Blog
  • Register

Endpoint I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Endpoint I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (409) 835-1600 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Privacy Network Security Cybersecurity Tech Term Cloud Malware Smartphones Internet Backup User Tips Microsoft Android Communications Productivity VoIp Hardware Google Passwords Communication Browser Wi-Fi Ransomware Hosted Solutions Small Business Saving Money Data Managed IT services Efficiency Social Media Email Software IT Support Computer Managed IT Services Cloud Computing Collaboration Applications Network Windows 10 Mobile Devices Hackers Business Management Data Recovery Smartphone Employer-Employee Relationship Data Backup Mobile Device Router Outsourced IT Innovation Miscellaneous Users Business IT Services Blockchain Settings Business Intelligence Patch Management Excel Managed IT Service Virus Computers Remote Computing Automation Website Compliance Cortana Access Control Data Protection Networking Virtualization Chrome Artificial Intelligence Law Enforcement Save Money Wireless Gmail Tip of the week Microsoft Office Cost Management Information Dark Web Scam Twitter Wireless Charging Bandwidth Word Marketing Battery VPN Internet of Things Analytics BDR How To Data Breach Data Management Phishing Virtual Assistant Physical Security Workplace Tips Government Tech Terms Spyware Data loss Live Streaming Apps GDPR Mobile Security Politics disposal Voice over Internet Protocol Remote Support Licensing Ink Big Data Backup and Disaster Recovery Managing Stress VoIP Maintenance Plug-In Edge Online Shopping Gadgets Authentication Troubleshooting Cleaning Content Filtering Network Attached Storage Apple HP Office 365 Spam Streaming Media Storage IT budget Operating System Value WannaCry Telecommuting Tech Support PowerPoint Hard Drives App G Suite Alert Internet Explorer Proactive IT Dongle Unified Communications Authorization Update Server Password iPhone Document Management Telephony Antivirus Downloads Error Comparison HIPAA Machine Learning Sports Reporting Sales Laptop SSD Bring Your Own Device Threat Remote Monitoring and Management File Sharing RAM Botnet Database Amazon Paperless Office Voice over IP Staff Business Continuity Trends Specifications IT Management Hard Drive Workers Travel Medical IT Tablet Facebook Environment Hybrid Cloud Vulnerability Printing Analysis User Security Microsoft Teams Remote Monitoring Lead Generation User Tip Server Management Cybercrime Digital Holiday Websites A.I. Touchscreen News Conferencing Processors Millennials Telecommute Managed IT Education Connectivity SaaS WhatsApp Knowledge Inventory Files e-waste Cables Paper Managed Service Business Technology Technology Tips Company Culture Tactics eCommerce Safety Retail Movies Microsoft Office 365 Telephone System Office Regulation Emergency Quick Tips Outlook WiFi Disaster Recovery Thank You Printers Congratulations

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at http://www.endpointtx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701