您可能感興趣的網頁。 觀看搜尋結果:

 

聯絡是德專家

技術支援

電子量測

依產品型號搜尋可用的支援:

縮小範圍

移除所有細分

依產業/技術

依內容類型

依產品分類

1-25 / 1976

排序:
A Practical Guide to Locate and Mitigate Interference
Signal hunting grows increasingly complex in today’s crowded RF spectrum environment. Here are the most common problems encountered as well as information on detecting, identifying, locating, and mitigating these problem signals.

電子書 2020-07-31

PDF PDF
Making Dynamic Data Acquisition Measurements Using a DAQ
This eBook walks through the architecture of a dynamic DAQ system. It helps you to confidently choose the sensors, types of cables to use, hardware requirements, and the PC DAQ software for controlling your DAQ hardware, and how to perform data analysis.

電子書 2020-07-24

PDF PDF
Breach & Attack Simulation For Dummies®
You know you spend a lot of time and effort on security, but do you really know how effective your efforts have been? What if there was an easy way to find vulnerabilities and address gaps and misconfigurations in your existing infrastructure? There is - learn more about Breach and Attack Simulation.

電子書 2020-07-23

PDF PDF
O-RAN Next-Generation Fronthaul Conformance Testing
Building a more cost-effective, agile RAN requires openness. This paper discusses the advantages of an open RAN for 5G and discusses strategies for testing.

案例研究 2020-07-22

PDF PDF
Global Biotech IT Group Ensures Telecommuter Productivity
This company relied on VPN-gateway vendor data sheets to size their new capacity provisioning, however their confidence on their plan was shaken as some of the remote users experienced inconsistent VPN quality of experience. Keysight's SSL VPN Assessment Service testing revealed trouble spots and actionable steps to improve capacity and save costs.

案例研究 2020-07-21

PDF PDF
The Challenges of Obtaining Repeatable and Reliable Double-Pulse Test Results – Measurement Science
In our April article, we discussed the challenges of fixture design to obtain repeatable and reliable results from your Double Pulse Test (DPT) setup. In this article, we continue the discussion, but focus on measurement science. There are many measurement aspects to consider.

專文 2020-07-20

PDF PDF
The Challenges of Obtaining Repeatable and Reliable Double-Pulse Test Results – Measurement Science

專文 2020-07-20

Simulation of Wide-Bandgap Power Circuits Using Advanced Characterization and Modeling
With the emergence of wide-bandgap (WBG) power semiconductor devices, the power electronics industry is facing multiple inflection points. For example, the high-speed operation of WBG devices has important implications for circuit simulation. This article presents one way to create simulations that surpass those developed using conventional methods.

專文 2020-07-20

PDF PDF
Address Your Future Wireless Test Needs with the Right Oscilloscope
Engineers of the past typically chose oscilloscopes based on technical factors such as bandwidth, rise time, signal-to-noise ratio, sampling modes, probing, and positioning. With the proliferation of new and complex technologies, engineers are getting a lot more future-ready. Decision-making now takes into consideration the rapidly evolving needs of test instruments. When it comes to oscilloscopes, bandwidth and channel density are the two major comparison points that engineers are making, with good reason. Learn more on why is this the case by reading this white paper.

案例研究 2020-07-15

PDF PDF
Metrology and Traceability Matters to Ensure Accurate Measurements
Accuracy matters. This white paper explains how traceability is the proof that measurement results were obtained with a direct link to an agreed upon reference.

案例研究 2020-07-14

PDF PDF
Overcoming Challenges Characterizing High Speed Power Semiconductors

專文 2020-07-13

Simulation of Wide-Bandgap Power Circuits Using Advanced Characterization and Modeling

專文 2020-07-13

Overcoming Challenges Characterizing High Speed Power Semiconductors
Having trouble obtaining consistent results from your Double-Pulse Test (DPT) setup? You are not alone. As the switching frequency of switch-mode power converters increase into the MHz range, rise/fall times are dropping to 10ns or even single digits of nanoseconds. It is no longer possible to design & measure power converter performance without considering high frequency effects. This article discusses DPT fixture design to obtain repeatable and reliable results from your DPT setup.

專文 2020-07-13

PDF PDF
TDECQ Part II Manufacturing Test Recommendations
This document gives an overview of the adoption of TDECQ in manufacturing tests, and how to efficiently automate FlexDCA for making TDECQ measurements.

案例研究 2020-07-02

PDF PDF
Stronger Security with Network Packet Brokers
Securing a network requires more than just a menagerie of security tools. You have to ensure that your tools have effective visibility into your network and the traffic on it. Unfortunately, many factors including departmental silos, virtualization, rogue IT, SPAN ports and complexity can get in the way and create blind spots. This white paper discusses ways that you can use network packet brokers to better secure your network, touching on topics including data filtering, uptime, high availability and redundancy, tool chaining, honeypots, and SIEM integration.

