proprietary protocol
collocation in Englishmeaningsofproprietaryandprotocol
These words are often used together. Click on the links below to explore the meanings. Or,see other collocations withprotocol.
proprietary
adjective[before noun]
uk/prəˈpraɪə.tər.i/us/prəˈpraɪə.ter.i/
relating to owning something, or relating to or like ...
See more atproprietary
protocol
noun
uk/ˈprəʊ.tə.kɒl/us/ˈproʊ.t̬ə.kɑːl/
the system of rules and acceptable behaviour used at official ceremonies ...
See more atprotocol
(Definition ofproprietaryandprotocolfrom theCambridge English Dictionary© Cambridge University Press)
Examplesofproprietary protocol
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
These systems often have their own internal email format and their clients typically communicate with the email server using a vendor-specific,proprietaryprotocol.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These offerings useproprietaryprotocolelements, and the top-level architectures being promoted are radically different.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
This is aproprietaryprotocoland very little is known about its operation.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Skype's client uses an undocumented andproprietaryprotocol.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
However, it quickly became clear that the number of proprietary protocols was becoming unmanageable.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These information exchanges are implemented via dozens of open and proprietary protocols, message and file formats.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The framework enables existing transaction processing, workflow, and other systems for coordination to hide their proprietary protocols and to operate in a heterogeneous environment.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
If fuzzing is based only on published specifications, test coverage for new or proprietary protocols will be limited or nonexistent.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The keyboard and mouse used simple proprietary protocols, allowing some third-party upgrades.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
Generally these devices do not provide the benefits of data migration or replication across heterogeneous storage, as each vendor tends to use their own proprietary protocols.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
The use of proprietary protocols has meant that many instant messaging networks have been incompatible and users have been unable to reach users on other networks.
From This example is from Wikipedia and may be reused under a CC BY-SA license.
Wikipedia
These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors.
Want to learn more?
Go to the definition ofproprietary
Go to the definition ofprotocol
See other collocations withprotocol