Here’s the page we think you wanted. See search results instead:

 

Contact an Expert

Technical Support

Electronic Measurement

Support by Product Model Number:

Refine the List

remove all refinements

By Industry/Technology

By Type of Content

By Product Category

1-25 of 1714

Sort:
How Internet Encryption Works and Why It's Important
Are you wondering about the lock symbol in your internet browser search bar? Are you wondering how to deter hackers and secure your valuable information? This white paper will discuss the history of cryptography, how internet encryption works, the new requirements in TLS 1.3, passive versus active SSL, and how to successfully deploy a security infrastructure that can handle and inspect encrypted traffic.

Case Study 2020-05-21

PDF PDF
How to Apply Network Visibility Within Educational Institutions
The education sector is undergoing significant change. National enrollment for higher education has declined 3 percent across the United States since 2015, according to the 2017 National Student Clearinghouse Research Center annual study. This is resulting in: increased competition, student demands for more cutting-edge facilities, and shrinking profit margins, even as course fees reach all-time highs. At the same, K-12 school systems are encountering situations of student overcrowding, the need for cost controls, and demands for modernization. To improve the situation, higher education institutions and K-12 school systems are turning to technology to help them: solve their problems, offer new services, and reduce costs. This is especially true for cyber security and network performance monitoring issues.

Case Study 2020-05-21

PDF PDF
Samtec Reduces R&D Lab Test Time from Four Hours to Five Minutes
Learn how Keysight helped Samtec reduce instrument setup and test time of their next-gen 112 Gbps PAM4 interconnect solutions from four hours to five minutes.

Case Study 2020-05-21

PDF PDF
Get More From Your Performance Monitoring Tools
Your investment in security and performance monitoring tools is not trivial. Make sure you get the best return on your investment. This paper examines key strategies for maximizing tool efficiency in network environments dealing with: Expanding traffic volume. Higher percentage of secure traffic. Greater use of hybrid infrastructure and resources. More critical processing taking place on the network edge. Escalating operating costs.

Case Study 2020-05-21

PDF PDF
Ensure Performance and Availability of Business-Critical Applications
Application performance can be affected by many network issues. The launch of a new application can stress parts of the network not yet ready to handle the volume. The use of cloud resource can make it difficult to monitor the traffic entering and leaving your network. A distributed denial of service attack can bring down the infrastructure that hosts your application and impact revenue generation. What network operations engineers need is better, faster, and more detailed network intelligence. With the right data, you can ensure the network is able to deliver applications and services with the expected level of performance and respond effectively to a security attack. This paper explores how data collected from your network can help you achieve those goals.

Case Study 2020-05-21

PDF PDF
Data Privacy and Security in the Cloud Era
The increasing use of cloud hosting is dramatically changing the way organizations protect data privacy and maintain security. Once you begin using public cloud infrastructure and lose direct access to the physical infrastructure, you need to establish new methods for getting information about the traffic moving through your organization.This white paper looks at how a cloud visibility platform can help IT professionals keep data and applications safe from attacks and inadvertent exposure, including:- The role of data owners- The role of cloud providers- Vulnerabilities of public and hybrid clouds- Strategies for protecting your clouds

Case Study 2020-05-21

PDF PDF
6 Steps You Can Take to Optimize Defensive Security
While there is a myriad of security architectures and techniques available to enterprise IT professionals, what is the best approach? One of the best approaches is to reduce your attack surface and then screen the data that comes into the network afterwards. A defensive network security architecture is an example of this strategy and allows you to focus on preventing as many breaches as possible. Read this white paper to see how a six-step approach to securing your enterprise can help you.

Case Study 2020-05-19

PDF PDF
Unleash the Power of IoT
As mission-critical IoT applications proliferate, IoT devices and systems must be able to withstand the rigors of the real world. Design engineers face tremendous technical challenges. They will need to make critical design assessments, test considerations, and trade-offs throughout the product lifecycle, from early design to manufacturing. Explore this white paper to find out more about the top five challenges of designing and testing the IoT.

Case Study 2020-05-19

PDF PDF
Top Four Considerations When Migrating to Public Cloud
Organizations everywhere are moving pieces, if not all, of their workloads to public clouds. This is understandable as there are some clear benefits to this strategy. At the same, a public cloud instance does not work the same way as a physical on-premises network does. This means that when you make your move to the cloud, you need to understand that it is not simply a “lift and shift” endeavor. Making this assumption could make you very sorry.

Case Study 2020-05-19

PDF PDF
Smarter Airports: Field Assurance for Airports and Air Traffic Control Systems
Successful airport operation depends on numerous indispensable modern electronic devices and monitoring networks. With the rollout of 5G, service engineer teams responsible for field testing airport and air traffic control systems have to plan for a new era of smart, civil aviation. This white paper covers several monitoring systems found in the air transport industry and the field tests used to verify their performance.

