Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Intro to Your Tech: Protocol

Intro to Your Tech: Protocol

Hypertext Transfer Protocol Secure. Transmission Control Protocol/Internet Protocol. File Transfer Protocol. Internet Message Access Protocol. Post Office Protocol. While it may not be outwardly apparent, we certainly rely on quite a few protocols in order to use our computers and more directly, the Internet, as we do. Today, we’ll introduce you to what a protocol actually is.

Simply Put, a Rule
As you read this, glance up to the address bar at the top of your screen. Chances are, you’ll see the website’s name, sure, and the fact that it’s on the world wide web, and at the very front, the protocol - the letters immediately before the colon-double backslash. These letters indicate how the information you’re reading on your display was sent from its source to your device.

For example, the two most familiar protocols are HTTP and HTTPS, Hypertext Transfer Protocol and Hypertext Transfer Protocol Secure. Both indicate that a hypertext page is used to transmit information from the source to a web surfer’s browser, but only HTTPS has added security against unwanted spying.

Why Use Protocols?
Think of it this way - two kids are playing catch, but while one throws a baseball, the other is ready to catch a Frisbee. Clearly, this approach isn’t going to work. The situation would be essentially the same if one computer sent information in 8-bit packets while the other was anticipating 16-bit packets.

In order to ensure that information reaches the recipient from the sender, protocols are used to determine beyond any doubt how that information is going to be ferried so that it will be successfully received.

Is This Important to the Average User?
Honestly, unless you are interested in programming or network administration, there isn’t much point in knowing about protocols beyond casual curiosity. After all, Out of the Box Solutions is here to know these kinds of things about your technology so that we can more effectively manage it on your behalf. Give us a call at 800-750-4OBS (4627) to get started.

Stress Makes Your Employees and Business Suffer
5 Basic Steps to Building a Better Backup Strategy
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Business Computing Network Security Privacy Technology Cybersecurity Tech Term Hardware Communications Smartphones Ransomware Internet Android Mobile Devices Applications Malware Microsoft IT Support Backup Data Business Management Managed IT services Email Employer-Employee Relationship Small Business Wi-Fi Networking Tech Terms Outsourced IT Patch Management Virtual Assistant Social Media Productivity Cortana Collaboration Innovation Passwords Windows 10 Blockchain Network Internet of Things Computers Wireless Communication Cloud Save Money Managed IT Service Saving Money Remote Computing Computer Cost Management Wireless Charging Artificial Intelligence Business Intelligence VPN Gmail VoIp Data Management Business IT Services Printing Trends Millennials Holiday SSD Bring Your Own Device Value Lead Generation Telecommute Document Management Users Business Technology Paper Dongle A.I. Physical Security eCommerce Network Attached Storage Facebook Hybrid Cloud Smartphone Managed IT Services Paperless Office Ink Bandwidth Movies Laptop Online Shopping Password Twitter Cables Database Data loss Tip of the week Digital PowerPoint Government Phishing Efficiency Comparison Inventory Voice over Internet Protocol Cybercrime WannaCry Spam User Tip Browser Sports BDR Unified Communications Data Breach Settings Server Management Specifications Software Data Protection Tactics HIPAA Virus Edge Marketing Sales Data recovery RAM Mobile Security Information Hard Drive Antivirus IT budget Tablet Connectivity Hackers Microsoft Teams Operating System Amazon Battery Automation Conferencing Maintenance Processors Staff Excel Apps Technology Tips Company Culture Workplace Tips Office Router Vulnerability Cloud Computing Telecommuting Analytics Office 365 Knowledge Data Backup Managing Stress Environment Virtualization Machine Learning Content Filtering Internet Explorer Spyware Websites Streaming Media Telephony IT Management Backup and Disaster Recovery Google e-waste Server Threat HP Safety Downloads Workers Big Data Voice over IP User Tips Hard Drives G Suite disposal Alert Plug-In Proactive IT Remote Monitoring and Management Gadgets