888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Cloud Best Practices Malware Cybersecurity Communications Hackers Backup Internet Ransomware Network Security Tech Term Productivity Smartphones Alert VoIP Passwords Software Outsourced IT IT Support Social Media Business Management User Tips Business Hardware Phishing Microsoft Data Google Save Money Hosted Solutions Vulnerability Smartphone Windows 10 IT Services Data Breach Android Email Communication App Small Business Bandwidth Network Twitter Data Backup Microsoft Office Data Recovery Cloud Computing Browser Blockchain Office 365 Innovation Patch Management Miscellaneous Compliance Business Continuity Saving Money Law Enforcement Settings Mobile Device Mobile Device Management Access Control Computer Workers Employer-Employee Relationship Collaboration Remote Monitoring Scam Cybercrime Apps Excel Company Culture Productivity Government Politics Efficiency BDR Internet of Things Website Users Windows Computers Applications Antivirus Entertainment Spam Facebook Managed IT Service Recovery Maintenance Password Holiday Dark Web Chrome Networking Managing Stress Virus Wi-Fi Education Retail Office Word Personal Information Vendor Management Virtual Assistant How To Automation SaaS Worker Router Content Filtering IaaS Technology Tips Hybrid Cloud Authorization HIPAA Cortana Tablet Television Information Technology Staff RAM Storage Live Streaming Credit Cards Document Management Database Telephone Systems Data Protection Smart Technology Downloads Unified Threat Management Files Staffing Printer Gmail HaaS Printer Server Backup and Disaster Recovery Cables Managed Service Provider Cost Management Remote Support Hard Drive Knowledge Biometrics Websites Microsoft Teams Managed IT Error WhatsApp Wireless Charging Paperless Office Gadget Tactics Wireless Remote Control Artificial Intelligence Business Intelligence Trends Botnet VPN Regulation e-waste Hiring/Firing Employer Employee Relationship Processors IT budget PowerPoint Mobile Devices Cleaning Printers SSD Voice over Internet Protocol Battery Data Management Comparison Leadership Access Two-factor Authentication Encryption Touchscreen Lead Generation Current Events Digital Shortcut Internet Explorer Automobile A.I. Reporting Emergency Telephony disposal Apple IT Management Sports Synergy Plug-In Computer Care Inventory Information CrashOverride Threat Yahoo Multi-Factor Security Specifications BYOD Dongle Tech Support Microsoft Office 365 News Net Neutrality Edge Email Management Disaster Recovery Movies Medical IT Licensing Voice over IP Spyware Value Safety iPhone Tech Terms The Internet of Things Connectivity Proactive IT Gaming Console Marketing Amazon Hard Drives DDoS Gadgets Analytics Budget Bring Your Own Device Authentication Telephone System WannaCry Sales Data loss GDPR Travel Scalability HP Phone System WiFi Streaming Media Dark Data Remote Monitoring and Management Physical Security Video Games Google Maps Workplace Tips Avoiding Downtime Windows 10 Paper Instagram Samsung Customer Service Money Online Shopping VoIP Server Management Upgrade Paste Millennials Environment Mobile Office Domains Ink Quick Tips Google Drive File Sharing IT Support Managed IT Services Public Speaking User Tip Fun Presentation Spam Blocking User Security Machine Learning Lithium-ion battery Augmented Reality Tip of the week Wireless Technology 5G G Suite Virtualization Business Technology Telecommute IBM Autocorrect Hosted Solution Remote Computing Mobile Security Hacker Laptop Printing Conferencing Search Scheduling Server Customer Relationship Management Unified Communications eCommerce Competition Network Attached Storage Big Data Copy Emoji Telecommuting Operating System IP Address

Newsletter Sign Up