• Register

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Data Net is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at (760) 466-1200 to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, July 21, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Business Computing Privacy Network Security Technology Cybersecurity Communications Tech Term Android Smartphones Malware Hardware Microsoft Cloud Internet Managed IT services Wi-Fi Ransomware Email VoIp Mobile Devices Software Backup Business Management Social Media Data IT Support Small Business Patch Management Productivity Employer-Employee Relationship Applications Passwords Hackers Internet of Things Scam Data Breach Gmail Artificial Intelligence Save Money Computer Wireless IT Services Google Business Word Outsourced IT Cortana VPN Router Innovation Smartphone Virus Government Remote Computing How To Collaboration Wireless Charging Windows 10 Data Management Network Saving Money Managed IT Service Blockchain Virtual Assistant Business Intelligence Physical Security Phishing Communication Browser Cloud Computing Tech Terms Cost Management Computers Data Protection Excel Networking Chrome HP Spam User Security Telephony IT budget Twitter Hybrid Cloud WannaCry Cybercrime Microsoft Office Printing Hosted Solutions Workers Data Backup Apple Microsoft Teams Comparison Marketing Users Tip of the week Dongle A.I. Password e-waste Congratulations HIPAA Document Management Antivirus Botnet Connectivity Business Technology Voice over IP Inventory Travel Cables Machine Learning Tactics Paper File Sharing Millennials Laptop Backup and Disaster Recovery iPhone Company Culture Specifications WhatsApp Workplace Tips Bandwidth Website Movies Knowledge Battery Efficiency disposal Hard Drive Paperless Office Staff Remote Monitoring Apps Holiday IT Management Mobile Security Education Voice over Internet Protocol News Ink Hard Drives Licensing Managing Stress Conferencing Lead Generation Maintenance Plug-In Analytics BDR Server Management Value Processors Digital Websites Retail Streaming Media eCommerce Operating System Live Streaming Telecommute Telephone System PowerPoint SSD Tech Support G Suite Office Internet Explorer Proactive IT Law Enforcement Telecommuting Data recovery Unified Communications User Tips Virtualization Information User Tip Spyware Safety Remote Support Downloads Sales Online Shopping Data loss Cleaning Sports Miscellaneous Office 365 Facebook Alert Vulnerability Bring Your Own Device Content Filtering Database Threat Remote Monitoring and Management Big Data Technology Tips Access Control RAM Server Automation Amazon Managed IT Services Edge Trends Tablet Settings Network Attached Storage Environment Analysis Managed Service Gadgets WiFi Thank You

Latest News & Events

Please join us in congratulating Bill Vann on his promotion to Customer Success Manager....

Contact Us

Learn more about what Data Net can do for your business.

Call Us Today
Call us today
(760) 466-1200

5795 Kearny Villa Road
San Diego, California 92123