(415) 246-0101

Microtechs Blog

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Microtechs is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (415) 246-0101 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Tech Term Network Security Cybersecurity Smartphones Hardware Malware Managed IT services Communications Communication Data Passwords Microsoft Wi-Fi Android Ransomware Cloud Internet Email Applications Business Management Employer-Employee Relationship Backup Google Business Intelligence Blockchain Software Small Business Network Hosted Solutions Social Media Saving Money Mobile Devices IT Support Government Smartphone Data Backup Excel Router Managed IT Service Computer Wireless Charging Data Breach Analytics Patch Management BDR Internet of Things Virtual Assistant Efficiency Automation Virtualization Data Protection Innovation Gmail Cortana Data recovery Artificial Intelligence Data Management Browser IT Services Windows 10 Compliance Networking Tech Terms Productivity Wireless Computers Outsourced IT Remote Computing Collaboration VPN VoIp Information Phishing User Tips Business Cost Management Save Money Tablet Remote Monitoring and Management Staff Internet Explorer Battery IT budget Facebook Telecommuting Unified Communications Document Management Amazon Telecommute Database eCommerce Physical Security Office Dark Web Managed IT Services Downloads Hard Drive Reporting Bandwidth Sports Lead Generation Password Hybrid Cloud Environment Microsoft Office Cloud Computing Threat Law Enforcement Microsoft Teams Twitter RAM Paperless Office Users Data loss Cybercrime Online Shopping Laptop Content Filtering Backup and Disaster Recovery Tip of the week Trends Processors Business Technology Medical IT Cables e-waste Office 365 Knowledge Analysis Websites Printing IT Management User Tip Company Culture Inventory Workers Digital Workplace Tips Spam Tactics Hard Drives A.I. Vulnerability disposal Telephony How To Comparison SaaS Connectivity Miscellaneous Voice over Internet Protocol Managed Service Safety Paper Server Managing Stress Mobile Security Millennials Plug-In Virus Settings SSD Movies Spyware Machine Learning Value Voice over IP Big Data Apple Specifications GDPR Hackers Apps WannaCry User Security Ink Marketing G Suite Operating System Edge Proactive IT Antivirus Maintenance Chrome HP Sales Holiday iPhone Conferencing Storage Technology Tips Streaming Media HIPAA Dongle PowerPoint Network Attached Storage File Sharing Bring Your Own Device Server Management Thank You Error Congratulations Gadgets Alert Regulation