888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Privacy Managed IT Services Network Security Cloud Internet Malware Hackers Microsoft Productivity User Tips Communications Cybersecurity Efficiency Smartphones Business IT Support Ransomware Data Passwords Communication Software Business Management Backup Tech Term Outsourced IT Windows 10 VoIP Email Google Alert Hardware Productivity IT Services Users Innovation Social Media Data Recovery Small Business Network Data Backup Browser Bandwidth Save Money Hosted Solutions Cloud Computing Collaboration Mobile Device Smartphone Apps Holiday Phishing Microsoft Office Workplace Tips Mobile Devices Data Breach Vulnerability Internet of Things Android Access Control App Office 365 Miscellaneous Business Continuity Saving Money Twitter Facebook Wireless Blockchain Mobile Device Management Wi-Fi Workers Office Patch Management Computer Law Enforcement Personal Information Net Neutrality Excel Settings Company Culture Networking Politics Employer-Employee Relationship Chrome Compliance Remote Monitoring Scam BDR Cybercrime Applications Government Entertainment How To Spam Recovery Maintenance Password Data Security Computers Retail Medical IT Paperless Office Antivirus BYOD Automation Remote Monitoring and Management Managing Stress SaaS Marketing Information Managed IT Service Gadgets Dark Web Education Virus Windows Website Connectivity Vendor Management Word Virtual Assistant Healthcare DDoS Licensing Voice over IP Biometrics Certification Streaming Media Email Management Gadget Touchscreen Employee-Employer Relationship Technology Tips Hybrid Cloud Business Intelligence Managed Service iPhone Reporting Cryptocurrency VoIPMyths Document Management Database Dark Data Telephone System WannaCry Cleaning Printers Plug-In Staff RAM Avoiding Downtime Microsoft Office 365 Electronic Health Records Travel Leadership Access Mobility Downloads Sales Current Events Shortcut Backup and Disaster Recovery Cables Cortana Physical Security Profitability WiFi Two-factor Authentication Content Filtering VoIPSavings Tactics Unified Threat Management HIPAA Computer Care Proactive IT E-Commerce Websites Microsoft Teams Router CrashOverride Authentication Health e-waste Live Streaming Training Artificial Intelligence Trends Managed Service Provider Cost Management Tablet SSD Voice over Internet Protocol Files Disaster Recovery Eliminating Downtime IT budget PowerPoint Telephone Systems Managed IT Data Protection Tech Support GDPR Time Management Hiring/Firing Employer Employee Relationship Gmail Safety Update Digital Internet Explorer Botnet Remote Support VPN Hard Drive Gaming Console Payment Authorization Employees disposal WhatsApp Wireless Charging The Internet of Things Analytics Security Cameras A.I. Knowledge Inventory Battery Data Management Wireless Internet IT Management Sports Remote Control Encryption Budget Scalability Phone System Storage Automobile Technology Efficiently Edge Threat Processors Video Games Google Maps instant Messaging Dongle Worker Spyware Value Synergy Lead Generation IaaS Movies Comparison Amazon Emergency Yahoo Telephony Television Information Technology Help Desk Tech Terms Credit Cards Error Human Resources Bring Your Own Device Smart Technology Outlook Apple Staffing Regulation Vulnerabilities Printer Troubleshooting HP News Upgrade HaaS Printer Server Data loss Hard Drives Multi-Factor Security Specifications Operating System Domains Network Attached Storage Search Scheduling Business Technology Server Remote Computing Paper Managed IT Services Emoji Conferencing Environment eCommerce Public Speaking Server Management Instagram Samsung Telecommuting Presentation Ink Money Windows 7 Lithium-ion battery Online Shopping Augmented Reality Millennials Wireless Technology 5G Hosted Solution IBM Hacker Machine Learning Google Drive IT Support Fun File Sharing Chrome OS G Suite User Tip Competition Copy Customer Relationship Management IP Address Windows 10 Quick Tips Big Data Wearables Telecommute Mobile Security Spam Blocking User Security VoIP Virtualization Tip of the week Paste Laptop Printing Autocorrect Customer Service Mobile Office Unified Communications

Newsletter Sign Up