Ixia, a Keysight Business, Enhances Active Network Monitoring Platform with Machine Learning
The following photos are available for use by the media, based on the Keysight Photography Use Policy.
The Hawkeye “outlier dashboard” leverages machine learning algorithms to digest collected data and pinpoints the network or application problems that require attention. This outlier dashboard indicates that anomalies are detected for 3 different sites and for http download time, speedtest and datagrams out of sequence.
Hawkeye illustrates how machine learning is used to automatically detect meaningful anomalies in a voice application. You can see a jitter measurement graph and the “autolearned” threshold (in red) and time periods where sufficient measurements out-of-range are detected to trigger anomaly alert (in the solid blue part of the graph).
Keysight Photography Use Policy
We will permit use of Keysight photography available via this site as long as the use will not disparage Keysight nor imply endorsement by Keysight. The photography cannot be changed or manipulated in any way with the exception of resizing or cropping. By downloading our product photography you are indicating that you accept these terms. Any commercial use of these images must be approved by Keysight Technologies.
All Images Used Must Indicate:
"Reproduced with Permission, Courtesy of Keysight Technologies, Inc."