您可能感興趣的網頁。 觀看搜尋結果:

 

聯絡是德專家

技術支援

電子量測

依產品型號搜尋可用的支援:

縮小範圍

依產業/技術

依內容類型

依產品分類

1-25 / 775

排序:
Design and Simulation of 5G 28-GHz Phased Array Transceiver Webcast
August 3, 2017

網路廣播 -- 存檔

No Title

研討會講義 2020-08-18

MP4 MP4
2020/01- 2020/12 台灣是德科技教育訓練中心課程表
上課時間: 09:00 ~ 17:00 上課地點: 台灣是德科技教育訓練中心 (桃園縣平鎮市高雙路20號) 教育訓練中心網址: http://www.keysight.com.tw

教室教育訓練

Keysight EEsof EDA Training Course Calendar (Europe)
Scheduled Keysight EEsof Courses for EMEAI

教室教育訓練

Best Practices for Network Security Threat Hunting
Learn how you can go beyond the traditional perimeter security provided by a firewall, IPS, etc. to actively search for threats that have infiltrated your network.Threat hunting looks at data at rest (e.g. data lakes) and at data on the move (i.e. the data flowing in and out of servers). This capability allows you to deploy a solution to either analyze data in real-time or at a later date to determine if your network has been compromised.This webinar will define the benefits of threat hunting and best practices for deployment of threat hunting.

研討會講義 2020-06-04

MP4 MP4
NetOps and SecOps: “Can’t We All Just Get Along?
Things used to be simple. The Networking team focused on network performance and availability while Security teams dealt with threats to performance. Today, the growth of cloud, virtualization, and everything-as-a-service has changed all this, blurring the lines between NetOps and SecOps and creating a need for better alignment and sharing of data. Attend this session to hear experts from ExtraHop and Ixia will reveal new insights into best practices for alignment and delivering the right data—even if it’s the same data—to each team. We’ll cover:Changing focus and emerging challenges for networking, security, and cloud teamsActions to take to streamline operationsTips for improving performance and security

研討會講義 2020-06-04

MP4 MP4
Privacy and Protection in the Changing World of SSL
SSL encryption is one of the key enabling technologies of the Internet. We use it for e-commerce, collaborating with partners, and even email. But increasingly, encryption is also used to shield malicious activities – such as malware and ransomware downloads – from detection by network security devices. Join this interactive webinar to learn:- How the new TLS1.3 standard increases both privacy and the difficulty in detecting malware and data leak- Understand best practices for adapting to the changing environment

研討會講義 2020-06-04

MP4 MP4
Is Your Network Ready for the Work from Home Surge?
Are your collaboration, voice, and video applications struggling to keep up with an influx of remote connections? It’s hard to perform at your best if your network isn’t performing at its best. You need to focus on business — not whether the next conference call is going to work. Join this webinar and discover how active network monitoring can help you minimize service disruptions and get back on track. You will learn how to:verify network readiness for unexpected events, like a significant increase in teleworking users and VPN loadvalidate quality of experience, troubleshoot bottlenecks, and pinpoint where to increase bandwidth or adjust network quality of servicetroubleshoot faster by identifying whether performance issues stem from your network, your carrier, your applications, or your users’ connection

研討會講義 2020-06-04

MP4 MP4
Best Practices for Network Security Resilience
It’s not a question of IF your network will be breached, but WHEN. News broadcasts for the last several years have shown that most enterprise networks will be hacked at some point. In addition, the time it takes for most IT departments to notice the intrusion usually takes months—over six months according to the Ponemon Institute. This gives hackers plenty of time to find what they want and exfiltrate whatever information they want. There are some clear things that you can do to minimize your corporate risk and the potential costs of a breach. One new approach is to create a resilient security architecture model. The intent of this model is to create a solution that gets the network back up and running after a breach has occurred, as fast as possible. While prevention should always be a key security architecture goal, a resilient architecture goal focusses on recognizing the breach, investigating the breach, and then remediating the damage as quickly as possible.At this webinar you’ll learn:What network security resilience isThe benefits of this security techniqueExamples of visibility and security solutions that you can implement to reduce the time to remediation 

研討會講義 2020-06-04

MP4 MP4
Finding Evil Wherever it Lurks- Webinar on Demand
New cyberattacks appear every day and defenders need to stay a step ahead. If protecting your network, hybrid clouds, and business operations feels like a race against time, attend this timely session to learn new strategies used by the world’s leading security experts.Experts from FireEye and Ixia will explore the power of advanced network visibility in detecting threats in real time to optimize investigations and forensics. Join this webinar to see what visibility means to a typical day in the life of security operations including:Detecting threats and acting fasterGaining complete visibility across your network, hybrid clouds, and business operationsProviding forensics teams with better dataAs network perimeters vanish, visibility proves vital to monitoring and securing performance, meeting compliance mandates, and side-stepping data breaches.Register for this webinar now and get a real-world take on creating the visibility and peace of mind you deserve.

研討會講義 2020-06-04

MP4 MP4
ActualTech Media + Ixia: Monitoring and Performance EcoCast
Today’s enterprise data centers have become so complex that even teams of experts struggle to keep critical applications running at peak performance to meet the end user expectation of the “always on" data center. What infrastructure administrators really need are smart tools that can give them visibility across silos, through clouds, and into applications.But how do you get there? How do you identify root cause, manage performance, and prevent problems before they happen? And how do you do that across complex data centers and even into the public cloud? How do you find the time to prevent downtime, keep the users happy, and keep your job?Join us for this on-demand webinar.

