Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Technical Support

Electronic Measurement

Support by Product Model Number:

Refine the List

remove all refinements

By Industry/Technology

By Type of Content

By Product Category

26-50 of 1751

Sort:
Essential Guide to Active Monitoring: The Business Value of Being Proactive
The bigger the network, the harder it fails. When your business depends on peak performance, you cannot afford costly surprises bringing your system down. You need to get ahead of the curve. And that’s why an active monitoring strategy is so important. It enables you to detect, diagnose, and remediate issues before they cause costly rework and leave a lasting impact.

Case Study 2020-05-22

PDF PDF
Reduce Cost and Risk by Deploying Easy to Use Monitoring Solutions
When trying to reduce the total cost of ownership (TCO) and the security risk associated with an IP network monitoring strategy for your government agency, there are two fundamental components that need to be thoroughly investigated. The first component is to optimize your agency monitoring processes. The second component is to make sure that you choose the easiest to use monitoring solution available. While you need better data, you also need a system that is easy to install, easy to program, and easy to maintain. Read this whitepaper to learn more about how to improve network monitoring and why a simple choice like using a graphical user interface (GUI) can cut your long-term operating costs by 75% or more.

Case Study 2020-05-21

PDF PDF
How to Apply Network Visibility Within Educational Institutions
The education sector is undergoing significant change. National enrollment for higher education has declined 3 percent across the United States since 2015, according to the 2017 National Student Clearinghouse Research Center annual study. This is resulting in: increased competition, student demands for more cutting-edge facilities, and shrinking profit margins, even as course fees reach all-time highs. At the same, K-12 school systems are encountering situations of student overcrowding, the need for cost controls, and demands for modernization. To improve the situation, higher education institutions and K-12 school systems are turning to technology to help them: solve their problems, offer new services, and reduce costs. This is especially true for cyber security and network performance monitoring issues.

Case Study 2020-05-21

PDF PDF
Validating the New World of 400 Gigabit Ethernet
Communications chip manufacturers, NEMs, cloud service providers, carriers and service providers, hyperscale and large enterprise data centers, financial, and storage network organizations must adopt and deploy new Ethernet speeds like the fast-emerging 400GE and 200GE, plus new implementations of 100GE and 50GE. There is a tremendous amount of new product development occurring between 2015 and 2020 to meet the bandwidth demand. Now, we are right in the middle of this period, and new chip makers are coming to market, introducing high-performance products. There is no longer just one or two primary suppliers of communications chips and devices. Read this white paper to understand why this is a critical time to renew efforts to compare and benchmark the performance of these new network products and devices.

Case Study 2020-05-21

PDF PDF
How to Avoid the Seven Deadly Sins of Hybrid IT Migration
Many enterprise IT teams have experienced, or continue to experience, problems with the migration from their physical on-premises networks to their new cloud instances. Despite all of the hype about how great public clouds are, there are normally issues with a migration that include: performance problems, service outages, missed security threats, and more. The key to a successful deployment is knowing ahead of time where the issues lie and addressing those potential issues upfront—before they become a service impacting scenario. This white paper will examine seven key issues with public cloud deployments and how to avoid migration pitfalls.

Case Study 2020-05-21

PDF PDF
Security and Performance Monitoring in the Public Cloud
Even as workloads move to the cloud, IT must continue to maintain data and application security, optimize performance, and resolve issues as quickly as possible. But getting access to traffic data in the public cloud can be a challenge. Then once you have the data, you need a way to sort and filter it, so your tools can process it with maximum efficiency. This paper explores the pros and cons of different approaches to monitoring data in the public cloud.

Case Study 2020-05-21

PDF PDF
Ensure Performance and Availability of Business-Critical Applications
Application performance can be affected by many network issues. The launch of a new application can stress parts of the network not yet ready to handle the volume. The use of cloud resource can make it difficult to monitor the traffic entering and leaving your network. A distributed denial of service attack can bring down the infrastructure that hosts your application and impact revenue generation. What network operations engineers need is better, faster, and more detailed network intelligence. With the right data, you can ensure the network is able to deliver applications and services with the expected level of performance and respond effectively to a security attack. This paper explores how data collected from your network can help you achieve those goals.

