Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, October 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Threat Antivirus Blockchain SSD Cybersecurity Virtual Assistant Operating System Streaming Media Conferencing Alert WannaCry Voice over IP Hard Drives Twitter Amazon Government Best Practices Managing Stress Online Shopping Movies Virus Proactive IT Cloud Bandwidth Windows 10 Spam File Sharing Networking Remote Monitoring and Management Telephony Email User Tip Router Office Downloads Plug-In Managed IT Service Employer-Employee Relationship Network Automation VoIp Workplace Tips Computers IT budget Ransomware Knowledge Managed IT services Paperless Office Applications Browser Gadgets Network Attached Storage Artificial Intelligence Inventory Business Technology Backup and Disaster Recovery Business Intelligence Unified Communications Document Management Computer Websites Business Outsourced IT Sales Telecommute Patch Management Apple Settings Maintenance IT Support Data Collaboration e-waste Productivity Data Backup Communications Cost Management Tech Terms Machine Learning Lead Generation Big Data Internet of Things Network Security Ink G Suite Internet Explorer Processors Tablet Microsoft Teams Data Management Cybercrime iPhone Information VPN Hybrid Cloud Voice over Internet Protocol Android Staff Software Tip of the Week Data loss Excel Cloud Computing BDR Innovation Business Management Paper Facebook IT Management Vulnerability Server Management Business Computing Compliance Microsoft Office Safety Mobile Security Analysis Hardware Laptop Data Breach Hosted Solutions Content Filtering Virtualization Digital Regulation Google RAM Password Chrome Technology Tips Small Business Telecommuting disposal Gmail Specifications WiFi Data Protection Security Smartphone Edge User Tips Remote Computing Server Social Media Company Culture Hard Drive Smartphones Thank You Congratulations Managed Service Tip of the week Law Enforcement Miscellaneous Malware PowerPoint Trends Sports Data recovery Holiday Physical Security Backup Millennials Users Value Tech Term Communication Bring Your Own Device Cables Tactics eCommerce Battery Comparison Privacy Environment Mobile Devices Wireless Apps Passwords Hackers Workers Dongle Microsoft Cortana Connectivity A.I. User Security Reporting How To Internet Save Money Phishing Saving Money Managed IT Services Spyware IT Services Analytics Printing Wireless Charging Marketing HP Wi-Fi Efficiency Database HIPAA Office 365 Technology

Newsletter Sign Up