Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (502) 212-2525



Triad IT Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, October 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Unified Communications PowerPoint Internet Tip of the week Holiday Downloads Knowledge Sports Social Media e-waste Microsoft Teams Business Technology Data Protection SSD Technology Email Computers Vulnerability Gadgets Bring Your Own Device Mobile Security Specifications Remote Monitoring and Management iPhone IT budget Big Data Save Money Innovation Artificial Intelligence Conferencing Technology Tips Privacy How To Ransomware Business Networking Backup Maintenance Machine Learning Business Management Database Phishing Saving Money Printing HP Lead Generation Miscellaneous Streaming Media Hybrid Cloud Compliance Microsoft Office Android Server Movies Telephony Document Management Physical Security Analysis Content Filtering Tip of the Week Productivity Websites Thank You Blockchain Wi-Fi Edge Company Culture Office Internet of Things Settings Telecommuting Dongle Workers Data recovery Government Data Backup Voice over Internet Protocol Applications Remote Computing Tactics Business Computing Patch Management Outsourced IT Business Intelligence HIPAA Millennials Hackers Managing Stress User Tip Environment Office 365 Operating System Connectivity Tech Terms eCommerce Hard Drives Excel Value Bandwidth Cybercrime Tablet Twitter Hardware Inventory Network Attached Storage File Sharing Mobile Devices Smartphone Cloud Sales Managed IT services Cortana Paperless Office Network Battery Apple Ink Efficiency WiFi Data Breach Data Management Trends RAM IT Support Cables Backup and Disaster Recovery A.I. Hosted Solutions Browser G Suite Network Security Spyware User Security Congratulations Spam BDR Security Cloud Computing Gmail Password VPN Safety Amazon Voice over IP Users Computer Internet Explorer User Tips Microsoft WannaCry VoIp Communications Virtual Assistant Staff Data Smartphones Alert Small Business Chrome Laptop Passwords Collaboration Hard Drive IT Services Regulation Analytics Plug-In Wireless Processors Proactive IT Telecommute Marketing Reporting Wireless Charging Facebook Paper IT Management Google Tech Term Automation Employer-Employee Relationship Cost Management Online Shopping Windows 10 Router Best Practices disposal Server Management Cybersecurity Information Malware Managed Service Managed IT Services Workplace Tips Threat Apps Virtualization Data loss Software Managed IT Service Comparison Virus Digital Antivirus Communication Law Enforcement

Newsletter Sign Up