Search Results | protocol

Your search for "protocol" returned 376 results

What is Thunderbolt technology in a Mac?

computer.howstuffworks.com/macs/thunderbolt-technology.htm

Thunderbolt is an input/output technology. Find out how Apple and Intel are innovating on this integral part of computing systems with the Thunderbolt technology.

Do wars drive technological advancement?

science.howstuffworks.com/war-drive-technological-advancement.htm

Wars drive technological advancement because of the need of specialized tools on the battlefield. Find out how wars drive technological advancement.

How Internet TV Works

electronics.howstuffworks.com/internet-tv.htm

Internet TV streams television signals over the Internet to a person's computer screen or TV set.

How Carbon Offsets Work

science.howstuffworks.com/environmental/green-science/carbon-offset.htm

Carbon offsets are a form of trade that funds projects that reduce greenhouse gas emissions. Learn about carbon offsets and carbon offset programs.

How Email Works

computer.howstuffworks.com/e-mail-messaging/email.htm

Email gives us the ability to contact any person in the world in a matter of seconds. Find out how email works and how email servers deliver messages.

The History of E-commerce

money.howstuffworks.com/history-e-commerce.htm

While the history of e-commerce is short, e-commerce has changed how we do business online. Learn more about the history of e-commerce.

How Modems Work

computer.howstuffworks.com/modem.htm

Most of the world still uses a standard modem to connect to the Internet. Learn how they are able to transmit so much data over a normal voice connection!

How Video Conferencing Security Works

money.howstuffworks.com/business-communications/how-video-conferencing-security-works.htm

Video conferencing security is vital to your video conferencing experience. Learn how to safeguard your data and information at HowStuffWorks.

How Encryption Works

computer.howstuffworks.com/encryption.htm

How secure is the Internet for sending sensitive information? Learn all about encryption, authentication, hash algorithms and more.

41 - 50