(415) 246-0101

Microtechs Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Microtechs is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (415) 246-0101 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, October 17 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy Cybersecurity Smartphones Malware Cloud Internet Efficiency Android User Tips Communication Hardware Browser Passwords Productivity Google Data Small Business Hosted Solutions Saving Money Ransomware Managed IT services Communications Microsoft Wi-Fi Backup IT Support Windows 10 Business Management Employer-Employee Relationship Software Social Media Collaboration Users VoIp Innovation Business Intelligence Workplace Tips Mobile Device Email Blockchain Applications Network Mobile Devices Artificial Intelligence Business Data recovery Data Protection Save Money Information Cortana Gmail Miscellaneous Managed IT Services Hackers Managed IT Service Wireless Charging Networking IT Services Analytics VPN Virtual Assistant Cost Management Virtualization Outsourced IT Phishing Data Backup Data Management Bandwidth Government Cloud Computing Smartphone Router Excel Automation Marketing Computer Tech Terms BDR Internet of Things Wireless Computers Remote Computing Data Breach Compliance Patch Management disposal Proactive IT Knowledge Network Attached Storage Connectivity Microsoft Office 365 User Tip Mobile Security Battery IT budget Safety Paper Storage Telecommuting Document Management Bring Your Own Device Gadgets eCommerce Physical Security Virus How To Hard Drive Comparison SSD Movies Machine Learning Value Remote Monitoring and Management Lead Generation Password Apps Access Control Operating System Amazon Ink Dark Web Paperless Office Hybrid Cloud Troubleshooting Online Shopping User Security Laptop Antivirus Maintenance Reporting Tip of the week Apple Processors Specifications Microsoft Office Technology Tips Streaming Media Microsoft Teams Authentication Office 365 Server Management Sales IT Management Dongle PowerPoint Error Workers Chrome Digital Unified Communications Cables Update Staff Internet Explorer Medical IT iPhone Vulnerability Conferencing Facebook Telephony File Sharing Telecommute Database Analysis Downloads Company Culture Authorization Environment Server Tablet Sports Millennials Twitter RAM Voice over Internet Protocol Settings Threat SaaS Spyware Office Voice over IP Big Data Data loss Cybercrime Managed Service WannaCry Backup and Disaster Recovery Trends Managing Stress e-waste Plug-In Touchscreen Law Enforcement Edge Inventory Business Technology Websites Printing GDPR HP Content Filtering G Suite Holiday Spam Tactics HIPAA Hard Drives A.I. Printers Alert Regulation Outlook Quick Tips Thank You Disaster Recovery Congratulations