croom new

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Eclipse Integrated Systems is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-340-0505 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Cloud Business Computing Network Security Hackers Internet Business Management Google Malware Software Microsoft Computer Innovation Windows 10 Backup Hosted Solutions Productivity User Tips Cybersecurity Tech Term Productivity Business Apps Windows Email Mobile Devices Hardware Managed IT Services Efficiency Cybercrime Smartphone Law Enforcement Saving Money Smartphones Disaster Recovery Small Business communications Operating System Browser Virtualization VoIP Internet of Things Data Recovery Data Security Data Backup Collaboration Ransomware Business Continuity Android IT Support Server Microsoft Office Mobile Device Management Telephone Systems Communication Office 365 Wireless Miscellaneous Quick Tips Passwords Money Holiday Workplace Tips IT Support Mobility Chrome Phishing Application Wi-Fi Information Technology App Social Media Government Health Update BDR Cloud Computing Password Vulnerability Best Practice Unsupported Software Network IT Services Risk Management Google Drive Gadgets Social Data Outsourced IT Cost Management Employer-Employee Relationship Office tips Current Events USB Spam Alert Artificial Intelligence Antivirus Windows 10 Computers Managed Service Provider Hacking Upgrade Shortcut Identity Theft Streaming Media Patch Management Data Management User Error Politics Save Money Sports Two-factor Authentication Work/Life Balance Managed IT Facebook Users Tech Support Devices Meetings Commerce Gmail Automobile Going Green Computer Care Cortana Proactive IT Personal Information Apple Transportation Internet Exlporer The Internet of Things eWaste Wireless Technology Legal Wireless Charging Search Mobile Computing DDoS Google Docs Blockchain WiFi Hosted Solution Office Fraud Mobile Security Data Storage Flexibility Samsung OneNote Bandwidth Cleaning VPN Encryption Telephony Humor Router Social Engineering Data Protection Maintenance Television History End of Support Battery Managed IT Services Remote Computing Audit Recovery Private Cloud Excel Networking Company Culture Save Time iPhone Managing Stress HaaS Automation Smart Technology Computer Fan RAM Travel SaaS Chromecast Hard Drive BYOD Retail Wearable Technology Trends Sync Workers Advertising Files Computing Video Games Hacker Hard Disk Drive Charger Cables Data Loss IT budget Music Safety Emails Internet Explorer WannaCry Laptop Microsoft Teams Tablets Spyware Unified Threat Management Chromebook Conferencing Reputation A.I. Updates App store Legislation Keyboard Threat WIndows Server 2008 Virtual Reality Vendor Management Virus Voice over Internet Protocol Analytics Webinar Robot Running Cable Touchpad G Suite NFL Entertainment Upgrades Printing HBO Gifts Black Market Data storage Movies Adobe Microsoft Word SharePoint Trending Comparison PowerPoint Data Breach Education Bluetooth Distributed Denial of Service Proactive Information Microsoft Excel Identities Big Data IT solutions Lithium-ion battery Scam Nanotechnology Bring Your Own Device Word Edge Consultant Administrator Google Assistant Credit Cards Hiring/Firing iOS Business Intelligence Applications PDF Worker Commute Mobile Device Identity Screen Mirroring Specifications Scalability Marketing Connectivity Outlook Evernote Fax Server Training Websites Amazon File Sharing Language Books Windows 10s Instant Messaging Employer Employee Relationship Root Cause Analysis Uninterrupted Power Supply Operating Sysytem Hybrid Cloud Windows Ink Ciminal Experience Touchscreen Access Value IT Management Benefits Unified Communications Licensing Device Security Text Messaging Teamwork Budget Data Privacy Cast Sales How To Downloads Point of Sale Settings Data Theft Virtual Assistant Storage Solid State Drive Computer Accessories Augmented Reality Avoiding Downtime Managed IT Service Google Maps Project Management Phone System Electronic Medical Records IT Solutions FAQ Cache Plug-In Remote Monitoring Remote Monitoring and Management CrashOverride Disaster Emergency Monitors Worker Relocation Twitter

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login