際際滷shows by User: bradn / http://www.slideshare.net/images/logo.gif 際際滷shows by User: bradn / Fri, 10 Nov 2017 20:20:42 GMT 際際滷Share feed for 際際滷shows by User: bradn Maintenance, Machine Learning and the IIoT - Brad Nicholas Keynote Xcelerate17 /slideshow/maintenance-machine-learning-and-the-iiot-brad-nicholas-keynote-xcelerate17/81868216 bnicholasuptakexcellerate17keynotev7-171110202042
Brad Nicholas from Uptake delivers the keynote presentation for day 1 of the 2017 Xcelerate Fluke/eMaint CMMS conference. As IIoT adoption expands actionable insight at scale becomes possible. Maintenance staff will play a critical role in realizing the improved performance made possible by machine learning. ]]>

Brad Nicholas from Uptake delivers the keynote presentation for day 1 of the 2017 Xcelerate Fluke/eMaint CMMS conference. As IIoT adoption expands actionable insight at scale becomes possible. Maintenance staff will play a critical role in realizing the improved performance made possible by machine learning. ]]>
Fri, 10 Nov 2017 20:20:42 GMT /slideshow/maintenance-machine-learning-and-the-iiot-brad-nicholas-keynote-xcelerate17/81868216 bradn@slideshare.net(bradn) Maintenance, Machine Learning and the IIoT - Brad Nicholas Keynote Xcelerate17 bradn Brad Nicholas from Uptake delivers the keynote presentation for day 1 of the 2017 Xcelerate Fluke/eMaint CMMS conference. As IIoT adoption expands actionable insight at scale becomes possible. Maintenance staff will play a critical role in realizing the improved performance made possible by machine learning. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bnicholasuptakexcellerate17keynotev7-171110202042-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Brad Nicholas from Uptake delivers the keynote presentation for day 1 of the 2017 Xcelerate Fluke/eMaint CMMS conference. As IIoT adoption expands actionable insight at scale becomes possible. Maintenance staff will play a critical role in realizing the improved performance made possible by machine learning.
Maintenance, Machine Learning and the IIoT - Brad Nicholas Keynote Xcelerate17 from Brad Nicholas
]]>
315 1 https://cdn.slidesharecdn.com/ss_thumbnails/bnicholasuptakexcellerate17keynotev7-171110202042-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Edge patterns in the IIoT /bradn/edge-patterns-in-the-iiot edgepatterns-chicagoiotmarch2017-170324042217
Three key patterns for edge computing that are useful for determining the right approach to deploying Industrial Internet solutions]]>

Three key patterns for edge computing that are useful for determining the right approach to deploying Industrial Internet solutions]]>
Fri, 24 Mar 2017 04:22:17 GMT /bradn/edge-patterns-in-the-iiot bradn@slideshare.net(bradn) Edge patterns in the IIoT bradn Three key patterns for edge computing that are useful for determining the right approach to deploying Industrial Internet solutions <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/edgepatterns-chicagoiotmarch2017-170324042217-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Three key patterns for edge computing that are useful for determining the right approach to deploying Industrial Internet solutions
Edge patterns in the IIoT from Brad Nicholas
]]>
906 2 https://cdn.slidesharecdn.com/ss_thumbnails/edgepatterns-chicagoiotmarch2017-170324042217-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Countering Cybersecurity Risk in Today's IoT World /slideshow/countering-cybersecurity-risk-in-todays-iot-world/58440863 cif-iot-security-feb-2016-160218205250
Understanding the security implications of IoT transformation, with real world examples including the Chrysler Jeep Hack]]>

Understanding the security implications of IoT transformation, with real world examples including the Chrysler Jeep Hack]]>
Thu, 18 Feb 2016 20:52:50 GMT /slideshow/countering-cybersecurity-risk-in-todays-iot-world/58440863 bradn@slideshare.net(bradn) Countering Cybersecurity Risk in Today's IoT World bradn Understanding the security implications of IoT transformation, with real world examples including the Chrysler Jeep Hack <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cif-iot-security-feb-2016-160218205250-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understanding the security implications of IoT transformation, with real world examples including the Chrysler Jeep Hack
Countering Cybersecurity Risk in Today's IoT World from Brad Nicholas
]]>
949 9 https://cdn.slidesharecdn.com/ss_thumbnails/cif-iot-security-feb-2016-160218205250-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-bradn-48x48.jpg?cb=1620738847 High tech product management leader. Managed a $50M P&L to growth and profitability. Built a $25M business from zero revenue. I agree with Ben Horowitz that "Good product managers are the marketing counterpart of the engineering manager". Exceptional product / solutions development comes when the product management and engineering leadership work as trusted peers. Mobile web-scale applications. B2B solutions and services. Smart Connected Products leveraging hardware, embedded software, networks and cloud infrastructure. Complex solution selling, strategic partnerships (OEM, distribution, JV). Internet of Things / Internet of Everything, Cloud services SaaS/IaaS/PaaS, smart d... https://cdn.slidesharecdn.com/ss_thumbnails/bnicholasuptakexcellerate17keynotev7-171110202042-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/maintenance-machine-learning-and-the-iiot-brad-nicholas-keynote-xcelerate17/81868216 Maintenance, Machine L... https://cdn.slidesharecdn.com/ss_thumbnails/edgepatterns-chicagoiotmarch2017-170324042217-thumbnail.jpg?width=320&height=320&fit=bounds bradn/edge-patterns-in-the-iiot Edge patterns in the IIoT https://cdn.slidesharecdn.com/ss_thumbnails/cif-iot-security-feb-2016-160218205250-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/countering-cybersecurity-risk-in-todays-iot-world/58440863 Countering Cybersecuri...