案例研究 2020-07-01

PDF PDF
The ABCs of Inline Security
Network security is one of today's most important IT functions. Inline security, specifically, refers to solutions deployed in the flow of live network traffic and used to identify and prevent cyberattacks and other security incidents. The goal of this book is to clarify the most frequently encountered concepts of inline security and be a resource as you develop your network security architecture. For each of the 20 terms included, we provide a simple definition, common use cases, and important considerations for deployment. With a better understanding of the concepts of inline security, we hope you will find it easier to strengthen your defenses and protect your organization's assets.

電子書 2020-06-30

PDF PDF
The 5 C's of IoT
Many individuals and organizations use IoT devices to increase productivity and profit. While IoT devices offer great convenience, having large numbers of them in a small space increases complexity in device design, test, performance, and security. Testing these devices is one of the biggest challenges today’s design engineers and device manufacturers face. Learn about testing the 5 C's of IoT through this eBook.

電子書 2020-06-26

PDF PDF
5 Ways to Improve ROI with Network Packet Brokers
A compelling ROI analysis is the difference between a successfully-funded IT project, and one that gets canceled. This is especially true for relatively new technologies that are not well understood by IT management. By reading this eBook, you will learn five different ways you can use network packet brokers (NPBs) to improve your network architecture ROI: expedite troubleshooting, detect breaches faster, reduce the processing burden on your existing tools, extend tool life after a network upgrade, and streamline regulatory compliance.

電子書 2020-06-25

PDF PDF
Ixia’s Guide to Visibility Use Cases Removing Network Blind Spots
Unnoticed network vulnerabilities are blind spots, especially as they pertain to application reliability, performance, and security. Blind spots directly correlate to network problems and outages, increased network security risk, and potential regulatory compliance issues. Identifying blind spots by establishing greater network visibility is critical for identifying hidden threats. This paper outlines how to use network visibility to remove blind spots that reduce network issues, security risk, and compliance issues. Specific topics include: Visibility architectures expose missing and hidden data. Tap deployments improve data collection. Virtual taps reveal hidden east-west traffic in virtual data centers. Regenerating monitoring data for distribution to multiple destinations. Visibility into cloud networks. Eliminate switched port analyzer (SPAN) port overload. Reducing network complexity with visibility architectures. Cisco ACI monitoring. Visibility loss — mergers and acquisitions (M&As) network integrations. Better validation of network designs. Download this whitepaper to read about how to implement these use cases.

案例研究 2020-06-24

PDF PDF
How to Select Your Next Oscilloscope: 12 Tips on What to Consider Before You Buy
How to select an oscilloscope to meet your specific measurement needs and budget is an important task. Read this oscilloscope selection guide first.

案例研究 2020-06-24

PDF PDF
How to Test and Troubleshoot USB4
USB4 is a hardware interface that supports several protocols through the USB Type-C connector. Based on the Thunderbolt protocol specification, the USB4 architecture doubles the bandwidth of USB and enables multiple simultaneous data and display protocols.

案例研究 2020-06-23

PDF PDF
Satellites Bolster 5G Through Non-Terrestrial Networks
Unlike previous cellular network technologies, the 3rd Generation Partnership Project is planning to make 5G into a network that incorporates satellites to augment terrestrial 5G networks. These non-terrestrial networks will extend the reach of 5G to regions lacking terrestrial infrastructure.

案例研究 2020-06-22

PDF PDF
Less Downtime and Faster Recovery
The potential cost of network downtime can run into thousands of dollars — per minute. To mitigate the effects of, or even prevent a network outage, it is critical to have a robust troubleshooting system in place that delivers complete insight into the network through a visibility architecture. To improve network reliability, organizations need to establish greater visibility of the data that flows through their networks, where it goes, and how to control it. This paper outlines how to use network visibility to reduce troubleshooting time and expense.

案例研究 2020-06-19

PDF PDF
Increasing Visibility with Ixia’s Vision ONE(TM)
SANS conducted a review of the Ixia Vision ONE network packet broker (NPB). The product was put into multiple different configurations and then tested to see if the functionality behaved as stated. This examination not only included basic functions but also included advanced application deployments like inline architectures, TLS/SSL decryption, application-level detection and filtering, and NetFlow generation. See for yourself what SANS had to say about the Ixia solution.

專文 2020-06-19

PDF PDF
Threat Hunting 101
While security threats in general are a consistent concern for IT departments, the specific types of security threats change over time. For instance, according to the WatchGuard Internet Security Report - Q1 2019, cyber attackers are altering their forms of security attacks that includes: an increase in malware, changes in network attacks, new Mac adware variants, and a surge in web application attacks (like XSS and SQLi). This is important because what you do not know about the security of your network really will hurt you. Since security threats are changing, this could mean that you also need to change, or at least augment, your security tactics. One tactic that has been increasing for a couple years now is to actively hunt for threats on your network. Passive security practices just aren’t good enough anymore. You need to be proactive to stop a breach, as the threats themselves have become much more sophisticated and harder to detect. Read this white paper to get an overview what you need to start a threat hunting practice and how to go about it.

案例研究 2020-06-19

PDF PDF

1 2 3 4 5 6 7 8 9 10 ... 下一頁