(415) 246-0101

Microtechs Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Microtechs is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (415) 246-0101 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, December 11 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy User Tips Internet Cybersecurity Smartphones Browser Microsoft Communication Productivity Cloud Malware Efficiency Hardware Android Email Passwords Wi-Fi Google IT Support Managed IT services Ransomware Communications Network Applications Data Backup Backup Software IT Services Windows 10 Small Business Users Data Data recovery Business Management Hosted Solutions Saving Money Mobile Device Social Media Collaboration Innovation Business Intelligence Blockchain Marketing Information Cloud Computing Wireless Mobile Devices Business Internet of Things Managed IT Services Employer-Employee Relationship Outsourced IT VoIp Workplace Tips Networking Government Managed Service Smartphone VPN Data Management Cost Management Router Excel Computer Compliance Data Breach Tech Terms Bandwidth Patch Management Data Protection Remote Computing Computers Gmail Cortana Remote Monitoring and Management Automation Miscellaneous Save Money BDR Artificial Intelligence Managed IT Service Connectivity Wireless Charging Virtual Assistant Analytics Hackers Apps Virtualization Phishing Managing Stress Vulnerability Antivirus Maintenance Tablet Office Touchscreen Plug-In Business Continuity Telephony Technology Tips Streaming Media GDPR Server Server Management Profitability Millennials Dongle PowerPoint Facebook Unified Communications Law Enforcement G Suite Spyware Staff Internet Explorer Settings Content Filtering Microsoft Office 365 WannaCry Telecommute Database Business Technology Proactive IT Upgrade Voice over IP Big Data Downloads Storage Environment Eliminating Downtime Edge Sports Twitter RAM User Tip Bring Your Own Device HP Threat Knowledge Backup and Disaster Recovery Trends Access Control HIPAA Data loss Cybercrime Holiday Dark Web Network Attached Storage e-waste Gadgets Amazon BYOD How To Comparison IT budget Inventory Hybrid Cloud Troubleshooting Telecommuting Document Management Websites Printing Reporting Battery Hard Drives A.I. Microsoft Teams Authentication Hard Drive Spam Tactics Microsoft Office eCommerce Physical Security Error Lead Generation Password disposal User Security Wireless Internet Apple Specifications Mobile Security Cables Update Paperless Office Safety Paper Medical IT SSD Movies Chrome Company Culture Authorization Tip of the week Processors Virus Sales Analysis Online Shopping Laptop Conferencing Machine Learning Value Help Desk Office 365 iPhone IT Management Operating System File Sharing Voice over Internet Protocol Outlook Workers Digital Ink SaaS Quick Tips Thank You Disaster Recovery Congratulations Printers Regulation Certification Alert