Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Data Breach Server Regulation Settings Users Saving Money Mobile Devices Content Filtering Tip of the week Law Enforcement WiFi Microsoft Teams Printing Battery e-waste Bring Your Own Device Bandwidth Conferencing Social Media Efficiency Dongle Antivirus Browser Environment Operating System A.I. Tech Term Office HP Ink Cybercrime Business Intelligence Software Smartphone WannaCry Managing Stress Hybrid Cloud Miscellaneous Data Protection Physical Security Telecommute Apps Business Management User Security Malware Computers VoIp Wi-Fi Networking Online Shopping IT Services Privacy Tech Terms IT Management Managed IT Service Productivity Movies Specifications Router Holiday Passwords Websites Best Practices Gmail Staff disposal Cost Management Business Marketing Password Voice over Internet Protocol Save Money Security Laptop Blockchain Comparison Paperless Office Cables Trends Amazon Wireless Charging Telecommuting Spyware Smartphones Internet Explorer Threat Digital Microsoft Office Collaboration Virtual Assistant Twitter IT Support Government Edge Hard Drive Downloads Mobile Security Outsourced IT Workers Spam Machine Learning Remote Monitoring and Management Chrome Technology Tips Network Attached Storage Computer Sales Hardware Plug-In User Tips Hard Drives Telephony Workplace Tips Data Cybersecurity Virtualization Data Backup Data recovery Connectivity Internet Remote Computing Business Technology Backup Vulnerability Google Data Management Paper Business Computing SSD Tip of the Week Wireless Managed Service Android Facebook Cloud Computing Phishing Network Streaming Media File Sharing Email RAM Automation Virus Tactics Maintenance Thank You Value Backup and Disaster Recovery Managed IT Services Communications eCommerce Lead Generation Safety iPhone Proactive IT Employer-Employee Relationship Innovation Server Management Analysis Compliance Gadgets Data loss Technology Document Management Analytics Ransomware Knowledge BDR Windows 10 Cortana How To Office 365 Tablet G Suite Alert Patch Management Communication PowerPoint Internet of Things Cloud Big Data Small Business Hackers Information Excel Inventory Voice over IP Apple Network Security Microsoft User Tip Managed IT services Applications Reporting Congratulations Artificial Intelligence Unified Communications Millennials Sports VPN Processors HIPAA IT budget Company Culture Database Hosted Solutions

Newsletter Sign Up