Unified Logging since Oct 2011
Founder
Clydesdale Software since Sep 2007
Founder
Blue Dot Solutions Feb 2011 - Jul 2011
Technical Program Director
BlueDot Solutions 2007 - 2008
Product Architect
Front Range Code Camp Nov 2006 - May 2007
Conference Organizer
Education:
Colorado School of Mines
BS, Major: Mathematics and Computer Science Minor: Business and Economics
Skills:
Agile Methodologies Scrum Software Development C# Web Services Cloud Computing .Net Enterprise Software Architecture Software Engineering Microsoft Sql Server Oracle Software Project Management Visual Studio Databases Web Development Strategic Planning Team Building Test Driven Development Integration Agile Extreme Programming Mobile Html Linq Windows Javascript Saas Wcf Product Management Enterprise Architecture Mobile Devices Process Improvement Iot Web Applications Sql Soa Asp.net Product Development Situational Leadership Windows Azure Amazon Web Services Test Automation Twilio Kanban Docker
- Carmel IN, US Gregory Ross - Carmel IN, US Seth Kaufman - Denver CO, US Dakoda Johnson - Carmel IN, US Christopher Bauer - Morrison CO, US John Luif - Lakewood CO, US John Evenson - Greentown IN, US Lakshmi Santhanakrishnan - Carmel IN, US Mark Duckworth - Littleton CO, US Keith R. Broerman - Loveland OH, US Joseph W. Baumgarte - Carmel IN, US Matthew Dexter - Indianapolis IN, US Benjamin J. Hopkins - Zionsville IN, US David Studt - Noblesville IN, US
An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.
- Carmel IN, US Joseph W. Baumgarte - Carmel IN, US John Luif - Lakewood CO, US
International Classification:
G07C 9/00 E05B 47/00
Abstract:
An exemplary embodiment pertains to a method of operating an electronic lockset during a plurality of iterations of a recurring period of time, wherein the electronic lockset includes a first electronic component. The method generally includes generating a usage score for the electronic component based on usage of the electronic lockset during the first iteration of the recurring period of time, selecting a schedule for the electronic component based on the first usage score, and during a second iteration of the recurring period of time occurring after the first iteration of the recurring period of time, operating the electronic component operating according to the selected schedule.
- Carmel IN, US Joseph W. Baumgarte - Carmel IN, US John Luif - Lakewood CO, US
International Classification:
G07C 9/00 E05B 47/00
Abstract:
An exemplary embodiment pertains to a method of operating an electronic lockset during a plurality of iterations of a recurring period of time, wherein the electronic lockset includes a first electronic component. The method generally includes generating a usage score for the electronic component based on usage of the electronic lockset during the first iteration of the recurring period of time, selecting a schedule for the electronic component based on the first usage score, and during a second iteration of the recurring period of time occurring after the first iteration of the recurring period of time, operating the electronic component operating according to the selected schedule.
- Carmel IN, US Gregory Ross - Carmel IN, US Seth Kaufman - Denver CO, US Dakoda Johnson - Carmel IN, US Christopher Bauer - Morrison CO, US John Luif - Lakewood CO, US John Evenson - Greentown IN, US Lakshmi Santhanakrishnan - Carmel IN, US Mark Duckworth - Littleton CO, US Keith R. Broerman - Loveland OH, US Joseph W. Baumgarte - Carmel IN, US Matthew Dexter - Indianapolis IN, US Benjamin J. Hopkins - Zionsville IN, US David Studt - Noblesville IN, US
An access control system and methods according to at least one embodiment leverage wireless access credentials to allow a user to securely gain access to a secured area using his or her mobile device. As such, a credentialed mobile device may permit access to the secured area without requiring a real-time connection to a credential management system and/or an administrative system.
Youtube
Carson vs Luif
IKWF State 2019, Win 12-4.
Duration:
6m 53s
120 Lbs Champ. Round 4 - Kameron Luif, IL Vs ...
Flosports-partne... Brian Keck Memorial Preseason Nationals-Recrui......
Duration:
9m 49s
8U 45 Dane Luif Team El1te Wrestling Vs Zayne...
2021 Folkstyle Nationals - 8U 45 Dane Luif Team El1te Wrestling Vs Zay...
Duration:
1m 27s
Marianne Luif & Jim van der Woude (English su...
Ondertitels kunnen uitgezet worden. Subtitles can be put off. Elderly ...
Duration:
5m 14s
1989 WB WR Dan Luif IHSA Regional @ York.avi
Duration:
5m 49s
106 Lbs Champ. Round 2 - Kameron Luif, Team E...
FloSports/2022 USMC Folkstyle National Championships & Recruiting Show...