Blog
  • Register

Endpoint I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Endpoint I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (409) 835-1600 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, March 21, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Network Security User Tips Productivity Microsoft Tech Term Cloud Cybersecurity Google Smartphones Internet Malware Efficiency Data Email Communication Hardware Android Passwords Communications Backup Mobile Devices Mobile Device Windows 10 Innovation IT Services Software Wi-Fi IT Support Browser Ransomware Managed IT Services Network Small Business Data Recovery Business Management Data Backup Hackers Outsourced IT Users VoIp Business Collaboration Cloud Computing Smartphone Saving Money Applications Internet of Things Hosted Solutions Wireless Managed IT services Social Media Workplace Tips Holiday Patch Management Networking Information Word Marketing Router Chrome Miscellaneous Microsoft Office Employer-Employee Relationship Settings Blockchain Business Intelligence Computer Access Control Automation Phishing Virtualization G Suite Law Enforcement Government Virus Artificial Intelligence Excel Managed IT Service Password Remote Computing Save Money Tip of the week Cortana Dark Web Scam Data Protection Remote Monitoring and Management Cost Management Twitter Office 365 Medical IT Battery Bandwidth Business Continuity Gmail Paperless Office VPN Facebook How To Connectivity Analytics BDR Wireless Charging Managed Service Data Management Data Security Physical Security Apps Virtual Assistant Mobility Compliance Tech Terms Website Data Breach Computers WhatsApp Knowledge Streaming Media Storage VoIP Millennials Value Big Data Backup and Disaster Recovery Gadgets Training PowerPoint Network Attached Storage Edge Wireless Internet Business Technology E-Commerce Telephone System Office Unified Communications HP Authorization Spam Tech Support Update eCommerce Internet Explorer Proactive IT IT budget Operating System App Downloads WannaCry Error Alert Hard Drives Security Cameras Sports Server Reporting Time Management Remote Support Bring Your Own Device Dongle Help Desk Payment Cleaning Content Filtering RAM Document Management Antivirus Outlook Online Shopping Threat Trends HIPAA Machine Learning Apple Database Amazon Laptop SSD Wearables Chrome OS Telecommuting Environment Hybrid Cloud Upgrade instant Messaging Microsoft Teams Staff Travel Profitability Printing Analysis IT Management Comparison A.I. Hard Drive Touchscreen Vulnerability iPhone Telephony Cybercrime Healthcare Sales Lead Generation SaaS Server Management e-waste Cables Certification Files Vulnerabilities Botnet Company Culture Digital Websites Managed IT Education Eliminating Downtime File Sharing Paper Specifications Movies Processors Microsoft Office 365 Telecommute Voice over IP Tactics Inventory Tablet GDPR Workers disposal Voice over Internet Protocol Technology Tips Retail Politics Cryptocurrency Remote Monitoring User Tip Managing Stress Safety Live Streaming BYOD User Security Ink Personal Information News Conferencing Spyware Authentication Data loss Licensing Troubleshooting Maintenance Plug-In Mobile Security Regulation Windows 7 Quick Tips Emergency Disaster Recovery Thank You Printers WiFi Congratulations

Newsletter Sign Up

Latest News & Events

Endpoint I.T. is proud to announce the launch of our new website at http://www.endpointtx.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Endpoint I.T. can do for your business.

Call Us Today
Call us today
(409) 835-1600

595 Orleans Street
STE 1111

Beaumont, Texas 77701