888.678.7282    Get SUPPORT

Strata Information Technology Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Strata Information Technology is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 888.678.7282 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Cybersecurity Hackers Communications Ransomware Backup User Tips Tech Term Business Management Outsourced IT VoIP Microsoft IT Support Software Productivity Smartphones Efficiency Passwords Productivity Alert Browser IT Services Network Social Media Business Google Data Backup Hardware Windows 10 Email Communication Data Small Business Data Recovery Phishing Holiday Users Save Money Hosted Solutions Cloud Computing Mobile Device Smartphone Microsoft Office Data Breach Vulnerability Collaboration Miscellaneous Android Saving Money App Bandwidth Access Control Twitter Internet of Things Business Continuity Apps Patch Management Workers Innovation Office 365 Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Cybercrime Networking Politics Wireless Government Mobile Device Management Wi-Fi Computer Compliance BDR Applications Law Enforcement Workplace Tips Blockchain Retail Computers Office Website Education Personal Information BYOD Automation Managed IT Service Vendor Management Spam Dark Web Managing Stress Chrome SaaS Virus Information Mobile Devices Remote Monitoring and Management Windows Word Virtual Assistant Connectivity How To Facebook Entertainment Recovery Marketing Antivirus Maintenance Password Touchscreen Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Current Events Shortcut Certification HIPAA Botnet VPN Document Management Database Leadership Access Downloads Managed Service Live Streaming Reporting Tablet Computer Care VoIPMyths Files Battery Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Microsoft Office 365 Gmail Automobile Websites Microsoft Teams Net Neutrality CrashOverride Mobility Remote Support Hard Drive Paperless Office Tactics Knowledge Artificial Intelligence Trends Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery Upgrade Medical IT IT budget PowerPoint Gaming Console VoIPSavings Yahoo SSD Voice over Internet Protocol Proactive IT Remote Control Authentication Training Processors Digital Internet Explorer Analytics Comparison Hard Drives A.I. Scalability Phone System Eliminating Downtime Lead Generation disposal GDPR IT Management Sports Video Games Google Maps Update Emergency Telephony DDoS Inventory Two-factor Authentication Authorization Dongle Worker Security Cameras Apple Edge Threat IaaS Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Wireless Internet News Dark Data Spyware Value Television Information Technology Storage Tech Terms Staffing Technology Efficiently Licensing Voice over IP Amazon Smart Technology Email Management HaaS Printer Server Tech Support Cortana Bring Your Own Device Printer iPhone Error Data loss Gadget Safety Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Cost Management Streaming Media Outlook Travel Business Intelligence The Internet of Things Regulation Sales Managed Service Provider Cleaning Printers Gadgets Budget Troubleshooting Physical Security Technology Tips Hybrid Cloud WiFi Managed IT Competition Customer Relationship Management Server Management IP Address Online Shopping Environment Big Data Ink Millennials Fun Customer Service Mobile Office Google Drive IT Support Hosted Solution Domains File Sharing User Tip Virtualization Autocorrect Machine Learning Copy Public Speaking Spam Blocking User Security Search Scheduling Tip of the week Server G Suite Windows 10 Presentation Telecommute VoIP Lithium-ion battery Emoji Mobile Security Paste Augmented Reality Business Technology Instagram Quick Tips Remote Computing Samsung Wireless Technology 5G Wearables Money Laptop Printing Conferencing Unified Communications IBM Network Attached Storage Managed IT Services Hacker eCommerce Operating System Paper Telecommuting Healthcare

Newsletter Sign Up