(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, OnSite I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (403) 210-2927 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 14 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Internet Privacy Cybersecurity Smartphones Communication Cloud Malware Browser Efficiency User Tips Wi-Fi Microsoft Passwords Android Productivity Hardware Email Hosted Solutions Data Communications Small Business Software Managed IT services Network Ransomware Windows 10 Users Saving Money Mobile Device Google VoIP Internet of Things Mobile Devices Outsourced IT Business Intelligence Data Backup Business Management Managed IT Services Collaboration Marketing Information Applications Blockchain Innovation Employer-Employee Relationship Data recovery Backup Social Media Business Wireless Networking IT Support Workplace Tips Remote Computing Compliance Artificial Intelligence Government Managed IT Service Computer Connectivity Cortana Virtual Assistant Bandwidth Hackers VPN BDR Data Protection Cloud Computing Smartphone IT Services Phishing Cost Management Save Money Miscellaneous Data Breach Data Management Patch Management Excel Computers Managed Service Virtualization Gmail Analytics Router Wireless Charging Automation Tech Terms GDPR How To IT budget Inventory e-waste Cables Tablet Hard Drive Virus Printing Server Company Culture User Security Profitability Lead Generation Paperless Office Dongle Movies Microsoft Office 365 Online Shopping Network Attached Storage Tactics Plug-In Specifications Antivirus Storage Apple Telecommuting Mobile Security disposal Voice over Internet Protocol Knowledge Processors Paper Physical Security Backup and Disaster Recovery Managing Stress Eliminating Downtime Machine Learning Digital Apps Safety Access Control Law Enforcement Telephony Password Proactive IT Conferencing Vulnerability Staff Streaming Media Dark Web iPhone Workers Operating System Value Ink Reporting Tip of the week Laptop SSD Microsoft Office G Suite Business Technology BYOD Gadgets Office Edge Unified Communications Authentication Voice over IP Troubleshooting Settings Maintenance Remote Monitoring and Management Spyware Downloads Error Millennials IT Management Big Data PowerPoint Medical IT User Tip Facebook Office 365 Bring Your Own Device Wireless Internet WannaCry Telecommute Content Filtering RAM Authorization File Sharing Holiday Update Battery Server Management Internet Explorer Analysis HP Websites Trends Database Amazon Sports SaaS Twitter Environment Hybrid Cloud Sales HIPAA Data loss Technology Tips Microsoft Teams eCommerce Outlook Spam Threat Document Management A.I. Touchscreen Chrome Cybercrime Hard Drives Comparison Public Speaking Search Presentation Two-factor Authentication Lithium-ion battery Disaster Recovery Augmented Reality Regulation Wireless Technology 5G Tech Support Printers IBM Alert Hacker The Internet of Things Productivity Managed Service Provider Budget Hiring/Firing Competition Customer Relationship Management IP Address Website Fun Customer Service Mobile Office Upgrade Remote Monitoring Domains Quick Tips Mobile Device Management Windows 10