Case Study 2020-05-16

PDF PDF
Infiniium Advanced Remote Collaboration Surpasses In-Person Test
Geographically diverse design teams, increasing technical complexity, and limited equipment assets demand dramatically higher bench test efficiency and effectiveness. Only a completely reimagined test workflow, supported by advanced remote collaboration software can deliver this.

Case Study 2020-05-13

First-to-Market Radio-Wave Breast Imaging System Achieved with Network Analyzer
Patients can, from a young age, frequently undergo breast imaging technique based on radio-wave technology. This method offers new diagnostic information in dense tissue while requiring no breast compression or ionizing radiation exposure to the patient. Recognizing the potential impact of such a technology on breast cancer detection and mortality rates, Micrima’s founders decided to develop a radio-wave breast-imaging system using Keysight solutions.

Case Study 2020-05-11

PDF PDF
Infiniium Advanced Remote Collaboration Surpasses In-Person Test
Geographically diverse design teams, increasing technical complexity, and limited equipment assets demand dramatically higher bench test efficiency and effectiveness. Only a completely reimagined test workflow, supported by advanced remote collaboration software can deliver this.

Case Study 2020-05-09

PDF PDF
Generate Performance-Optimized RF Signals Using Waveform Filtering
This white paper lays out the best practices for creating performance-optimized reference signals using signal generation software tools.

Case Study 2020-05-06

PDF PDF
Is IT Ready for OT and the Industrial Internet of Things (IIoT)?
The rampant growth of the Internet of Things (IoT) includes the fast-growing industrial IoT sector but are traditional IT teams ready? This paper describes how the integration of operational and information technology systems (OT and IT) ushers in never-before-seen cybersecurity risks – and what you can do about it. We’ll overview new trends and challenges and show you how to achieve full visibility to all networked devices. See how visibility promotes security and control to address the needs of oil and gas, utility, manufacturing, smart cities, and maritime network infrastructures.

Case Study 2020-05-04

PDF PDF
How Millimeter Wave Automotive Radar Enhances Advanced Driver Assistance Systems (ADAS) and Autonomous Driving
Learn how new mmWave automotive radar enhances advanced driver assistance systems (ADAS) for safer autonomous driving.

Case Study 2020-04-30

PDF PDF
Head-to-Head Comparison - Vectorless Test: NanoVTEP vs VTEP - Case Study
This case study summarizes some of the results of early tests conducted at customer sites, and includes results of controlled tests conducted in Keysight’s R&D lab.

Case Study 2020-04-29

PDF PDF 1.12 MB
Stress Testing Your Device with Simulated Waveforms
Stress testing your devices using a simulated waveform can deliberately induce failures that enable you to analyze the risks at the breaking points. The Keysight Trueform Series 33500B and 33600A waveform generators provide an easy-to-use, best-value solution for generating high-quality waveforms. Having a stable signal source will provide tremendous benefits for stress testing your device with simulated waveforms.

Case Study 2020-04-23

PDF PDF
4 Essential Methods for Creating and Editing Waveforms
Four essential methods for creating and editing waveforms using the Keysight Trueform Series waveform generator: editing on the front panel, using Excel, using Keysight’s PathWave BenchVue software, and using MATLAB.

Case Study 2020-04-22

PDF PDF
Don’t Stop with S-Parameters: 5 Essential VNA Measurements for Modern RF Devices
This white paper goes over some of the critical vector network analyzer (VNA) measurements you must master to prepare for the next generation of RF devices.

Case Study 2020-04-16

PDF PDF
Northeastern University Paves the Way for Novel Safety Mechanisms for Counterterrorism and Health Screening
See how Northeastern University advances research in real-time imaging for security threats and health screening with Keysight network analyzers

Case Study 2020-04-16

PDF PDF
The University of Leeds Showcases Two Engineering Research Labs
See how the University of Leeds advances research in high-frequency and terahertz electronics, and ensures graduating students are industry ready.

Case Study 2020-04-16

PDF PDF
Box Hill Institute’s Cyber Range Lab Arms Students with Industry-Ready Security Skills
Keysight’s BreakingPoint solution is core to Box Hill Institute’s state-of-the-art cyber range lab, providing tools and simulation environments to arm students with industry-ready security skills.

Case Study 2020-04-14

PDF PDF
A New Sub-Terahertz Testbed for 6G Research
This white paper presents a new R&D sub-terahertz testbed for 6G research and discusses key considerations in optimizing system performance for extreme bandwidths.

Case Study 2020-04-13

PDF PDF
URLLC: 5G’s Most Intriguing and Challenging Use Case
Ultra-reliable low-latency communications (URLLC), one of the use cases supported by the 5G NR standards, is a key technology for enabling autonomous driving and other mission-critical applications.

Case Study 2020-04-12

PDF PDF

1 2 3 4 5 6 7 8 9 10 ... Next