Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Technical Support

Electronic Measurement

Support by Product Model Number:

1-25 of 1130

Sort:
O-RAN Next-Generation Fronthaul Conformance Testing
Building a more cost-effective, agile RAN requires openness. This paper discusses the advantages of an open RAN for 5G and discusses strategies for testing.

Case Study 2020-07-22

PDF PDF
Global Biotech IT Group Ensures Telecommuter Productivity
This company relied on VPN-gateway vendor data sheets to size their new capacity provisioning, however their confidence on their plan was shaken as some of the remote users experienced inconsistent VPN quality of experience. Keysight's SSL VPN Assessment Service testing revealed trouble spots and actionable steps to improve capacity and save costs.

Case Study 2020-07-21

PDF PDF
The Essential Signal Generator Guide – Solid RF Foundations
Part 1 of a two-part series on RF signal generators. Gain a sound understanding on the fundamental specifications of signal generators.

Case Study 2020-07-16

PDF PDF
Address Your Future Wireless Test Needs with the Right Oscilloscope
Engineers of the past typically chose oscilloscopes based on technical factors such as bandwidth, rise time, signal-to-noise ratio, sampling modes, probing, and positioning. With the proliferation of new and complex technologies, engineers are getting a lot more future-ready. Decision-making now takes into consideration the rapidly evolving needs of test instruments. When it comes to oscilloscopes, bandwidth and channel density are the two major comparison points that engineers are making, with good reason. Learn more on why is this the case by reading this white paper.

Case Study 2020-07-15

PDF PDF
Metrology and Traceability Matters to Ensure Accurate Measurements
Accuracy matters. This white paper explains how traceability is the proof that measurement results were obtained with a direct link to an agreed upon reference.

Case Study 2020-07-14

PDF PDF
5 Things the E5080B Can Do (That the E5071C Can’t)
The Keysight E5080B vector network analyzer provides a more comprehensive solution for R&D and manufacturing test with useful features to simplify your device test.

Case Study 2020-07-14

PDF PDF
TDECQ Part II Manufacturing Test Recommendations
This document gives an overview of the adoption of TDECQ in manufacturing tests, and how to efficiently automate FlexDCA for making TDECQ measurements.

Case Study 2020-07-02

PDF PDF
Stronger Security with Network Packet Brokers
Securing a network requires more than just a menagerie of security tools. You have to ensure that your tools have effective visibility into your network and the traffic on it. Unfortunately, many factors including departmental silos, virtualization, rogue IT, SPAN ports and complexity can get in the way and create blind spots. This white paper discusses ways that you can use network packet brokers to better secure your network, touching on topics including data filtering, uptime, high availability and redundancy, tool chaining, honeypots, and SIEM integration.

Case Study 2020-07-01

PDF PDF
Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots
Unnoticed network vulnerabilities are blind spots, especially as they pertain to application reliability, performance, and security. Blind spots directly correlate to network problems and outages, increased network security risk, and potential regulatory compliance issues. Identifying blind spots by establishing greater network visibility is critical for identifying hidden threats. This paper outlines how to use network visibility to remove blind spots that reduce network issues, security risk, and compliance issues. Specific topics include: Visibility architectures expose missing and hidden data. Tap deployments improve data collection. Virtual taps reveal hidden east-west traffic in virtual data centers. Regenerating monitoring data for distribution to multiple destinations. Visibility into cloud networks. Eliminate switched port analyzer (SPAN) port overload. Reducing network complexity with visibility architectures. Cisco ACI monitoring. Visibility loss — mergers and acquisitions (M&As) network integrations. Better validation of network designs. Download this whitepaper to read about how to implement these use cases.

Case Study 2020-06-24

PDF PDF
How to Select Your Next Oscilloscope: 12 Tips on What to Consider Before You Buy
How to select an oscilloscope to meet your specific measurement needs and budget is an important task. Read this oscilloscope selection guide first.

Case Study 2020-06-24

PDF PDF
How to Test and Troubleshoot USB4
USB4 is a hardware interface that supports several protocols through the USB Type-C connector. Based on the Thunderbolt protocol specification, the USB4 architecture doubles the bandwidth of USB and enables multiple simultaneous data and display protocols.

Case Study 2020-06-23

PDF PDF
Satellites Bolster 5G Through Non-Terrestrial Networks
Unlike previous cellular network technologies, the 3rd Generation Partnership Project is planning to make 5G into a network that incorporates satellites to augment terrestrial 5G networks. These non-terrestrial networks will extend the reach of 5G to regions lacking terrestrial infrastructure.

Case Study 2020-06-22

PDF PDF
Less Downtime and Faster Recovery
The potential cost of network downtime can run into thousands of dollars — per minute. To mitigate the effects of, or even prevent a network outage, it is critical to have a robust troubleshooting system in place that delivers complete insight into the network through a visibility architecture. To improve network reliability, organizations need to establish greater visibility of the data that flows through their networks, where it goes, and how to control it. This paper outlines how to use network visibility to reduce troubleshooting time and expense.

Case Study 2020-06-19

PDF PDF
Reduce Risk with a Better Measurement Process
Read this white paper to learn how to reduce measurement risk. Topics include contributors to measurement uncertainty and how uncertainty grows over time with an incomplete or improper calibration.

