• Register

Endpoint I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Endpoint I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (409) 835-1600 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Network Security Tech Term User Tips Cybersecurity Internet Cloud Microsoft Backup Malware Productivity Smartphones Wi-Fi IT Support Efficiency Android Communication Browser Communications Email Google Software Mobile Device Data Recovery VoIp Data Backup Hardware IT Services Passwords Business Management Cloud Computing Data Managed IT Services Applications Windows 10 Small Business Hosted Solutions Users Saving Money Managed IT services Social Media Outsourced IT Ransomware Business Network Patch Management Mobile Devices Settings Information Computer Marketing Internet of Things Innovation Hackers Wireless Microsoft Office Smartphone Employer-Employee Relationship Blockchain Business Intelligence Workplace Tips Router Miscellaneous Networking Collaboration Artificial Intelligence Physical Security Save Money Government Virus Excel Managed IT Service Cost Management Cortana Access Control Remote Computing Website Remote Monitoring and Management Bandwidth Data Protection VPN Chrome Law Enforcement Gmail Analytics BDR Tip of the week Data Management Twitter Connectivity Dark Web Scam Virtual Assistant Word Managed Service Wireless Charging Business Continuity Battery Tech Terms Apps Computers Automation How To Compliance Data Breach Holiday Virtualization Phishing Wireless Internet WannaCry PowerPoint Hard Drives G Suite Business Technology Password Retail Internet Explorer Proactive IT Telephone System Office Dongle Unified Communications Authorization eCommerce Update Server Document Management Antivirus Politics Downloads Error Live Streaming Help Desk HIPAA Machine Learning Sports Reporting Remote Support Laptop SSD Licensing Bring Your Own Device Gadgets Threat Cleaning Content Filtering VoIP RAM Online Shopping Outlook Database Amazon Paperless Office Staff Trends Apple Office 365 IT Management Upgrade Hard Drive App Medical IT Telecommuting Facebook Tech Support Environment Hybrid Cloud Lead Generation Server Management Printing Analysis Alert Microsoft Teams Profitability Cybercrime Comparison Digital Websites A.I. Touchscreen iPhone Telephony Sales Certification Processors Telecommute SaaS Inventory e-waste Cables Eliminating Downtime Paper Botnet Technology Tips Company Culture File Sharing Tactics Specifications Safety Movies Microsoft Office 365 Voice over IP Voice over Internet Protocol Tablet Spyware Data loss GDPR Workers Mobile Security Travel disposal BYOD Ink Remote Monitoring User Tip Big Data Backup and Disaster Recovery Vulnerability Managing Stress User Security Maintenance Plug-In News Conferencing Edge Authentication Troubleshooting Network Attached Storage Value WhatsApp Knowledge HP Spam Files Streaming Media Storage Millennials IT budget Operating System Managed IT Education Regulation Congratulations Quick Tips Disaster Recovery Emergency Printers WiFi Mobility Thank You

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701