Projects

Evidence that I can turn messy workflows into working systems.

These projects show different sides of the same builder profile: B2B SaaS, privacy-first consumer software, applied AI, infrastructure, cybersecurity, automation, and founder-led delivery.

Primary case studies

Public or portfolio-safe work.

The public case studies include real screenshots where available. Atlas intentionally uses placeholders until Caleb provides real app screenshots.

SuitFlow product preview
B2B SaaS

SuitFlow

Formalwear operations software for weddings, measurements, tailoring, special orders, customers, follow-ups, messaging, staff access, and billing.

  • Technical founder
  • Workflow design
  • Operations SaaS
Stammen Technology homepage
Founder work

Stammen Technology

Custom software, AI, web development, ecommerce, mobile applications, automation, and SaaS foundations for businesses outgrowing disconnected tools.

  • Client delivery
  • AI automation
  • Custom systems
Selected technical work

Sanitized where the details are private.

Some of the strongest work is internal. These summaries avoid employer-sensitive details while showing the type of problem, technical approach, and operational value.

Applied AI

Garmann Miller AI systems

Internal AI systems supporting architecture workflows, including meeting minutes, onboarding, communications, project information routing, intranet, learning, and knowledge workflows.

  • AI adoption
  • Microsoft ecosystem
  • Workflow automation
  • Security-aware rollout
Manufacturing systems

Pax Machine Works infrastructure and automation

Infrastructure, cybersecurity, industrial networking, recovery planning, vendor coordination, and a custom C# automation that current resume material reports saved 200+ labor hours annually.

  • IT/OT network
  • C# automation
  • NIST-aligned security
  • Disaster recovery
Cybersecurity education

Enterprise attack simulation and incident response capstone

B.S. capstone work simulated an enterprise network under attack, demonstrated how to stop the attack, identified security weaknesses, and included disaster recovery and business continuity planning.

  • Incident response
  • Network security
  • Business continuity
  • Technical writing
Graduate cybersecurity

Secure network design, security operations, and secure software

Graduate work at WGU covered secure network design, security operations, secure software design, cloud security, penetration testing, cybersecurity architecture, governance, risk, and management.

  • Secure network design
  • Security operations
  • Secure software design
  • Cloud security
What this demonstrates

Builder range without losing the thread.

AI, software, infrastructure, cybersecurity, and product work all point to the same thing: I like systems that solve real problems and can be trusted after launch.