(403) 210-2927    Get SUPPORT

OnSite I.T. Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, OnSite I.T. is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (403) 210-2927 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Productivity Privacy Tech Term Smartphones Efficiency Internet Cybersecurity Malware Hardware Microsoft Browser Innovation Cloud Android Mobile Device Email Data Passwords Communication Google IT Support Collaboration Network Communications Ransomware Mobile Devices Windows 10 Wi-Fi Small Business Software Data Backup Hosted Solutions Users Business Management Backup Saving Money Business Managed IT services Wireless IT Services Applications Holiday Internet of Things Data recovery Marketing Networking Hackers Outsourced IT Business Intelligence Managed IT Services Information Social Media Smartphone VoIP Cloud Computing Workplace Tips Blockchain Employer-Employee Relationship Analytics Connectivity Wireless Charging Automation Remote Computing Tech Terms Microsoft Office Access Control Government Managed IT Service Artificial Intelligence Office 365 G Suite Remote Monitoring and Management Miscellaneous Cortana Virtual Assistant Medical IT Password Cost Management Bandwidth Data Protection VPN BDR Phishing Managed Service Facebook Computer Mobility Data Breach Patch Management Save Money Excel Compliance Data Management Data Security Computers Router Apps Virtualization Gmail Technology Tips Chrome Storage Wireless Internet Hard Drives Comparison disposal Voice over Internet Protocol How To Paper Update Gadgets Tablet Managing Stress Document Management Personal Information Proactive IT IT budget Inventory User Security Hard Drive Virus Security Cameras Server Big Data Streaming Media Dark Web Lead Generation Help Desk Specifications Value Apple Telecommuting Ink Reporting Online Shopping Network Attached Storage Outlook Knowledge Paperless Office Dongle E-Commerce Maintenance Mobile Security Unified Communications Authentication Processors Antivirus Word Physical Security Backup and Disaster Recovery Upgrade Law Enforcement Telephony Downloads Error Machine Learning Business Continuity Conferencing iPhone Workers PowerPoint Profitability Bring Your Own Device Digital Payment Tip of the week Internet Explorer Analysis Operating System Spam Business Technology RAM Authorization Vulnerability Staff Wearables Laptop SSD Voice over IP Trends Certification Office Database Amazon Millennials Sports SaaS Settings Eliminating Downtime Environment Hybrid Cloud Edge instant Messaging User Tip Threat IT Management Microsoft Teams Spyware Healthcare Cybercrime File Sharing A.I. Touchscreen WannaCry Telecommute Content Filtering Vulnerabilities GDPR Battery Server Management BYOD e-waste Cables Printing Troubleshooting Sales Company Culture HP Websites Tactics Plug-In Twitter eCommerce Movies Microsoft Office 365 HIPAA Data loss Training Safety Cryptocurrency The Internet of Things Productivity Hacker Regulation Budget Search Alert Customer Relationship Management Competition IP Address Website Customer Service Mobile Office Domains Managed Service Provider Disaster Recovery Windows 10 Mobile Device Management Hiring/Firing Public Speaking Printers Two-factor Authentication Fun Quick Tips Presentation Lithium-ion battery Augmented Reality Remote Monitoring Tech Support Wireless Technology 5G IBM