Enable browser cookies for improved site capabilities and performance.
Keysight Technologies Keysight Blogs
Toggle Menu
Search Blogs
  • Insights
    • Simulation + Design
    • Benchtop
    • RF + Microwave
    • High Volume Traffic Generators
    • Network Visibility + Security
    • Education/University
    • Archived Blogs
  • Industries
  • Get to Know Keysight
    • Culture
    • Corporate Social Responsibility
    • Executive Perspectives

Network Apps & Security Blog Team

High Volume Traffic Generators

Take CyPerf for a Free Test Drive

Network Apps & Security Blog Team 2022.04.22

By Daniel Munteanu | In a world where everything is done on the rush, it is difficult to find time to play with new ‘toys’ like evaluating new products. Especially when those products are a bit more c

4 min read

#Network Test

High Volume Traffic Generators

SONiC Testbed in a Box

Network Apps & Security Blog Team 2022.04.22

By Nitesh Jha | Testing is one of the integral components of any software or hardware product. It has taken various forms and evolved over a period of time from manual test, automated test, unit test,

6 min read

#Network Test

High Volume Traffic Generators

Is PCEP/BGP-LS-based SDN Approach Ideal Choice for Service Providers?

Network Apps & Security Blog Team 2022.01.05

By Kirit Bhamre | The Software Defined Networking (SDN) movement offers greater benefits to make networks more customized, efficient, application centric, and programmable. There are many different ap

4 min read

#Network Test

High Volume Traffic Generators

How to make sure SONiC is failsafe

Network Apps & Security Blog Team 2021.09.08

By Kamal Sahu | Modern day data centers rely on IPCLOS architecture, which involves few hundreds to thousands of switches. Maintenance and upgrade of these switches are inevitable. In a recent study b

4 min read

#Network Test

High Volume Traffic Generators

Benchmarking datacenter KPIs for SONiC

Network Apps & Security Blog Team 2021.04.08

By Kamal Sahu | Modern day data centers are simplifying their design by using IPCLOS leaf spine architecture to implement their switch fabrics. Border Gateway Protocol or BGP is the key protocol that

4 min read

#Network Test

Network Visibility + Security

A look at the ProxyLogon Microsoft Exchange vulnerability (CVE-2021-26855)

Network Apps & Security Blog Team 2021.03.16

Multiple PoCs and write-ups on the notorious “ProxyLogon” Microsoft Exchange Server vulnerabilities have been made public. Although full chain exploits are still kept away from the wider audience, cha

5 min read

#Cybersecurity

  • © Keysight Technologies 2000–2023