This part of the documentation goes deeper into the TIM Anomaly Detection solution. We invite you to explore the following sections:
- How it works - Learn more about how the solution is designed.
- Configuration - All the available parameters that can be adjusted to user's specific needs.
- Outputs - Understand TIM's outputs.
- Solution templates - See TIM in action by following the manuals on how to apply it to specific use cases from different industries.