Hardware  >   Networking Hardware  >   LAN Hardware  >  

Transceivers

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: Also see repeater and transponder.A transceiver is a combination transmitter/receiver in a singlepackage. The term applies to wirelesscommunications devices such as cellular telephones, cordless telephone sets, handheld two-way radios, and mobile two-way radios.Occasionally the term is used in reference to transmitter/receiver devices in cable or optical fiber systems.In a radio transceiver, the receiver  … 
Definition continues below.
TransceiversReports
226 - 250 of 418 Matches Previous Page  | Next Page
IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Keeping Up With Network Needs: Five WLAN Questions Answered
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchNetworking.com, wireless expert Lisa A. Phifer takes a look at the top challenges facing the WLAN environment and answers our readers' top after-implementation WLAN questions regarding issues plaguing today's network engineers.
Posted: 12 Feb 2013 | Published: 12 Feb 2013

SearchSecurity.com

Leverage Pay As You Grow Licensing for Network Expansion
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores the benefits of an innovative scaling model called "Pay-As-You-Grow" licensing. This method introduces three different SKUs within a single fixed form factor switch. This fabric switch allows you to choose to build 3 different types of fabrics depending on what you need.
Posted: 09 Sep 2014 | Published: 31 Jul 2014

Dell, Inc.

Lowering Your Network Support Costs Can’t Be Done Blindfolded
sponsored by Dimension Data
WHITE PAPER: This whitepaper discusses the importance of getting a full understanding of your data center infrastructure so you can adjust operation to cut costs.
Posted: 06 Feb 2014 | Published: 06 Feb 2014

Dimension Data

MicroScope December 2014: An issue covering the virtualization and VDI markets
sponsored by MicroScope
EZINE: An issue highlighting the opportunities for the channel in the virtualization market and the VDI arena.
Posted: 13 Nov 2014 | Published: 11 Dec 2014

MicroScope

IT Briefing - Desktop and Application Virtualization: Getting Started
sponsored by Citrix
PRESENTATION TRANSCRIPT: In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.
Posted: 03 Feb 2009 | Published: 30 Jan 2009

Citrix

IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER: New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012

Intel

IT Takes Virtualization to Make an Agile Infrastructure
sponsored by AMD
WHITE PAPER: This paper discusses how AMD's ecosystem partners are adapting their software to take advantage of new virtualization extensions. It also explores the future of virtual technology, and assesses its impact on the industry in years to come.
Posted: 04 Nov 2008 | Published: 22 Aug 2008

AMD

It's Time to Address the Visibility Challenge Surrounding Applications
sponsored by Citrix
WHITE PAPER: Are you ready to solve the application visibility challenge? This resource outlines how a next-gen visibility solution provides the end-to-end visibility you need to win the battle.
Posted: 13 Aug 2013 | Published: 29 Mar 2013

Citrix

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

Juniper Networks Virtual Chassis: High Availability
sponsored by Juniper Networks, Inc.
WHITE PAPER: Read this white paper to learn more about the high-availability capabilities of Juniper's Virtual Chassis technology.
Posted: 19 Apr 2013 | Published: 30 Nov 2012

Juniper Networks, Inc.

KPMG Netherlands Counts on Aruba for Network Rightsizing
sponsored by Aruba Networks
CASE STUDY: KPMG realized that network edge rightsizing could provide them an opportunity to save money and make money. This case study examines why KPMG chose Aruba to meet the needs of their global enterprise, the specific solutions used and the key benefits achieved.
Posted: 08 Oct 2010 | Published: 08 Oct 2010

Aruba Networks

LANsurveyor 10.0
sponsored by SolarWinds, Inc.
TRIAL SOFTWARE: Map your entire network in minutes! LANsurveyor automatically discovers and diagrams every device on your network to create a comprehensive, easy-to-view network topology map.
Posted: 16 Jul 2007 | Premiered: 13 Jul 2007

SolarWinds, Inc.

Magic Quadrant for WAN Optimization Controllers, 2009
sponsored by BlueCoat
ANALYST REPORT: WAN optimization controllers seek to improve applications performance and reduce bandwidth requirements by intelligently managing traffic across the WAN. This analyst report presents a snapshot of the current market situation as well the results and explanation of Gartner's study of nine separate WOC vendors. Read the full report to learn more.
Posted: 10 Jul 2009 | Published: 30 Jun 2009

BlueCoat

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism
sponsored by Texas Multicore Technologies, Inc.
WHITE PAPER: Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
Posted: 08 Sep 2010 | Published: 26 Aug 2010

Texas Multicore Technologies, Inc.