Case Study 2020-06-19

PDF PDF
Threat Hunting 101
While security threats in general are a consistent concern for IT departments, the specific types of security threats change over time. For instance, according to the WatchGuard Internet Security Report - Q1 2019, cyber attackers are altering their forms of security attacks that includes: an increase in malware, changes in network attacks, new Mac adware variants, and a surge in web application attacks (like XSS and SQLi). This is important because what you do not know about the security of your network really will hurt you. Since security threats are changing, this could mean that you also need to change, or at least augment, your security tactics. One tactic that has been increasing for a couple years now is to actively hunt for threats on your network. Passive security practices just aren’t good enough anymore. You need to be proactive to stop a breach, as the threats themselves have become much more sophisticated and harder to detect. Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

Case Study 2020-06-19

PDF PDF
Inline Security and Why You Need It
Inline security solutions operate more efficiently, troubleshoot faster, and stay online longer with the right inline security architecture. Get the details you need to make the best network visibility and security architecture choices for your business. Download this white paper now to get an understanding of market drivers for inline security, how an inline architecture solves common security problems and how to implement inline security.

Case Study 2020-06-19

PDF PDF
Ixia’s Guide to Visibility Use Cases – Cost Containment
As networks grow and become increasingly complex, the cost to maintain those networks increases. Learn how you can increase efficiency and reduce costs by deploying a visibility architecture that reveals where blind spots occur. This paper outlines key network monitoring topics that can help you detect and minimize network inefficiencies as well as reduce monitoring costs.

Case Study 2020-06-19

PDF PDF
Regulatory Compliance and Other Networking Challenges
A top concern of corporate IT departments today is how to maintain compliance with evolving regulatory initiatives. To maintain compliance, organizations need to establish greater visibility into the data that flows through their networks, where it goes, and how to control it. They can achieve this by creating a visibility architecture, which is end-to-end infrastructure that delivers network, application, and security visibility. This visibility allows you to optimize your network data capture, data privacy, and compliance verification techniques. Deployment of data masking, network monitoring, regular expression (regex) searching, packet trimming, and lawful intercept enables organizations to better comply with local and international regulations.

Case Study 2020-06-12

PDF PDF
Edge Computing: Four Smart Strategies for Safeguarding Security and User Experience
It is a brave new world for enterprise networks. Smart devices are getting smarter, and edge computing is emerging as a viable way to reduce latency and improve performance. But as network architectures grow increasingly amorphous, what kind of impact will this have on security and performance? Download this white paper to discover how you can boost security, ensure quality of service, and future-proof your network's edge for years to come.

Case Study 2020-06-11

PDF PDF
Deploying an Inline Security Architecture: Key Considerations
The key to efficient inline security monitoring is to enable fail-safe tool deployment, maximize traffic inspection, and protect network availability. To address these issues, many organizations are deploying a highly resilient security architecture. With this approach, you can get access to 100% of your physical and virtual network traffic, increase monitoring tool efficiency, apply security-specific intelligence to improve threat detection, and achieve near instant fail-over.

Case Study 2020-06-11

PDF PDF
Achieve Network Visibility in the Public Cloud
Organizations in every market sector are migrating to public cloud, even those not typically associated with technology. This trend is growing because of the increased flexibility and agility the cloud offers. Whether these applications are web servers or critical business apps, they must execute with the same level of performance, security, and compliance. In a traditional data center, these needs are met by providing robust monitoring with copies of the traffic that moves through your physical network infrastructure. When you move workloads to the public cloud, however, you no longer have access to that infrastructure. How can you provide your tools with the data they need--to identify active cyber threats, monitor user experience, and diagnose application issues? This white paper explains how to achieve total network visibility when you use public cloud.

Case Study 2020-06-10

PDF PDF
Best Practices and Use Cases for Network Visibility
Network visibility enables information technology (IT) teams to quickly isolate security threats and resolve performance issues, ultimately ensuring the best possible end-user experience. The easiest way to accomplish network visibility is to implement a visibility architecture—which is an end-to-end infrastructure that enables physical and virtual network, application, and security visibility. Once the architecture is in place, you can implement the various different solutions, i.e. use cases, that you need. This white paper (and the companion book The Definitive Guide to Visibility Use Cases) provide various examples of how to leverage a visibility architecture. This includes examples of how to improve network security, reduce costs, improve reliability, speed up troubleshooting, remove blind spots, optimize network performance, and strengthen regulatory compliance initiatives.

Case Study 2020-06-10

PDF PDF
Waveform Generators Increase Design Efficiency
Waveform sequencing and frequency lists are unique to Trueform Series waveform generators. These capabilities make arb signal generation more flexible and workflow more efficient. With PathWave BenchVue Waveform Builder Pro, you get advanced signal-creation and editing capabilities without spending hours programming.

Case Study 2020-06-05

PDF PDF
Remove Resistance, Current, and Frequency Measurement Errors in DMMs
This white paper covers the types of measurement errors for resistance, DC and AC currents, including frequency and period. You will learn how to eliminate potential measurement errors to achieve the highest accuracy with a DMM.

Case Study 2020-06-04

PDF PDF
DDR Technology Testing Solutions
High-speed technologies such as double data rate (DDR) and low-power double data rate (LPDDR) carry significant design and test challenges. DDR is a memory chip technology that has progressed through multiple generations in the past 10 years. Each DDR generation improves in speed, efficiency, and memory capacity. But as the standard allows for more data transfer at faster rates, margins decrease. Therefore, design work and testing have become more challenging. Bit error rate testers (BERTs), oscilloscopes, probes, and associated compliance software alleviate some of the challenges when working on the physical layer. For a deeper analysis of the OSI layers, logic analyzers can help you test and debug your designs for functional and protocol compliance. Depending on where you fit in the design stage (device characterization, simulation, prototype, firmware, software), here are three types of tests essential to validate the current and next-generation DDR: DDR5 receiver conformance and characterization; physical-layer and compliance testing; functional debug, analysis, and protocol compliance.

Case Study 2020-06-04

PDF PDF

1 2 3 4 5 6 7 8 9 10 ... Next