888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Managed IT Services Privacy Best Practices Cloud Internet Network Security Malware Cybersecurity Hackers Communications VoIP Tech Term Ransomware Backup Smartphones Outsourced IT Alert Microsoft Passwords Productivity Software Business Management Social Media Business Communication IT Support Browser Google Hardware Windows 10 Efficiency Save Money Hosted Solutions Email Data Small Business Productivity Phishing User Tips Saving Money App Bandwidth Data Recovery Twitter Cloud Computing Data Breach Vulnerability Network Smartphone Microsoft Office Data Backup IT Services Internet of Things Users Miscellaneous Android Remote Monitoring Scam Business Continuity Cybercrime Government Mobile Device Management Computer Patch Management Compliance BDR Workers Collaboration Workplace Tips Apps Settings Blockchain Excel Law Enforcement Company Culture Mobile Device Politics Access Control Innovation Office 365 Employer-Employee Relationship Virtual Assistant Networking Managing Stress Vendor Management Spam How To Applications Entertainment Facebook Recovery Wi-Fi Maintenance Password Retail Office Personal Information Marketing Antivirus Automation Managed IT Service Chrome SaaS Dark Web Computers Holiday Virus Website Windows Word Education SSD Voice over Internet Protocol Television Information Technology Proactive IT Multi-Factor Security Specifications IT budget PowerPoint Credit Cards Synergy VoIPSavings News Smart Technology Email Management Digital Internet Explorer Staffing Yahoo Authentication Licensing Voice over IP iPhone disposal HaaS Printer Server GDPR Wireless A.I. Printer WannaCry Inventory Information Biometrics Hard Drives Remote Monitoring and Management IT Management Sports Gadget Update Telephone System Dongle Business Intelligence Sales Edge Threat DDoS Authorization Travel Mobile Devices Two-factor Authentication WiFi Spyware Value Cleaning Printers Storage Physical Security Movies HIPAA Amazon Leadership Access Avoiding Downtime Router Content Filtering Tech Terms Connectivity Current Events Shortcut Dark Data Technology Efficiently Bring Your Own Device Tablet Live Streaming Telephone Systems Tech Support Data Protection HP Computer Care Cortana Error Files Data loss Outlook Remote Support Hard Drive BYOD Regulation Safety Gmail Streaming Media Net Neutrality CrashOverride Unified Threat Management Technology Tips Hybrid Cloud Disaster Recovery Managed Service Provider Cost Management Knowledge Troubleshooting The Internet of Things WhatsApp Wireless Charging Managed IT Gadgets Remote Control Budget Document Management Database Gaming Console Touchscreen Staff RAM Processors Analytics Hiring/Firing Employer Employee Relationship Reporting Downloads Botnet VPN Backup and Disaster Recovery Cables Plug-In Comparison Scalability Phone System VoIPMyths Lead Generation Websites Microsoft Teams Encryption Paperless Office Tactics Video Games Google Maps Battery Data Management Microsoft Office 365 Emergency Telephony Apple e-waste IaaS Automobile Medical IT Artificial Intelligence Trends Worker Mobile Office VoIP Upgrade Paste Business Technology Domains Virtualization Remote Computing Machine Learning Autocorrect Conferencing G Suite Search Scheduling Managed IT Services Public Speaking eCommerce Server Presentation Telecommuting Telecommute Mobile Security Lithium-ion battery Emoji Instagram Laptop Printing Quick Tips Augmented Reality Online Shopping Money Samsung Wireless Technology 5G Millennials Unified Communications IBM Operating System Network Attached Storage Google Drive Hacker Paper Hosted Solution File Sharing IT Support Managed Service Customer Relationship Management Environment Competition User Tip Server Management IP Address Ink Big Data Fun Copy Spam Blocking User Security Customer Service Tip of the week Windows 10

Newsletter Sign Up