(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, OnSite I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (403) 210-2927 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, September 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Technology Tech Term Privacy Cybersecurity Smartphones Network Security Malware Hardware Internet Passwords Cloud Android Managed IT services User Tips Ransomware Google Wi-Fi Hosted Solutions Microsoft Communication Data Communications Business Intelligence Software Business Management Browser Applications Innovation Employer-Employee Relationship Backup Productivity Saving Money Efficiency Social Media Blockchain IT Support Mobile Devices Collaboration Email Network Small Business Data Backup Information Artificial Intelligence Cost Management Marketing Hackers Data Protection Virtual Assistant Mobile Device Smartphone IT Services Bandwidth Windows 10 Phishing VPN Data Breach Patch Management Internet of Things BDR Business Compliance Cloud Computing Excel Router Wireless Virtualization Gmail Save Money Data recovery VoIP Data Management Remote Computing Computers Outsourced IT Government Managed IT Service Wireless Charging Automation Computer Analytics Tech Terms Networking Cortana Law Enforcement Telephony Apps Safety Lead Generation Conferencing Downloads Error iPhone Workers Bring Your Own Device Online Shopping Network Attached Storage PowerPoint Medical IT Paperless Office Dongle Mobile Security Business Technology Internet Explorer Analysis Microsoft Office Processors Antivirus Tip of the week Gadgets RAM Authorization Physical Security Backup and Disaster Recovery Voice over IP Database Amazon Machine Learning Office Trends Millennials Environment Hybrid Cloud Password Sports Big Data SaaS Digital Microsoft Teams Operating System Threat Managed Service Office 365 Vulnerability Staff User Tip Users Laptop SSD File Sharing Holiday Cybercrime Workplace Tips Miscellaneous Content Filtering A.I. Touchscreen e-waste Cables Settings GDPR Edge Company Culture IT Management Sales Printing Spyware Facebook eCommerce Tactics Plug-In WannaCry Telecommute Movies Spam Microsoft Office 365 Chrome disposal Voice over Internet Protocol Battery Server Management Hard Drives Comparison Connectivity Storage Managing Stress Tablet Paper HP Websites How To Twitter User Security Proactive IT HIPAA Data loss Server Access Control Value Specifications Streaming Media Dark Web Technology Tips Telecommuting G Suite Knowledge Ink Reporting Document Management Apple IT budget Inventory Maintenance Remote Monitoring and Management Hard Drive Virus Managed IT Services Unified Communications Authentication IBM Hacker Managed Service Provider The Internet of Things Productivity Budget Competition Hiring/Firing Customer Relationship Management IP Address Quick Tips Fun Website Customer Service Mobile Office Remote Monitoring Upgrade Domains Disaster Recovery Mobile Device Management Windows 10 Search Public Speaking Regulation Alert Presentation Printers Two-factor Authentication Lithium-ion battery Augmented Reality Wireless Technology 5G Tech Support