Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (502) 212-2525



Triad IT Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

e-waste Conferencing Battery Virtual Assistant Tablet Tactics File Sharing Internet of Things Google Network Attached Storage Productivity Technology Workers Virtualization Hosted Solutions Microsoft Cybersecurity Managed Service Hardware Data Protection Reporting Laptop Privacy A.I. Printing Hard Drive Specifications Small Business Blockchain Safety Wi-Fi Ink Smartphone Value User Tips BDR Efficiency Gmail Hackers Backup Sports Business Computing Artificial Intelligence RAM WiFi Password Maintenance Data Management Voice over Internet Protocol Hybrid Cloud Social Media Office 365 Comparison Patch Management Lead Generation Managed IT Services Phishing Cost Management WannaCry Email Telecommute Database Backup and Disaster Recovery Business Workplace Tips Sales Holiday Data recovery Document Management eCommerce Information Computers Innovation Spam Company Culture IT budget Router HP Knowledge VoIp Automation Apps Telephony Big Data Saving Money Processors Data loss Best Practices Bring Your Own Device Cloud Computing Ransomware Operating System Apple Paperless Office Server Management Managed IT Service Cybercrime Data Breach Remote Computing Movies How To Excel Inventory Tip of the week Collaboration Alert Vulnerability Smartphones Business Management Facebook Computer Technology Tips Business Intelligence User Security Managing Stress Mobile Security Antivirus Microsoft Teams Cables PowerPoint VPN Marketing Compliance Streaming Media Tip of the Week Paper Malware IT Management HIPAA Internet Explorer IT Services Environment Online Shopping Cloud Regulation Browser Downloads Thank You Software Websites Telecommuting Physical Security Microsoft Office Hard Drives Analytics Remote Monitoring and Management Windows 10 Law Enforcement Millennials Miscellaneous Network Security Save Money Virus Mobile Devices Tech Terms Threat Communications Content Filtering Edge IT Support Trends Wireless Charging Chrome Congratulations Android Networking disposal Twitter Analysis Office Data Staff Network Employer-Employee Relationship Cortana Gadgets G Suite Bandwidth Managed IT services Internet Wireless Plug-In Proactive IT Security Tech Term Machine Learning Applications Spyware Digital Server Amazon Business Technology Outsourced IT Government User Tip iPhone Connectivity Communication Passwords SSD Voice over IP Settings Users Data Backup Dongle Unified Communications

Newsletter Sign Up