Adam Compton

Adam Compton
Director of Strategy
Adam Compton is the Director of Strategy for Schneider Electric, where he leads business strategy for the North American business, focused on IT and data center markets and applications for high available power and cooling solutions. With over 20 years of experience, originally hailing from APC, he is responsible for monitoring and analyzing market intelligence towards the goal of revenue growth for Schneider Electric. As an entrepreneurial leader, Adam attends industry conferences and is a mentor capable of directing large cross-functional teams. He also serves on the Board of Directors for Junior Achievement of Rhode Island and received a Bachelor...
Adam Compton is the Director of Strategy for Schneider Electric, where he leads business strategy for the North American business, focused on IT and data center markets and applications for high available power and cooling solutions. With over 20 years of experience, originally hailing from APC, he is responsible for monitoring and analyzing market intelligence towards the goal of revenue growth for Schneider Electric. As an entrepreneurial leader, Adam attends industry conferences and is a mentor capable of directing large cross-functional teams. He also serves on the Board of Directors for Junior Achievement of Rhode Island and received a Bachelor of Science in English from Tulane University.
Articles

Justifying IT Infrastructure Spend with Edge Computing to Improve Manufacturing Sustainability
4 min read | Adam Compton

How to defend your IT infrastructure against cybersecurity issues with edge computing
5 min read | Adam Compton
Bloggers you may also like

Chad Lloyd
Most recent post: Mitigating network intrusion risks: Best practices for colocation & hyperscale data centers

Kevin Brown
SVP, EcoStruxure Solutions, Secure Power Division
Most recent post: Minimizing cyber risk and doing it in a simplified way – the key to secure IT infrastructure success

Guest Blogger
Most recent post: Maintaining long-term security for critical electrical installations