Case Study 2020-05-21

PDF PDF
Data Privacy and Security in the Cloud Era
The increasing use of cloud hosting is dramatically changing the way organizations protect data privacy and maintain security. Once you begin using public cloud infrastructure and lose direct access to the physical infrastructure, you need to establish new methods for getting information about the traffic moving through your organization.This white paper looks at how a cloud visibility platform can help IT professionals keep data and applications safe from attacks and inadvertent exposure, including:- The role of data owners- The role of cloud providers- Vulnerabilities of public and hybrid clouds- Strategies for protecting your clouds

Case Study 2020-05-21

PDF PDF
Security Resilience − The Paradigm Shift is Here
In the current business climate, it is not a question of if your network will be attacked, but when will it will be attacked? And, the real question is how quickly can you respond to the threat and recover? These are two of the fundamental questions that keep chief information officers (CIOs) and chief information security officers (CISOs) up at night. To combat this threat, a new paradigm shift in network security is needed. While security defenses still need to be maintained, there has to be at least equal, if not greater, effort placed on recovering the network back to a normal, safe state as quickly as possible. This philosophy is called security resilience. Read this whitepaper to get an explanation of the concept and the benefits it can deliver to you.

Case Study 2020-05-21

PDF PDF
Get More From Your Performance Monitoring Tools
Your investment in security and performance monitoring tools is not trivial. Make sure you get the best return on your investment. This paper examines key strategies for maximizing tool efficiency in network environments dealing with: Expanding traffic volume. Higher percentage of secure traffic. Greater use of hybrid infrastructure and resources. More critical processing taking place on the network edge. Escalating operating costs.

Case Study 2020-05-21

PDF PDF
How Internet Encryption Works and Why It's Important
Are you wondering about the lock symbol in your internet browser search bar? Are you wondering how to deter hackers and secure your valuable information? This white paper will discuss the history of cryptography, how internet encryption works, the new requirements in TLS 1.3, passive versus active SSL, and how to successfully deploy a security infrastructure that can handle and inspect encrypted traffic.

Case Study 2020-05-21

PDF PDF
Exposing Hidden Security Threats and Network Attacks
How do you ensure maximum service availability while protecting and securing your enterprise? IT departments have been wrestling with this problem for years. Virtualization and mobility are expanding the traditional network boundary, which means data and assets no longer sit in a single location behind a firewall. Network security monitoring involves processing and examining all the traffic entering and leaving this expanding perimeter. Hackers and the tools they use to infiltrate networks and exfiltrate company secrets are more sophisticated than ever.

Case Study 2020-05-21

PDF PDF
Samtec Reduces R&D Lab Test Time from Four Hours to Five Minutes
Learn how Keysight helped Samtec reduce instrument setup and test time of their next-gen 112 Gbps PAM4 interconnect solutions from four hours to five minutes.

Case Study 2020-05-21

PDF PDF
Important Network Visibility Use Cases for the Financial Industry
The financial industry is experiencing a massive wave of change and disruption over the last several years. This includes cybercrime and operational activities. For instance, according to a joint 2017 Ponemon Institute and Accenture study (Cost of Cybercrime Study: Insights on Security Investments That Make a Difference), the financial services industry suffers the most loss of any industry due to cybercrime with an annual loss of $18.28 billion. Read this whitepaper to see how Network visibility components and techniques can be used to overcome these challenges for the following business types: Banking, Insurance companies, Credit card companies, Financial trading companies.

Case Study 2020-05-20

PDF PDF
Top Four Considerations When Migrating to Public Cloud
Organizations everywhere are moving pieces, if not all, of their workloads to public clouds. This is understandable as there are some clear benefits to this strategy. At the same, a public cloud instance does not work the same way as a physical on-premises network does. This means that when you make your move to the cloud, you need to understand that it is not simply a “lift and shift” endeavor. Making this assumption could make you very sorry.

