Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

Since 1998, Triad IT has been providing IT Support such as technical helpdesk support, computer support, and consulting to businesses of all sizes all over the world.

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Sales Gadgets Android Smartphones Movies Hybrid Cloud Workplace Tips Lead Generation Dongle User Security Hackers IT Management VPN Office Employer-Employee Relationship iPhone Telecommute Twitter Information Windows 10 Managed IT services Facebook Unified Communications Gmail Automation Privacy Backup and Disaster Recovery Networking Vulnerability Cybersecurity Microsoft Office SSD Value Trends Maintenance Network Security Mobile Security Voice over IP BDR Internet e-waste A.I. Cortana Comparison Collaboration Spyware Security Communications Virtualization Innovation Antivirus Wireless Charging Cables Internet of Things Virtual Assistant Streaming Media Thank You Machine Learning IT Support Managed Service Apps Specifications HP VoIp Server Management Data loss Blockchain eCommerce Data Management Analysis IT Services Alert Users Phishing Mobile Devices Telephony Microsoft Productivity Websites Managed IT Service Router Holiday Save Money Ransomware Processors Cost Management Backup Tablet File Sharing Social Media Bandwidth Remote Computing Proactive IT PowerPoint Computer Law Enforcement Data Analytics Company Culture G Suite Excel Voice over Internet Protocol Downloads Managing Stress Database Laptop Knowledge Outsourced IT Computers Plug-In Google Conferencing Patch Management Malware Document Management Ink Internet Explorer Chrome Amazon Tech Terms User Tip Big Data Microsoft Teams Digital Server Inventory Business Management Data Backup Hardware Congratulations Smartphone Environment Battery Business Technology Printing Operating System Apple Data Protection Wi-Fi Technology Millennials Network Attached Storage Network Spam Virus Artificial Intelligence Office 365 Managed IT Services Efficiency disposal Remote Monitoring and Management Physical Security WiFi Passwords Settings Software Workers Telecommuting Cybercrime Business Intelligence Paper Browser Business Computing Paperless Office Tech Term Data Breach HIPAA Wireless Edge How To Safety Email Hard Drives Best Practices Sports Online Shopping Hard Drive Communication Data recovery Staff Tip of the week Bring Your Own Device Content Filtering Miscellaneous Saving Money Password Small Business Threat Hosted Solutions Tip of the Week Government Cloud Computing Applications Marketing WannaCry Connectivity User Tips Tactics IT budget Technology Tips Cloud RAM Business

Newsletter Sign Up