croom new

Eclipse Integrated Systems Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Eclipse Integrated Systems is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-340-0505 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, February 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Network Security Internet Google User Tips Hackers Productivity Malware Software Microsoft Business Management Innovation Tech Term Efficiency Hosted Solutions Computer Backup Email Windows 10 Business Browser Smartphones Mobile Devices Apps Cybersecurity Hardware Managed IT Services Productivity Data Backup Windows Communication Collaboration Passwords Small Business Smartphone Internet of Things Data Recovery Saving Money Holiday Android communications Cybercrime Virtualization VoIP Data Security Microsoft Office Wireless Network Ransomware Disaster Recovery Mobile Device IT Support Business Continuity Workplace Tips Mobility Operating System Data Law Enforcement Office 365 Windows 10 Cloud Computing Miscellaneous IT Services IT Support Users Social Media Update BDR Mobile Device Management Telephone Systems Quick Tips Password Money Outsourced IT Gadgets Phishing Chrome Wi-Fi Server Government Vulnerability Unsupported Software Upgrade Best Practice Google Drive Risk Management Social Facebook Cost Management Application Employer-Employee Relationship App Health Information Technology Artificial Intelligence Antivirus Managed Service Provider Alert Information Blockchain Computers Shortcut Patch Management Identity Theft Hacking Data Management Streaming Media Politics Bandwidth Managed IT Services Save Money Two-factor Authentication User Error Sports Marketing Managed IT Networking Work/Life Balance Current Events Automation Office tips Proactive IT Spam USB Personal Information Going Green Mobile Security Transportation Legal Apple Wireless Charging Internet Exlporer Google Docs Wireless Technology Search Office The Internet of Things Fraud Analytics Data Storage eWaste Managed Service Hosted Solution Business Intelligence Flexibility Cleaning WiFi Connectivity Samsung OneNote Mobile Computing DDoS Data Protection Word Encryption Compliance VPN Applications Maintenance Router History Social Engineering Outlook Training Telephony Humor Touchscreen End of Support Battery Television Instant Messaging Audit Remote Computing Private Cloud Save Time Excel Company Culture Storage Recovery BYOD iPhone Managing Stress Devices HaaS SaaS Commerce Cortana Remote Monitoring and Management Computer Care Gmail Automobile Access Control Tech Support Meetings Medical IT G Suite Legislation Reputation Analysis Keyboard Updates Movies Eliminating Downtime Proactive Webinar WIndows Server 2008 PowerPoint Authentication Vendor Management Laptop Upgrades HBO Gifts Virtual Reality Google Assistant GDPR E-Commerce NFL Bring Your Own Device Comparison Black Market Identity Robot Adobe Microsoft Word Entertainment Wireless Internet Websites Amazon IT solutions Data Breach Authorization Touchpad Microsoft Excel Identities Consultant Trending Credit Cards Education Value Dark Web Payment Scam Nanotechnology Data storage Running Cable Edge Big Data Hybrid Cloud SharePoint Screen Mirroring Specifications Data Privacy Hiring/Firing iOS Lithium-ion battery Unified Communications Help Desk Scalability Data Theft Virtual Assistant Windows 10s Administrator Evernote PDF Worker Commute Downloads Bluetooth Distributed Denial of Service File Sharing Language Managed IT Service IT Management Error Vulnerabilities Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Books Cast Sales Hard Drive Benefits Licensing Device Security Experience RAM Certification How To Computing Plug-In Solid State Drive Access Text Messaging Trends Troubleshooting Settings Uninterrupted Power Supply Operating Sysytem Fax Server Cables Electronic Medical Records Budget IT Solutions FAQ Point of Sale Internet Explorer Microsoft Office 365 Cryptocurrency Computer Accessories Augmented Reality Google Maps Project Management Teamwork Retail Chromebook Reporting Smart Technology Computer Fan Travel Phone System Microsoft Teams Security Cameras App store Hacker Hard Disk Drive Sync Workers A.I. Profitability Avoiding Downtime Virus Voice over Internet Protocol Safety Emails Chromecast Charger Advertising Threat Data Loss IT budget Video Games Files Conferencing Printing Healthcare WannaCry Wearable Technology Tablets Spyware Music Wearables Unified Threat Management Remote Monitoring Emergency CrashOverride Monitors Disaster Worker Printers Twitter Relocation Regulation Cache Paperless Office

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login