888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, July 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Managed IT Services Privacy Best Practices Technology Cloud Communications Cybersecurity Malware Hackers Ransomware Backup Productivity VoIP Outsourced IT Internet Network Security Alert IT Support Business Management Software Tech Term Smartphones Save Money Business Social Media Microsoft Passwords Phishing Hardware Email Data Small Business Vulnerability Windows 10 Twitter IT Services Smartphone Data Breach App Android Data Backup Government Business Continuity Law Enforcement Apps Productivity Cloud Computing Browser Patch Management Workers Employer-Employee Relationship Miscellaneous User Tips Network Google Company Culture Excel Cybercrime Internet of Things Computer Data Recovery Microsoft Office Office 365 Remote Monitoring Settings Saving Money Scam Politics Bandwidth Mobile Device Management Virus Hosted Solutions Efficiency Word Virtual Assistant How To Entertainment Recovery Applications Antivirus Maintenance Blockchain Password Innovation Holiday Users Office Personal Information Retail Computers Collaboration Vendor Management Managed IT Service Chrome Managing Stress Networking Access Control Windows Wi-Fi Communication Facebook Mobile Device BDR Website Education Spam Lead Generation Internet Explorer Digital Video Games Mobile Devices Two-factor Authentication A.I. Worker Information Technology Television Google Maps Information Inventory Threat News Edge Avoiding Downtime Tech Support Movies Printer Email Management Biometrics Staffing Safety Amazon The Internet of Things WannaCry Telephone System Hiring/Firing Budget Gadgets Sales Data loss Access Physical Security Leadership Managed IT Workplace Tips HIPAA Employer Employee Relationship RAM Tablet Staff BYOD Files Encryption Plug-In Hard Drive Remote Support Automobile Synergy Microsoft Teams Knowledge Websites e-waste Analytics SaaS Wireless Proactive IT Processors PowerPoint IT budget Scalability Comparison Telephony disposal Emergency IaaS Phone System Remote Monitoring and Management Spyware Sports Apple IT Management Credit Cards Smart Technology Multi-Factor Security Cortana Dark Data Specifications Dongle Voice over IP Value Printer Server Licensing HaaS HP Connectivity iPhone Tech Terms Managed Service Provider Unified Threat Management Bring Your Own Device Marketing Printers Travel Cleaning Gadget Cost Management Streaming Media WiFi Current Events Business Intelligence Router Battery VPN Botnet Hybrid Cloud Content Filtering Technology Tips Database Live Streaming Document Management Computer Care Shortcut Data Management Downloads Data Protection Net Neutrality Telephone Systems Disaster Recovery Cables Gmail Backup and Disaster Recovery Wireless Charging Tactics Automation WhatsApp Paperless Office Gaming Console CrashOverride Hard Drives Yahoo Trends Artificial Intelligence Remote Control Dark Web DDoS Voice over Internet Protocol SSD Public Speaking User Security Machine Learning Spam Blocking Lithium-ion battery Tip of the week Windows 10 Augmented Reality Business Technology Telecommute Money Remote Computing Mobile Security Printing Laptop Unified Communications Managed IT Services Competition Telecommuting Operating System Big Data Paper Fun Millennials Environment Upgrade Ink Virtualization Google Drive IT Support Hosted Solution Search Server Scheduling Presentation Copy Emoji G Suite VoIP 5G Instagram Wireless Technology Samsung IBM Paste Hacker Conferencing eCommerce Customer Relationship Management Network Attached Storage IP Address Online Shopping Customer Service Server Management Mobile Office Domains File Sharing Autocorrect User Tip

Newsletter Sign Up