Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (502) 212-2525



Triad IT Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Triad IT is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (502) 212-2525 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Office HP Computers Millennials Remote Monitoring and Management G Suite Telecommute Smartphones Microsoft Teams Battery Patch Management Internet of Things Malware Social Media Analytics VPN Business Management Threat Technology Collaboration Remote Computing Analysis File Sharing Operating System Processors Telecommuting VoIp Virus iPhone Data loss Marketing Communications Server Management Workplace Tips Cybercrime Microsoft Passwords Settings Internet Wireless Charging Apple Machine Learning Facebook Database Connectivity Android Networking Plug-In Managed Service Managed IT Services Safety Lead Generation Cortana Managing Stress Mobile Security Regulation Cloud Dongle Gmail IT budget Ransomware Value Conferencing Trends Sports Microsoft Office Spyware Streaming Media Virtual Assistant Thank You Server Blockchain Knowledge Proactive IT Data User Security Cybersecurity Artificial Intelligence disposal HIPAA Movies Data Backup Laptop Google Best Practices Productivity WiFi Websites Windows 10 RAM Content Filtering Twitter A.I. Voice over Internet Protocol Computer Data Breach Office 365 Ink Bring Your Own Device Voice over IP WannaCry IT Support Antivirus Backup Spam Workers Phishing Digital Business Intelligence BDR Big Data Paperless Office Alert Cost Management Hackers Business Specifications Data Management Managed IT Service Technology Tips Apps Saving Money Internet Explorer Tech Terms Browser Hardware User Tip Employer-Employee Relationship Hosted Solutions Edge Mobile Devices Cloud Computing Reporting Tip of the week Miscellaneous IT Management Network Managed IT services Hard Drives Online Shopping Backup and Disaster Recovery Printing Bandwidth Tactics Chrome e-waste Sales Network Attached Storage Unified Communications Data recovery Telephony Virtualization Document Management Environment Smartphone Excel Gadgets Router Wi-Fi Downloads Paper Network Security Tip of the Week Automation Vulnerability Comparison Communication Small Business IT Services Data Protection User Tips Hard Drive Password Users Congratulations Privacy Security Hybrid Cloud Staff Outsourced IT Compliance Amazon Email Innovation Company Culture How To Wireless Information eCommerce Law Enforcement Business Computing Tech Term Applications Government Business Technology Inventory Software Maintenance SSD Physical Security Efficiency Holiday Cables Tablet PowerPoint Save Money

Newsletter Sign Up