung Hacker Managed Service Provider Leadership Budget Current Events Instagram Customer Relationship Management DDoS Competition Money Computer Care Emergency IP Address

Newsletter Sign Up