Here’s the page we think you wanted. See search results instead:

 

Ixia, a Keysight Business, Enhances Active Network Monitoring Platform with Machine Learning

  
  

The following product photos are available for use by the media, based on the Keysight Photography Use Policy.

Image 1:
The Hawkeye “outlier dashboard” leverages machine learning algorithms to digest collected data and pinpoints the network or application problems that require attention. This outlier dashboard indicates that anomalies are detected for 3 different sites and for http download time, speedtest and datagrams out of sequence.

Download (2.4MB)

Image 2:
Hawkeye illustrates how machine learning is used to automatically detect meaningful anomalies in a voice application. You can see a jitter measurement graph and the “autolearned” threshold (in red) and time periods where sufficient measurements out-of-range are detected to trigger anomaly alert (in the solid blue part of the graph).

Download (3.4MB)

Related Information

Keysight Photography Use Policy:

We will permit use of Keysight photography available via this site as long as the use will not disparage Keysight nor imply endorsement by Keysight. The photography cannot be changed or manipulated in any way with the exception of resizing or cropping. By downloading our product photography you are indicating that you accept these terms. Any commercial use of these images must be approved by Keysight Technologies.

ALL IMAGES USED MUST INDICATE:
"Reproduced with Permission, Courtesy of Keysight Technologies, Inc."

How do I download images:

To download files in Windows, use the right mouse button on the desired format (JPEG or TIFF) and choose 'Save Target As...'