研討會講義 2020-06-04

MP4 MP4
Getting Ahead of the Curve: Avoiding Outages with Active Network Monitoring
When your business depends upon the network, the cost of downtime and outages is too much to bear. Productivity is the engine of business — but network downtime can bring that to a screeching halt. But what if you could get ahead of outages and resolve performance problems before they ever affect your users? In this webinar, you’ll discover how Active Network Monitoring helps you do just that.Join this webinar and learn how to:prevent downtime by proactively probing your network for potential problems maintain quality-of-service from core to edge by monitoring distributed endpointsensure high-quality experiences for users by tracking the right metrics in real time 

研討會講義 2020-06-04

MP4 MP4
Every second counts: get your flyaway kit to speed incident response
Studies show that it still takes an average of 69 days to contain data breaches and that breaches would cost $1 Million less if they could be contained within one month. Even so, most companies still don’t have a formal incident response plan in place.Attend this session to put time on your side. Visibility and security experts from Bricata and Ixia will show how you can quickly pull the essential data out of your network and use it to stop threats faster – no matter where they are – using Incident Response Flyaway Kits to create portable visibility.We’ll share leading-edge best practices for:Tapping into critical data anywhere in your networkPrioritizing remediation and containment effortsCreating and leveraging metadataUsing portable “Flyaway Kits” to speed response and forensicsExperts from Bricata and Ixia will show you how you can see what need to see – and what you’ve been missing — whether it’s hiding within endpoints, central systems, or hard-to-track communications between the two.Learn how to get the right Flyaway Kits for your team, and why you can’t afford not to!

研討會講義 2020-06-04

MP4 MP4
Ovum + Ixia: What You Can Do To Strengthen Security Over Your Clouds
Cloud is transforming enterprises in every segment, yet security in the cloud may not be as strong as it should be. Responsibility for the security of data, applications, and services in the cloud remains with the enterprise, but control is limited. View this webinar to hear Maxine Holt, Research Director of Ovum, detail how to make your hybrid cloud environment visible and secure.Learn about how:Cloud expands your attack surface Your security architecture needs to adaptTo keep pace with cloud adoptionDiscover how you can leverage your existing security solutions to keep your cloud data, applications, and customer experience safe from cyberattacks.

研討會講義 2020-06-04

MP4 MP4
SANS Review on BreakingPoint: A Multi-Function Tool for Application and Security Testing Webinar
The ability to thoroughly test equipment during a proof of concept phase, or understand how an environment handles DOS attacks, is critical to enterprise decision makers. Watch this webinar to hear from SANS Analyst Serge Borso as he discusses the insights he gained during his hands-on testing of the BreakingPoint appliance.Ixia’s BreakingPoint is a multifaceted tool used to provide actionable data in the realm of network security testing and infrastructure validation. BreakingPoint works by simulating traffic aimed at your network appliances and applications. In this webcast, you will also hear from Ixia’s product expert, Sashi Jeyaretnam, as she details scenarios where the tool can offer some unexpected wins for your enterprise.

研討會講義 2020-06-04

MP4 MP4
ActualTech Media + Ixia: Visibility Solutions EcoCast
In case you haven’t noticed, the enterprise network is changing, and changing fast. Traditional physical routers, switches, and firewalls are quickly being replaced by their software-defined counterparts, networks are moving to the cloud, and networks are spanning the world. How is the enterprise to not only leverage the latest network innovations but just try to keep pace? We have the answer!You will hear from Ixia, Cumulus Networks, Big Switch Networks and Pluribus Networks about how the latest network innovations can help your company and how to make the transition to a more efficient, more scalable, more secure, and less costly network of the future.

研討會講義 2020-06-04

MP4 MP4
5G NR Signaling Parameters and the Applications in UXM eLearning Program
This course will help users of the E7515B UXM 5G gain a deep understanding of the 5G signaling process and ASN parameters used in the UXM 5G Test Application. It will also help non-UXM 5G engineers understand the 5G signaling process and how higher layer signaling assigns physical layer resources.

訓練教材 2020-06-03

PDF PDF
5G NR Systems and Fundamentals eLearning Program
Build a strong foundation and understanding of the 5G NR network, air interface, and signaling protocols to get the most productivity and value from Keysight 5G measurement solutions.

訓練教材 2020-06-03

PDF PDF
O-RAN for 5G: The Path Forward

網路廣播 2020-05-23

HTML?D2C=2281662&ISSOCIALSHARING=Y&PARTNERREF=EMAILSHAREFROMGATEWAY HTML?D2C=2281662&ISSOCIALSHARING=Y&PARTNERREF=EMAILSHAREFROMGATEWAY
Webinar: Space Talk: Channel Emulation

訓練教材 2020-05-15

Webcast - Radio Propagation Channel Modeling Fundamentals

訓練教材 2020-05-15

Webinar: 5G NR Massive MIMO Testing with Channel Emulation

訓練教材 2020-05-15

Webinar: 5G Non-Terrestrial Networks — Overview & Focus on Satellite Link Simulation

訓練教材 2020-05-15

Webinar: From LTE to 5G MIMO Over-the-Air Testing: Challenges and Solutions

訓練教材 2020-05-15

Bench Power Supply Basics – Masterclass
Get best practices and tips for testing low power and noise sensitive devices.

自主教育訓練 2020-04-23

1 2 3 4 5 6 7 8 9 10 ... 下一頁