888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Privacy Managed IT Services Best Practices Cloud Communications Cybersecurity Malware Ransomware Backup Hackers Smartphones Outsourced IT Internet VoIP Network Security Productivity Tech Term Software Alert Business Management Social Media Passwords IT Support Phishing Business Hardware Save Money Microsoft Data Data Breach Vulnerability IT Services Android Network App Google Data Backup Twitter Windows 10 Email Hosted Solutions Communication Small Business Data Recovery Smartphone Microsoft Office Browser Patch Management Workers Office 365 User Tips Miscellaneous Settings Employer-Employee Relationship Excel Saving Money Remote Monitoring Scam Company Culture Cybercrime Politics Bandwidth Mobile Device Management Government Internet of Things Computer Compliance Business Continuity BDR Apps Law Enforcement Productivity Cloud Computing Blockchain Retail Holiday Office Collaboration Website Computers Users Innovation Education Personal Information Managed IT Service Vendor Management Automation Networking Managing Stress Chrome SaaS Spam Dark Web Virus Access Control Efficiency Wi-Fi Windows Word Virtual Assistant Applications How To Facebook Entertainment Antivirus Recovery Mobile Device Maintenance Password Staff RAM Current Events Shortcut HIPAA Botnet VPN Document Management Database Leadership Access Router Content Filtering Hiring/Firing Employer Employee Relationship Live Streaming Reporting Tablet Downloads Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Websites Microsoft Teams Net Neutrality CrashOverride Remote Support Hard Drive Paperless Office Tactics BYOD Gmail Automobile WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Medical IT Knowledge Artificial Intelligence Trends Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control IT budget PowerPoint Gaming Console Wireless Processors Digital Internet Explorer Analytics A.I. Scalability Phone System Lead Generation disposal GDPR Comparison Hard Drives Emergency Telephony DDoS Inventory Information Mobile Devices Remote Monitoring and Management IT Management Sports Video Games Google Maps Dongle Worker Apple Edge Threat IaaS Two-factor Authentication Movies Credit Cards News Dark Data Spyware Value Television Information Technology Storage Multi-Factor Security Specifications Avoiding Downtime Licensing Voice over IP Amazon Smart Technology Email Management Tech Terms Connectivity Staffing Cortana Bring Your Own Device Printer iPhone HaaS Printer Server Tech Support Data loss Gadget Safety Telephone System WannaCry Unified Threat Management HP Biometrics Marketing Travel Workplace Tips Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cost Management Streaming Media Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Gadgets Budget Competition Customer Relationship Management IP Address Online Shopping Environment Big Data Server Management Millennials Fun Ink Customer Service Mobile Office Upgrade Google Drive IT Support Hosted Solution Domains File Sharing Virtualization Autocorrect User Tip Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Server G Suite Windows 10 Presentation Tip of the week Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Remote Computing Samsung Wireless Technology 5G Money Laptop Printing Unified Communications IBM Error Conferencing Hacker eCommerce Operating System Network Attached Storage Managed IT Services Telecommuting Paper

Newsletter Sign Up