(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

OnSite I.T. has been serving the Alberta area since , providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, OnSite I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (403) 210-2927 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, July 20 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Network Security Business Computing Privacy Technology Tech Term Cybersecurity Smartphones Hardware Communications Android Internet Wi-Fi Ransomware Malware Backup Mobile Devices Email Data Small Business Employer-Employee Relationship IT Support Business Management Cloud Managed IT services Microsoft Passwords Applications Router Tech Terms Cost Management Saving Money Excel Business Intelligence Remote Computing Collaboration Blockchain Smartphone Windows 10 Network Browser Data Breach Computers Productivity Wireless Charging Innovation Gmail Google Social Media Artificial Intelligence Business Wireless Outsourced IT Government Managed IT Service Virtual Assistant VoIP Internet of Things Networking Computer Cortana VPN Communication Data Protection Software Save Money IT Services Data Management Patch Management Phishing Office 365 Downloads Analytics BDR Bring Your Own Device eCommerce Internet Explorer Hard Drive Comparison Trends Data recovery User Security Hard Drives Hybrid Cloud Network Attached Storage Spam Environment Online Shopping Threat Processors Specifications How To A.I. Physical Security Technology Tips Telecommuting Hosted Solutions Cables Password e-waste Printing Vulnerability Virus Conferencing Apple Movies Laptop Data Backup Workers Business Technology Voice over Internet Protocol Efficiency disposal Settings Safety Paper Spyware Apps Antivirus Office iPhone Backup and Disaster Recovery Millennials Battery Server Management Value Ink HP Staff Content Filtering Unified Communications Big Data SSD Users Sales Information Automation Miscellaneous PowerPoint Document Management User Tips Cloud Computing Chrome RAM IT budget Facebook Database Lead Generation Tablet Virtualization Amazon Sports Paperless Office Websites Microsoft Teams Twitter Cybercrime Knowledge Server Workplace Tips Machine Learning Digital Managed IT Services Law Enforcement Company Culture Inventory Telephony Tactics Plug-In Connectivity Edge Dongle Tip of the week Managing Stress IT Management Mobile Security Voice over IP WannaCry Marketing Telecommute Streaming Media Hackers Bandwidth User Tip File Sharing G Suite Operating System Holiday Maintenance HIPAA Data loss Website Remote Monitoring Customer Service Mobile Office Domains Mobile Device Management Public Speaking Two-factor Authentication Lithium-ion battery Augmented Reality Tech Support Productivity The Internet of Things Gadgets Hiring/Firing Budget Competition Fun Upgrade Search Windows 10 Presentation 5G Wireless Technology Managed Service Provider IBM Alert Proactive IT Hacker Microsoft Office Customer Relationship Management Remote Monitoring and Management IP Address