888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Internet Network Security Cybersecurity Malware Communications Hackers Tech Term VoIP Ransomware Software Outsourced IT Backup Microsoft Business Management Passwords IT Support Productivity Smartphones Alert Windows 10 Communication Efficiency Browser User Tips Social Media Business Hardware Phishing Email Network Data Small Business Google Data Backup Productivity Save Money Hosted Solutions Users Data Recovery Cloud Computing Data Breach Vulnerability IT Services Android App Bandwidth Apps Twitter Microsoft Office Internet of Things Miscellaneous Saving Money Mobile Device Smartphone Patch Management Mobile Device Management Workers Wi-Fi Collaboration Computer Settings Employer-Employee Relationship Excel Remote Monitoring Scam Company Culture Cybercrime Networking Politics Access Control Government Office 365 Compliance Innovation Business Continuity BDR Applications Law Enforcement Workplace Tips Blockchain Retail Holiday Office Computers Education Personal Information BYOD Managed IT Service Vendor Management Automation Managing Stress Chrome SaaS Dark Web Virus Marketing Information Windows Word Virtual Assistant Website Connectivity How To Facebook Entertainment Antivirus Recovery Wireless Maintenance Password Spam Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Managed Service Live Streaming Mobile Devices Reporting Tablet Downloads VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Two-factor Authentication Data Protection Encryption Computer Care Automobile Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics Microsoft Office 365 Gmail Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends VoIPSavings Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Tech Support IT budget PowerPoint Gaming Console Processors Digital Internet Explorer Analytics Authentication Safety A.I. Scalability Phone System Eliminating Downtime The Internet of Things Lead Generation disposal GDPR Comparison Hard Drives Update Emergency Telephony DDoS Inventory Remote Monitoring and Management Gadgets Budget IT Management Sports Video Games Google Maps Dongle Worker Apple Edge Threat IaaS Authorization Movies Credit Cards Wireless Internet News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Technology Efficiently Licensing Voice over IP Amazon Smart Technology Email Management Tech Terms Staffing Cortana Bring Your Own Device Printer iPhone HaaS Printer Server Data loss Gadget Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Error Outlook Travel Business Intelligence Regulation Sales Managed Service Provider Cost Management Streaming Media Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Troubleshooting Public Speaking Online Shopping Environment Server Management Presentation Millennials Fun Ink Lithium-ion battery Augmented Reality Google Drive Wireless Technology IT Support 5G Hosted Solution File Sharing Virtualization IBM Autocorrect User Tip Machine Learning Hacker Copy Spam Blocking User Security Search Scheduling Server G Suite Windows 10 Customer Relationship Management Competition Tip of the week Telecommute VoIP Big Data Emoji IP Address Mobile Security Paste Business Technology Instagram Remote Computing Samsung Customer Service Money Laptop Printing Quick Tips Unified Communications Upgrade Mobile Office Conferencing Domains eCommerce Operating System Network Attached Storage Managed IT Services Telecommuting Paper

Newsletter Sign Up