Case Study 2020-05-19

PDF PDF
Unleash the Power of IoT
As mission-critical IoT applications proliferate, IoT devices and systems must be able to withstand the rigors of the real world. Design engineers face tremendous technical challenges. They will need to make critical design assessments, test considerations, and trade-offs throughout the product lifecycle, from early design to manufacturing. Explore this white paper to find out more about the top five challenges of designing and testing the IoT.

Case Study 2020-05-19

PDF PDF
6 Steps You Can Take to Optimize Defensive Security
While there is a myriad of security architectures and techniques available to enterprise IT professionals, what is the best approach? One of the best approaches is to reduce your attack surface and then screen the data that comes into the network afterwards. A defensive network security architecture is an example of this strategy and allows you to focus on preventing as many breaches as possible. Read this white paper to see how a six-step approach to securing your enterprise can help you.

Case Study 2020-05-19

PDF PDF
Smarter Airports: Field Assurance for Airports and Air Traffic Control Systems
Successful airport operation depends on numerous indispensable modern electronic devices and monitoring networks. With the rollout of 5G, service engineer teams responsible for field testing airport and air traffic control systems have to plan for a new era of smart, civil aviation. This white paper covers several monitoring systems found in the air transport industry and the field tests used to verify their performance.

Case Study 2020-05-16

PDF PDF
Infiniium Advanced Remote Collaboration Surpasses In-Person Test
Geographically diverse design teams, increasing technical complexity, and limited equipment assets demand dramatically higher bench test efficiency and effectiveness. Only a completely reimagined test workflow, supported by advanced remote collaboration software can deliver this.

Case Study 2020-05-13

First-to-Market Radio-Wave Breast Imaging System Achieved with Network Analyzer
Patients can, from a young age, frequently undergo breast imaging technique based on radio-wave technology. This method offers new diagnostic information in dense tissue while requiring no breast compression or ionizing radiation exposure to the patient. Recognizing the potential impact of such a technology on breast cancer detection and mortality rates, Micrima’s founders decided to develop a radio-wave breast-imaging system using Keysight solutions.

Case Study 2020-05-11

PDF PDF
Infiniium Advanced Remote Collaboration Surpasses In-Person Test
Geographically diverse design teams, increasing technical complexity, and limited equipment assets demand dramatically higher bench test efficiency and effectiveness. Only a completely reimagined test workflow, supported by advanced remote collaboration software can deliver this.

Case Study 2020-05-09

PDF PDF
Generate Performance-Optimized RF Signals Using Waveform Filtering
This white paper lays out the best practices for creating performance-optimized reference signals using signal generation software tools.

Case Study 2020-05-06

PDF PDF
Is IT Ready for OT and the Industrial Internet of Things (IIoT)?
The rampant growth of the Internet of Things (IoT) includes the fast-growing industrial IoT sector but are traditional IT teams ready? This paper describes how the integration of operational and information technology systems (OT and IT) ushers in never-before-seen cybersecurity risks – and what you can do about it. We’ll overview new trends and challenges and show you how to achieve full visibility to all networked devices. See how visibility promotes security and control to address the needs of oil and gas, utility, manufacturing, smart cities, and maritime network infrastructures.

Case Study 2020-05-04

PDF PDF
How Millimeter Wave Automotive Radar Enhances Advanced Driver Assistance Systems (ADAS) and Autonomous Driving
Learn how new mmWave automotive radar enhances advanced driver assistance systems (ADAS) for safer autonomous driving.

Case Study 2020-04-30

PDF PDF
Stress Testing Your Device with Simulated Waveforms
Stress testing your devices using a simulated waveform can deliberately induce failures that enable you to analyze the risks at the breaking points. The Keysight Trueform Series 33500B and 33600A waveform generators provide an easy-to-use, best-value solution for generating high-quality waveforms. Having a stable signal source will provide tremendous benefits for stress testing your device with simulated waveforms.

Case Study 2020-04-23

PDF PDF

Previous 1 2 3 4 5 6 7 8 9 10 ... Next