Post projects, get results.

Learn more and start today


Where I can help you:


I get IT. But I also strive for a deep understanding of your business.


There are many best practice solutions. And then, there's reality. I take both into account to engineer a solution, which fits you.


Change is a state of mind. I gladly assist you, if you need more than a new IT system.


Because your people deserve to do people-things.


Taking end-to-end ownership lets you focus on other important tasks.


Let's work together to achieve a common goal.

"Gerrit regularly delivers innovative ideas and implements them."



Because sometimes, being self-taught is not enough.

IREB CPRE IREB Certified Professional for Requirements Engineering
Docker Docker
Ansible for Network Automation Ansible for Network Automation
Strategic Information Management Strategic Information Management
Prevention of money laundering Prevention of money laundering
Information security Information security
Fraud prevention Fraud prevention

"Gerrit works independently, very thoroughly and systematically thought-out."



What I've done for people.

Facilitating risk identification

Managing projects is hard. Dealing with project risks is even harder. Abstract in nature, it's challenging to handle them in advance as well as after they became a reality. But by the Project Management Institute's definition risks don't have to be negative: Unexpected opportunities may be uncovered if uncertainties are dealt with professionally. An important task in project risk management is thus to perform an early and efficient project risk identification.

Oftentimes it is challenging to properly adress risks due to hierarchies, silo thinking and group dynamics within each team.

Together with US based researchers I created a system to identify project risks. At the end of a facilitated workshop, which takes only 2 hours, you will have:

  1. Identified the majority of your project risks
  2. Clustered the risks into manageable groups
  3. Prioritized them based on their importance
  4. Created an instant action plan to manage your risks right away

Wifi for guests

A Hotspot provides controlled internet access to guests and visitors of hotels, cafes, grocery stores, shopping malls and other venues with the desire to meet their customer's demands for Wifi.

Over several years, I continuously grew an entire system to where it is today – running at 4.1k venues world wide, serving 4.8 million unique users per year.

This growth required close and intense collaboration with key users and customers. Fostering a deep understand of the different user types was a necessity for success. After all, if you run a mall, you can certainly envision more value chains then if you'd run a small cafe. Never underestimate the creativity of small cafés, though.

Data Warehouse

The customer has been using a statistical portal for many years. It would generate reports regarding his 83 shopping malls. The catch: He had to wait more than 30 minutes after each click to finally see a result. Seriously annoyed, he wanted the results in a bearable time frame.

To produce relief, I created a custom data warehousing system, which tightly integrates with the source systems as well as the reporting platform. It periodically processes all incoming data and stores it in a reporting-friendly way. Its existence is transparent to the customer, as it unobtrusively embeds into his familiar reporting environment.

Since deploying the data warehouse, the customer gets his reports in 8 seconds.

Automated configuration and monitoring

The company had a lenghty process to configure their electronic products. Among other tasks, a staff member had to utilize a one-off tool to apply the settings to a single device. Changing a single setting meant redoing the entire process.

Now all products are managed in one central user friendly web interface. Initial configurations can be applied using custom templates, greatly reducing redundant activities. Changing settings later on really just requires adjusting the setting in question. In addition, changes can be applied to an arbitrary set of targets all at once.

Further measures to help the staff in their daily work were included: All managed devices can easily be added to monitoring systems, such as nagios. If a malfunction is detected, the tool also allows the staff to directly open a connection to the trouble maker using a single and easy login.


Let's get in touch. Send me a message:

Address: Inselwall 2, 38114 Braunschweig


VAT: DE321250006



Welcome visitor, you are free in here.

I won't provide cookies, but you might bring your own. We could eat some together. If you like things, feel free to tell me or the world, but you can also keep it a secret. If you want to stay in touch, leave a note.

No cookies, no tracking, no analytics. Automatic server logfiles are deleted regularly.

Privacy policy

Personal data (usually referred to just as "data" below) will only be processed by us to the extent necessary and for the purpose of providing a functional and user-friendly website, including its contents, and the services offered there.

I. Information about us as controllers of your data

The party responsible for this website (the "controller") for purposes of data protection law is found under Contact.

II. The rights of users and data subjects

With regard to the data processing to be described in more detail below, users and data subjects have the right to ...

In addition, the controller is obliged to inform all recipients to whom it discloses data of any such corrections, deletions, or restrictions placed on processing the same. However, this obligation does not apply if such notification is impossible or involves a disproportionate effort. Nevertheless, users have a right to information about these recipients.

Likewise, users and data subjects have the right to object to the controller's future processing of their data if feasible.

III. Information about the data processing

Your data processed when using our website will be deleted or blocked as soon as the purpose for its storage ceases to apply, provided the deletion of the same is not in breach of any statutory storage obligations or unless otherwise stipulated below.

Server data

For technical reasons, the following data sent by your internet browser to us will be collected, especially to ensure a secure and stable website: Server log files record the type and version of your browser, operating system, the website from which you came (referrer URL), the webpages on our site visited, the date and time of your visit, as well as the IP address from which you visited our site.

The data thus collected will be temporarily stored, but not in association with any other of your data.

Our legitimate interest lies in the improvement, stability, functionality, and security of our website.

The data will be deleted within no more than seven days, unless continued storage is required for evidentiary purposes. In which case, all or part of the data will be excluded from deletion until the investigation of the relevant incident is finally resolved.