croom new

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Eclipse Integrated Systems is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-340-0505 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, September 23 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Google Network Security Hackers Malware Internet Software Business Management Microsoft User Tips Hosted Solutions Tech Term Innovation Computer Backup Windows 10 Productivity Cybersecurity Productivity Business Efficiency Apps Email Windows Smartphones Mobile Devices Managed IT Services Browser Smartphone Saving Money Hardware Cybercrime Virtualization Internet of Things Passwords Law Enforcement Small Business communications Disaster Recovery VoIP Data Backup Communication Operating System Data Recovery Collaboration IT Support Miscellaneous Workplace Tips Ransomware Data Security Business Continuity Microsoft Office Android Network Server Holiday Cloud Computing IT Support Office 365 BDR Gadgets Wireless Quick Tips Money Phishing Social Media Mobile Device Management Telephone Systems Mobility Data Chrome Application Vulnerability App Wi-Fi Unsupported Software Information Technology Risk Management Update Health Password Outsourced IT Best Practice Cost Management Users Employer-Employee Relationship IT Services Google Drive Government Social Facebook Patch Management Automation Shortcut Office tips Streaming Media Current Events Alert Bandwidth User Error Two-factor Authentication USB Artificial Intelligence Antivirus Mobile Device Computers Upgrade Hacking Managed IT Data Management Identity Theft Proactive IT Save Money Politics Sports Spam Blockchain Windows 10 Work/Life Balance Managed Service Provider Mobile Computing DDoS WiFi Compliance Office Data Protection Gmail HaaS Tech Support iPhone Managing Stress Maintenance Automobile Samsung OneNote Transportation Cleaning Personal Information Internet Exlporer Marketing Wireless Technology Television The Internet of Things Storage Excel Managed IT Services Networking Hosted Solution Legal Search Analytics Touchscreen Audit Devices Save Time Cortana Company Culture VPN Flexibility Social Engineering Mobile Security Telephony Humor Router Meetings Information SaaS Commerce Encryption Going Green Computer Care Remote Computing History End of Support Battery Business Intelligence Wireless Charging Apple Google Docs Fraud Recovery Data Storage eWaste Private Cloud Avoiding Downtime Point of Sale Unified Communications Vendor Management Data Breach Data Privacy Webinar Microsoft Excel Identities Running Cable Downloads Credit Cards Chromecast Phone System Data Theft Virtual Assistant Upgrades Word Edge Screen Mirroring Error Specifications Files SharePoint Managed IT Service Applications Advertising Bluetooth Distributed Denial of Service RAM Outlook Evernote Video Games Hard Drive IT solutions File Sharing Language Trends Scam IT Management Nanotechnology Music Computing Plug-In Consultant Windows Ink Ciminal Laptop Internet Explorer Hiring/Firing Cast Microsoft Office 365 iOS Sales Cables Licensing Device Security Reputation Fax Server Microsoft Teams Training Robot Chromebook Reporting Windows 10s Virtual Reality A.I. Employer Employee Relationship IT Solutions Root Cause Analysis FAQ App store Remote Monitoring and Management Google Maps Project Management Touchpad Threat Benefits BYOD Access Control Retail Trending Entertainment Teamwork Virus Voice over Internet Protocol Travel Data storage Black Market Medical IT Solid State Drive G Suite Sync Settings Workers Lithium-ion battery Printing Education Movies Computer Accessories Augmented Reality Charger Administrator Big Data Electronic Medical Records Analysis Data Loss IT budget Wearable Technology PowerPoint Smart Technology Authentication Computer Fan Conferencing Proactive Tablets Spyware Google Assistant Hacker GDPR Hard Disk Drive Legislation PDF Worker Commute Bring Your Own Device Updates Scalability WIndows Server 2008 Access Books Identity Safety Managed Service Emails Uninterrupted Power Supply Operating Sysytem Connectivity HBO Authorization WannaCry Gifts Budget Experience Websites Amazon Unified Threat Management NFL Instant Messaging Value Keyboard Dark Web Comparison Text Messaging Hybrid Cloud Adobe Microsoft Word How To CrashOverride Emergency Printers Monitors Twitter Regulation Troubleshooting Disaster Worker Cache Relocation Remote Monitoring

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login