MAXIMIZE THE VALUE OF YOUR APPLICATIONS WITH FUSION MIDDLEWARE
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores the challenges of operating multiple applications simultaneously. Find out how you can improve efficiency and reduce risk with a pre-integrated application infrastructure.
Posted: 02 Aug 2012 | Published: 01 Jun 2010

Oracle Corporation

Maximizing Oracle Database Performance and Minimizing Licensing Costs in Virtualized Environments
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: If you missed this September 2010 webcast on Oracle Database Performance and Licensing Dynamics in Virtualized Environments, here's your chance to catch up on the discussion. This white paper highlights the webcast, including an extensive Q&A and tips for maximizing Oracle Database performance and minimizing licensing costs.
Posted: 12 May 2011 | Published: 12 May 2011

Embarcadero Technologies, Inc.

Maximizing the Strategic Point of Control in the Application Delivery Network
sponsored by F5 Networks
WHITE PAPER: Improve performance, implement security procedures, and institute server redundancy that is invisible to the user by leveraging the strategic point of control that exists between the servers in the data center and the Internet.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

F5 Networks

Metalogix Content Migration and Upgrade for Microsoft SharePoint Server 2010
sponsored by Metalogix
WHITE PAPER: This paper discusses both Microsoft's out-of-box migration approaches and Metalogix's SharePoint Site Migration Manager 2010. It describes common migration scenarios, and how those scenarios can be addressed using the different migration approaches.
Posted: 28 Apr 2010 | Published: 28 Apr 2010

Metalogix

Microscope - June 2013: A special issue announcing the MicroScope ACEs winners
sponsored by MicroScope
EZINE: A special issue announcing the winners of the MicroScope Awards for Channel Excellence
Posted: 06 Jun 2013 | Published: 10 Jun 2013

MicroScope

Microsoft SQL Server 2012 Solutions for OLTP Applications on Dell PowerEdge VRTX
sponsored by Dell India
WHITE PAPER: Explore this exclusive white paper to find out about Dell's first shared IT infrastructure solution that's specifically designed for remote and small office environments.
Posted: 17 Feb 2014 | Published: 30 Jun 2013

Dell India

Minimize LAN Switch Tiers to Reduce Cost and Increase Efficiency
sponsored by Juniper Networks, Inc.
ANALYST REPORT: Established LAN design practices were created for an environment of limited switch performance. Today's high-capacity switches allow new design approaches, thus reducing cost and complexity in campus and data center LANs. Read this Gartner report to learn about maximizing LAN performance by minimizing LAN switch Tiers.
Posted: 25 Jan 2010 | Published: 17 Nov 2009

Juniper Networks, Inc.

Mobility on Cisco Catalyst Series Switches - The Wired Side of Wireless
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco has defined a wireless architecture that provides tight integration and unification of wired and wireless networks. Read this paper to learn about the key features and business benefits of Cisco Catalyst Series switches and Cisco Unified Wireless Networks.
Posted: 26 May 2010 | Published: 01 Jul 2008

Cisco Systems, Inc.

Mobilizing Applications Lotus Domino Databases
sponsored by BlackBerry
WHITE PAPER: The ability to access and update Lotus Domino applications can be a simple and effective way to improve efficiency. Read this paper and learn how easy it can be to create BlackBerry applications that integrate with your Lotus Domino applications.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

MPLS VPN Tutorial: What you should know
sponsored by XO Communications
EGUIDE: In this expert E-Guide from SearchEnterpriseWAN.com, explore the next generation of networks: Multiprotocol Label Switching (MPLS) networks.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

XO Communications
226 - 250 of 418 Matches Previous Page    8 9 10 11 12 13    Next Page
 
TRANSCEIVERS DEFINITION (continued): …  is silenced while transmitting. An electronic switch allows the transmitter and receiver to be connected to the same antenna, and prevents the transmitter output from damaging the receiver. With a transceiver of this kind, it is impossible to receive signals while transmitting. This mode is called half duplex. Transmission and reception often, but not always, are done on the same frequency.Some transceivers are designed to allow reception of signals during transmission periods. This mode is known as full duplex, and requires that the transmitter and receiver operate on substantially different … 
Transceivers definition sponsored by SearchNetworking.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement