Categories
Webhosting Blog Server Uptime

2025-07-10: New: Web Hosting for Your Online Presence โ€“ Directly Managed by Your IT Service Provider

As your trusted IT service provider, I am now pleased to offer not only traditional IT services but also professional web hosting for your online presence. ๐Ÿ–ฅ๏ธ

What can you expect?

With my web hosting service, you will receive:

โœ… WordPress websites โ€“ customized to your individual needs.
โœ… Your own domain & email address โ€“ e.g. max.mustermann@your-domain.com.
โœ… Worry-free package โ€“ I handle the setup, maintenance, and security for you.

For more details, please visit my website under:
โžก๏ธ Private Clients => Homepage/Website or
โžก๏ธ Businesses => Website.

Technically up to date

Your WordPress site runs in a modern Docker container and is hosted on a virtual private server (VPS). This ensures high flexibility and performance.

๐Ÿ›ก๏ธ Security and backups:

  • Nightly automatic backups of your entire website (including Docker container) are performed.
  • Your emails are managed on a separate VPS using the reliable Mailcow software, enabling you to send and receive emails with your own domain and personalized addresses.

Professional management included

As your IT service provider, I take care of the complete administration and monitoring of your web hosting:

๐Ÿ”„ Regular security updates, including for WordPress and installed plugins.
๐Ÿšจ Monitoring to ensure your website is always online.
๐Ÿค Prompt assistance, should any issues arise.

Interested?

If you would like to host a new website affordably through me or move an existing WordPress installation, feel free to get in touch. ๐Ÿ“žโœ‰๏ธ
I will be happy to advise you individually and find the perfect solution for your project.

Categories
Blog Anonymity Future OpenSource Security

2025-07-06: Freedom first โ€“ and security follows naturally: Why IT must embrace openness

If thereโ€™s one thing Iโ€™ve learned in my many years working in IT, itโ€™s this: freedom is the foundation of everything we consider secure and trustworthy. Especially in technology, I constantly see how freedom is often sacrificed for the illusion of greater security. But in reality, itโ€™s quite the opposite: freedom is what truly enables real security in the first place.

You might be wondering what exactly I mean by that. Allow me to explain.

๐Ÿ” Freedom means control โ€” and that means security

When I speak of freedom in the context of IT, I primarily mean the freedom to decide for yourself what happens with your data. The freedom to use software as you see fit, fully aware of what it does behind the scenes.
The opposite of this is closed systems where you simply have to trust that a vendor is doing things right โ€” without ever being able to verify it.

โœ… Open Source software gives you this freedom back. Anyone can look at the source code and audit it. There are no hidden functions, no secret backdoors.
๐Ÿ”’ Encryption ensures that your data remains yours alone, accessible only to those you explicitly authorize โ€” and to no one else.

So it becomes clear: freedom isnโ€™t a risk here; itโ€™s your strongest safeguard. As a user or business, you retain control. And from that, true security follows automatically.

๐Ÿ•Š๏ธ Edward Snowden, Julian Assange โ€” and what that means for your IT

Edward Snowden revealed to the world just how deeply governments can invade our privacy when no one is watching. He warned us that surveillance and secrecy come at the expense of our freedom โ€” and ultimately undermine our security as well.

Julian Assange, through WikiLeaks, exposed abuses of power that would have remained hidden otherwise. He made sure misconduct came to light. Both, in their own way, demonstrated that without transparency, there can be no freedom. And without freedom, there is no genuine security.

This is not merely a political debate. It directly affects your IT systems every single day. Because the more you rely on closed platforms, the less you know about whatโ€™s happening behind the scenes. And the more you depend on mere promises, instead of verifiable facts.

๐Ÿ’ผ How I, as an IT service provider, turn freedom into a security strategy

This is why Iโ€™ve made it a point in my work as an IT service provider to rely consistently on freedom software. That means:

  • ๐ŸŒ I recommend open-source solutions, developed and reviewed by diverse communities.
  • ๐Ÿ”’ I implement strong encryption so your data truly belongs to you.
  • โœ… I rely on open standards that wonโ€™t lock you into a single vendorโ€™s ecosystem.

This not only protects your privacy but also makes your systems more robust overall. Because flaws are detected and fixed more quickly. Because if needed, you can always switch providers or adapt the software without having to overhaul your entire business infrastructure.

In this way, freedom becomes the very foundation of your security โ€” not its opponent.

โœ‰๏ธ My invitation to you

I invite you to take this thought with you:
Freedom first โ€” and security will follow naturally.

Letโ€™s work together to ensure your IT is set up so that you can act confidently and securely, not just today, but well into the future. For you as an individual, for your company, and for a digital world where we all get to keep our freedom.

If youโ€™d like, Iโ€™d be glad to show you exactly what this could look like for your specific situation. Please feel free to reach out to me.

Categories
Finance Anonymity Bitcoin Blog Future Security

2025-06-24: Digital Euro: Progress at the Expense of Freedom & Privacy?

The European Central Bank is actively working on the introduction of the digital euro โ€“ a state-issued digital currency designed to complement the existing payment system. While this move is presented as modern and innovative, it’s important to pause and ask a fundamental question: What impact will the digital euro have on our freedom, our privacy โ€“ and our ability to choose how we pay?

๐Ÿ’ธ Cash โ€“ Tangible Freedom in Your Pocket

Cash is more than just a payment method. It represents personal freedom, built-in privacy, and one of the last ways to make purchases without leaving a digital trail. With cash, you decide when, where, and how you spend your money โ€“ without oversight or restrictions.

And yet, cash is increasingly being marginalized. Discussions about limits on cash payments, withdrawal restrictions, or even calls for its gradual phase-out are becoming more common. This is concerning, because cash serves as a safeguard against surveillance and financial overreach. ๐Ÿ›ก๏ธ

๐Ÿฆ What Is the Digital Euro โ€“ and Whatโ€™s the Issue?

The digital euro would be a legal tender in digital form โ€“ issued directly by the central bank. Unlike cash, it would not be anonymous, but instead technically traceable by design. Transactions could be tracked, monitored in real time, and even influenced or restricted.

Centralized digital currencies make it technically possible to:

  • โŒ limit spending (by amount, category, or time),
  • ๐Ÿ”’ block or pre-approve transactions,
  • โณ apply expiration dates or negative interest rates.

While such features might seem practical in certain scenarios, they also open the door to significant interference in individual financial autonomy. This isnโ€™t about criticizing institutions, but rather about preserving a healthy balance between innovation and civil liberties.

โ‚ฟ Bitcoin โ€“ Digital Sovereignty Without Central Control

In contrast, Bitcoin operates on a fundamentally different principle. It is a decentralized digital monetary system, not controlled by any government or corporation. Transactions are verified by a global network, not a central authority.

Privacy by structure: With Bitcoin, you donโ€™t need a bank account, approval, or to share personal data to send or receive payments. When used correctly, Bitcoin offers a high degree of financial privacy, much like cash โ€“ but in a digital, global form. ๐ŸŒ

โœ… Why Bitcoin Makes Sense
  • โš™๏ธ Decentralized by design: No central authority, no censorship.
  • ๐ŸŒ Globally accessible: Anyone with an internet connection can use it.
  • ๐Ÿ•ต๏ธ Private in practice: No personal information required.
  • ๐Ÿ”’ Inflation-proof: Bitcoinโ€™s supply is capped at 21 million.
  • ๐Ÿ—ฝ Independent: No third party can freeze or limit your assets.

Bitcoin isnโ€™t just a digital currency โ€“ itโ€™s a tool for freedom and financial independence in the digital age.

๐Ÿงญ Conclusion: Payment Freedom โ€“ Offline and Online

Whether paying with coins at a store or sending a transaction from your phone โ€“ you should always be free to choose the payment method that suits you. The digital euro may offer certain conveniences, but it must never replace or restrict access to cash or alternatives like Bitcoin.

๐Ÿ’ต Cash must remain a free, anonymous means of payment. And Bitcoin offers its digital counterpart โ€“ independent, global, and privacy-respecting.

๐Ÿค Want to learn more about Bitcoin โ€“ as an individual or for your business?

As an IT service provider and expert, I support private clients and businesses in understanding, using, and integrating Bitcoin safely and effectively.

๐Ÿ“ฉ Feel free to contact me โ€“ for a future of digital freedom and self-determination.

Categories
Blog Anonymity Messenger Security Server

2025-06-15: Use WhatsApp securely with a Proxy

In an age where data privacy is increasingly important, it’s essential to be aware of your digital footprint. Messaging apps like WhatsApp, operated by Meta (formerly Facebook), collect a wide range of metadata โ€” even though message content is end-to-end encrypted.

Fortunately, there’s a solution for anyone who wants to continue using WhatsApp without exposing their connection details: my free WhatsApp Proxy Service! ๐ŸŒ๐Ÿ”

What Does My WhatsApp Proxy Do?

My WhatsApp proxy service acts as an intermediary between your device and WhatsApp’s servers. Instead of connecting directly to Meta’s servers, your data traffic is routed through my proxy. This means:

  • โœ‰๏ธ Hidden IP Address: WhatsApp (i.e., Meta) no longer sees your real IP address, preventing them from determining your location or internet provider.
  • ๐ŸŒ No Geo-Tracking: The detour via proxy makes it nearly impossible to track your location.
  • ๐Ÿ”’ Encrypted Communication: All data is transmitted using SSL encryption.
  • โ›”๏ธ Minimal Metadata: Information about your device, region, or connection time is significantly reduced.
  • ๐Ÿ’ก Free and Anonymous: The service is completely free and requires no registration.
How to Set Up the WhatsApp Proxy ๐Ÿ“ฑ
  1. Open WhatsApp and tap the three dots in the top right corner (โ‹ฎ).
  2. Navigate to Settings > Storage and Data > Proxy.
  3. Enable Use Proxy.
  4. Tap on Set up Proxy and enter the following details:
    • Proxy Host: whatsapp.cmdsrv.de or alternatively 128.140.60.104
    • Chat Port: 7001
    • Media Port: 7007
  5. Confirm by tapping the check mark โœ….
  6. It should now display “Connected”.

And thatโ€™s it โ€” you’re securely connected via my proxy! ๐Ÿ”

Why Using a WhatsApp Proxy Makes Sense โ“

Meta makes its money through ads and analytics โ€” not just by what you write, but by tracking when, where, how, and with whom you communicate. Even without accessing your message content, Meta knows when you’re online, who you’re chatting with, and from where.

Conclusion โœ…

My WhatsApp Proxy Service offers a simple, effective tool to enhance your digital privacy. No registration, no fees โ€” just real benefits:

โญ More privacy, less surveillance.

Try it out yourself and feel free to share this information with others who value digital self-determination. ๐Ÿค

I am an IT specialist focused on networks and server services. I am happy to assist with technical questions or custom requirements. Feel free to get in touch โ€” inquiries are always welcome.

Categories
Blog Messenger OpenSource Security Server

2025-06-11: Replace Microsoft Teams with Matrix & Element

In a time when data protection, digital sovereignty, and cost control are more important than ever, many companies are looking for a real alternative to Microsoft Teams. As an IT service provider, I offer exactly that: a powerful, modern communication solution โ€“ based on the Matrix protocol and the open-source Element interface.

๐Ÿงฉ What is Element โ€“ and what is Matrix?
  • Element X / Element Web is the front-end interface for messaging, file sharing, and video conferencing โ€“ available on laptops, smartphones, and tablets.
  • Matrix Synapse is the backend โ€“ it runs on your own server and handles secure, decentralized communication.
๐Ÿ›ก๏ธ Full control over your data โ€“ no dependency on Microsoft

With my solution, every company runs its own communication server in a German data center. This ensures that every message, file, and call stays in-house โ€“ without being routed through U.S.-based platforms or global cloud infrastructures.

๐Ÿ” No data transfer to the USA
๐Ÿšซ No Microsoft accounts or licenses required
๐Ÿ‡ฉ๐Ÿ‡ช Server location: Germany โ€“ fully GDPR compliant
โœ… 100% independence from U.S. corporations

Everything modern teams need
  • ๐Ÿ’ฌ One-on-one and group messaging
  • ๐Ÿ“Ž Secure file sharing
  • ๐Ÿ“ž Voice and video calls
  • ๐Ÿ“ฑ Cross-platform usage (laptop, phone, tablet)
  • ๐Ÿ—‚๏ธ Structured rooms for teams and projects
๐Ÿ’ผ Trusted by military and governments

Matrix and Element are already in use by various military and public-sector organizations: The U.S. Navy uses Matrix on multiple ships for secure internal communication. The German Bundeswehr operates its own Matrix-based messenger (BwMessenger). Governments in France, Luxembourg, Sweden, and the German healthcare sector also rely on Matrix for secure, sovereign communication.

This is all provided on a secure, open-source foundation โ€“ flexible, transparent, and future-ready.

๐Ÿ’ธ Clear savings โ€“ year after year

Compared to Microsoft Teams, a company with 20 employees can save up to $1000 per year โ€“ while keeping full control over all internal communication and data.

๐Ÿ› ๏ธ My offer to you
  • Setup and operation of your own Matrix instance
  • Deployment of Element Web / Element X as the user interface
  • Ongoing maintenance, security updates, and technical support
  • GDPR-compliant configuration
  • Optional: onboarding and training for your team
โœ… Conclusion

With Matrix and Element, you gain a professional, secure, and cost-effective communication platform โ€“ without Microsoft, without data leakage, and without vendor lock-in.

๐Ÿ‘‰ Iโ€™m happy to provide a custom quote tailored to your company size and needs.
Independent. Secure. Future-proof. โ€“ Your new communication solution.

Categories
Blog OpenSource Server Uptime

2025-06-08: Easy Server Monitoring: Why Uptime Kuma and NTFY Matter for Your Business

In todayโ€™s highly digital business environment, the availability of your IT systems is a critical success factor. Whether itโ€™s an online store, customer portal, or internal tool โ€“ system outages can lead not only to lost revenue, but also to damaged customer trust.

Reliable monitoring of your servers and services is therefore essential. Two tools that have proven particularly effective are Uptime Kuma and NTFY. Combined, they provide a simple and powerful solution to detect disruptions early โ€“ and respond immediately. โšก

โ— Why Is This So Important for Businesses?

Outages happen. Whether due to maintenance, technical failure, or network issues โ€“ reaction time is key. If youโ€™re notified the moment a service goes offline, you can step in quickly and minimize downtime. โฑ๏ธ

Small and medium-sized businesses in particular benefit from not having to wait for customer complaints. Instead, you stay proactive and in control. This improves service quality, saves valuable time, and protects your reputation. โœ…

๐Ÿ”ง What Do Uptime Kuma and NTFY Actually Do?
  • ๐Ÿงญ Uptime Kuma continuously monitors your web servers, databases, and other services. It instantly detects if something is no longer working.
  • ๐Ÿ“ฒ NTFY sends push notifications to your smartphone or desktop the moment an issue is detected โ€“ without the complexity of email servers or SMS gateways.

This keeps your team informed โ€“ even outside of working hours. ๐ŸŒ™

๐ŸŒŸ Key Benefits at a Glance
  • ๐Ÿšจ Early Detection of Outages
    No more surprises: youโ€™ll know the moment something goes wrong.
  • โš™๏ธ Quick Response Time
    Push notifications help you act fast โ€“ when every minute counts.
  • ๐Ÿงฉ Simple Integration
    Both tools can be installed on a virtual server with minimal setup.
  • ๐Ÿ’ฐ Cost-Effective
    Both are open-source โ€“ no license fees or subscriptions required.
โœ… Conclusion

Together, Uptime Kuma and NTFY offer a lightweight and highly effective way to monitor your IT infrastructure. They boost your ability to respond quickly to issues, enhance your customer service, and give you peace of mind โ€“ knowing your systems are being watched. ๐Ÿ›ก๏ธ

Especially for businesses without large IT departments, this solution is ideal: flexible, low-maintenance, and easy to expand.

๐Ÿ’ฌ If youโ€™d like help setting it up or want a custom monitoring solution tailored to your needs, Iโ€™m happy to assist.

Categories
Blog OpenSource Security Server

2025-06-01: RustDesk: The Free Alternative to TeamViewer & AnyDesk

Remote access software is an essential tool in modern ITโ€”whether for technical support, remote work, or quick computer assistance. While commercial solutions like TeamViewer and AnyDesk are well-known, today I would like to introduce you to a more privacy-conscious and cost-free alternative: RustDesk.

๐Ÿ› ๏ธ What Is RustDesk?

RustDesk is an open-source remote desktop software that offers high performance, ease of use, and full control over data traffic. It is cross-platformโ€”available for Windows, macOS, Linux, Android, and iOSโ€”and especially well-suited for data-sensitive environments.

๐Ÿ” Your Data โ€“ Your Choice: Advantages Over TeamViewer & AnyDesk

๐Ÿ“ก 1. Host Your Own Server for Full Data Sovereignty

Unlike commercial providers, RustDesk allows you to host your own infrastructure. This means all connection traffic stays under your controlโ€”without being routed through external servers.

๐Ÿ’ธ 2. No Hidden Licensing Costs

RustDesk is completely free to useโ€”even for commercial purposes. There are no limitations on the number of devices, connections, or support hours. You reduce IT costs without sacrificing features.

๐Ÿš€ 3. Fast Setup and Modern Technology

The software is written in the programming language Rust, known for its performance and safety. Installation is simple, resource usage is minimal, and connection speeds are excellent.

๐Ÿ” 4. Open Source Creates Trust

Unlike proprietary systems like TeamViewer or AnyDesk, RustDesk offers full transparency with open-source code. Security risks or privacy concerns can be audited publiclyโ€”a decisive advantage for businesses, government organizations, and privacy-conscious individuals.

๐Ÿง‘โ€๐Ÿ’ป My Service: Secure IT Support with RustDesk

As an IT service provider, I support individuals and businesses with a tailored, privacy-compliant remote support solution based on RustDesk. By using a dedicated server infrastructure, I can provide you with secure connections that meet the highest privacy and compliance standardsโ€”without any data being routed through third parties.

๐Ÿ“˜ Want to Host It Yourself? No Problem โ€“ Hereโ€™s My Tutorial

If you want to set up your own RustDesk server, Iโ€™ve created a detailed, step-by-step tutorial to walk you through the process:
๐Ÿ‘‰ Set Up RustDesk on a Linux Server Using Docker-Compose
In this guide, I explain how to run your own self-hosted remote desktop solution quickly and reliably.

๐ŸŒ Why Open Source Matters More Than Ever

In an age where digital sovereignty and data protection are constantly under threat, free and open-source software like RustDesk provides a real alternative. You decide how and where your data is processedโ€”without dependence on external vendors or restrictive licensing models.

โœ… Conclusion: RustDesk Offers You Security, Freedom, and Control

RustDesk combines security, flexibility, and cost-efficiency in a modern remote access solution. As free software, it gives you back controlโ€”over your infrastructure, your data, and your IT operations.

๐Ÿ“ž Do you have questions or need expert support?
Iโ€™m happy to help you implement a secure and customized solutionโ€”without compromise.

Categories
Blog Anonymity Bitcoin Future Messenger OpenSource Security

2025-05-26: Open Source Software: Digital Freedom

Open source software is no longer a niche topic โ€“ it forms the backbone of our digital world. Many people are unaware of this, but the majority of computers around the globe already rely on open source technologies. In particular, the internet runs heavily on open source: most web servers operate using the Linux operating system, and countless services and applications โ€“ from web browsers to content management systems โ€“ are built on open source foundations.

๐Ÿ” What Does Open Source Mean?

Open source means that a softwareโ€™s source code is publicly accessible, modifiable, and free to use. This transparency not only fosters trust but also enables global, collaborative development. Control does not rest with a single company or state โ€“ it lies with the community. This prevents users from being locked into expensive subscription models or becoming dependent on individual vendors โ€“ a scenario that’s increasingly common with proprietary software.

This issue is strikingly portrayed in the latest season of the series Black Mirror (Season 7, Episode 1): A woman receives a medical chip implant after having a brain tumor removed. The twist? The chip is permanently connected to the providerโ€™s cloud โ€“ all data and functionality are processed externally, with nothing stored locally. Without an active subscription, the chip stops working. The software operates on a tiered licensing model with steadily rising costs. Eventually, the womanโ€™s family can no longer afford the increasingly expensive subscription levels โ€“ leading to catastrophic consequences.

This dystopian scenario highlights how dangerous it can be when essential technologies are fully controlled by a central provider. It creates a total dependency โ€“ both technically and financially. Open source offers a radical alternative: transparent, decentralized, user-controlled, and free.

๐Ÿงฉ Freedom Through Technology

Open source is an expression of digital self-determination. Those who use free software decide for themselves what runs on their devices, what data is shared, and which functions are enabled. This independence is more than just a technical detail โ€“ it’s a political statement in an age of digital surveillance, data exploitation, and monopolization.

A particularly powerful example of open source as a vehicle for independence is Bitcoin. Here too, the entire source code is publicly available, every transaction is verifiable, and the system itself is not centrally controlled. The idea of freedom, transparency, and decentralization is central โ€“ and would not be possible without open source.

๐Ÿ” Security Through Encryption

In an age of widespread digital surveillance, protecting private communication is essential. Open source plays a crucial role here: only with publicly accessible source code can users verify whether a tool is truly secure. Encryption tools such as PGP for email or decentralized messengers like Matrix (with clients like Element) are vital for maintaining privacy and shielding digital conversations from prying eyes.

๐Ÿค A Call to Support Open Source

The benefits of open source are overwhelming: transparency, security, independence, and innovation. But none of this happens automatically. The development and maintenance of free software is often done voluntarily or underfunded. Thatโ€™s why itโ€™s essential that we not only use open source but actively support it โ€“ by contributing to development, reporting bugs, or donating to projects that benefit us all.

Here is a short list of the most famous open source programs:

1. LibreOffice
Free and powerful office suite โ€“ alternative to Microsoft Office
๐Ÿ”— https://www.libreoffice.org/

2. GIMP
Free image editor โ€“ comparable to Adobe Photoshop
๐Ÿ”— https://www.gimp.org/

3. Mozilla Firefox
Secure and fast open-source web browser
๐Ÿ”— https://www.mozilla.org/firefox/

4. Thunderbird
Email client with calendar and chat support
๐Ÿ”— https://www.thunderbird.net/

5. VLC Media Player
Versatile media player that supports nearly all formats
๐Ÿ”— https://www.videolan.org/vlc/

6. Audacity
Audio recording and editing software
๐Ÿ”— https://www.audacityteam.org/

7. Krita
Professional painting and illustration tool for artists
๐Ÿ”— https://krita.org/

8. Inkscape
Vector graphics editor โ€“ similar to Adobe Illustrator
๐Ÿ”— https://inkscape.org/

9. KeePassXC
Secure and cross-platform password manager
๐Ÿ”— https://keepassxc.org/

10. Shotcut
Free, open-source video editor with wide format support
๐Ÿ”— https://shotcut.org/

โœ… Conclusion

In the digital age, open source is not a luxury โ€“ itโ€™s a necessity. There is hardly a more powerful tool for freedom, self-determination, and privacy protection. Those who want a free society must also support free software. Itโ€™s up to all of us to promote open source โ€“ for a digital world that liberates, not controls.

Categories
Blog Artificial Intelligence Future

2025-05-24: How Artificial Intelligence Is Changing the World of Work

๐Ÿง  Report: Who Will Be Above or Below AI in the Future?

The world of work is undergoing a profound transformation, largely driven by the rapid development of Artificial Intelligence (AI). One central question is becoming increasingly important: Who will be above AI in the future โ€“ and who will be below it?

๐Ÿ“‰ The Office Sector in Decline โ€“ Administrative Roles Under Pressure

AI systems are already capable of performing simple administrative and routine tasks more efficiently, quickly, and cost-effectively than humans. Initial areas affected include data entry, appointment scheduling, invoice verification, and drafting standardized correspondence. But the trend goes further: More complex tasks such as legal reviews, accounting, and even strategic analysis are increasingly falling within the capabilities of intelligent algorithms.

This development means that office jobs โ€“ even those at higher levels โ€“ are being gradually replaced or significantly reshaped. What begins with simple tasks will, over time, impact even qualified knowledge-based roles. Companies face the challenge of retraining employees or fundamentally restructuring their organizations.

๐Ÿ›’ Retail in Transition โ€“ Automation Displacing Jobs

The impact of automation is also clearly visible in the retail sector. Simple tasks like cashier work โ€“ typically performed by checkout staff โ€“ are increasingly being replaced by self-checkout systems. Many supermarkets today already require far fewer employees at the checkout.

As a result, customers now perform the payment process themselves, and the remaining staff focus primarily on stocking shelves โ€“ a task that is simpler, physically more demanding, and typically lower paid. This trend not only raises questions of fair labor conditions but also underscores the growing need for reskilling and new career paths.

๐Ÿ”ง Skilled Trades and ๐Ÿ’ป IT โ€“ The Winners of This Transformation

In contrast, there are professions that are largely resistant to AI-driven automation โ€“ most notably skilled trades. Whether carpenter, electrician, painter, or plumber: These jobs require physical presence, craftsmanship, and situational judgment โ€“ qualities that machines cannot match anytime soon.

At the same time, IT professions are becoming more valuable than ever. Todayโ€™s software developers, system administrators, and digital process designers are in high demand. These roles require not only technical skills but also creativity and problem-solving abilities โ€“ things AI alone cannot replicate.

๐ŸŒ Germany โ€“ A Digital Latecomer

A critical look at Germany reveals that it has fallen behind in IT development over the past 25 years. While Silicon Valley leads the global AI revolution, Germany has invested too little in building its own digital infrastructure and technology ecosystem. Europe as a whole has little independence in this sector.

This is clearly reflected in the MSCI World Index, where the dominant companies are almost exclusively from the USA โ€“ Amazon, Apple, Microsoft, Google, Meta. European tech companies barely register. This poses not only economic but also geopolitical risks โ€“ and highlights the urgency for action.

๐Ÿ‘จโ€๐Ÿ”ง๐Ÿ‘ฉโ€๐Ÿ’ป Advice for the Next Generation: Choose Skilled Trades or IT

Given these developments, my clear recommendation to young people โ€“ and to parents helping their children choose a career โ€“ is: Consider a career in the skilled trades or in IT. Both sectors are future-proof, offer strong career development, and in the best-case scenario, can lead to self-employment. Whether as an IT specialist or as a master craftsman with your own business: These fields offer real opportunities in a world increasingly shaped by AI.

๐Ÿค– Useful AI Tools for Everyday Work

The practical use of AI is not limited to large corporations. Itโ€™s already accessible to small and medium-sized businesses and offers tangible benefits in terms of efficiency and productivity. Here are some current tools that can support everyday work:

  • ChatGPT / GPT-4 โ€“ for content creation, brainstorming, virtual assistance, and customer communication
  • Grammarly โ€“ for grammar, spelling, and style checking in multiple languages
  • Midjourney / DALLยทE โ€“ to generate images for marketing, presentations, or visual concepts
  • Notion AI โ€“ to organize projects, ideas, and summaries intelligently
  • DeepL Write โ€“ for high-quality translations and stylistic improvements
  • Runway / Descript โ€“ for automated video editing and podcast production
  • Pictory โ€“ creates short social media videos from blog posts or written content
  • Microsoft Copilot / Google Duet AI โ€“ AI features directly integrated into Office tools like Word, Excel, and Gmail

These tools are already powerful โ€“ and improving rapidly. They offer real competitive advantages for businesses willing to embrace innovation.

๐Ÿค My Offer: Guiding You into the Digital Future

I support businesses in becoming future-ready โ€“ by developing digital strategies and introducing AI applications into day-to-day operations. From process analysis to tool selection and employee training, I offer hands-on, practical guidance through the transformation.

Because the right response to the rise of AI isnโ€™t fear โ€“ but proactive innovation.

If you’re looking for support in your companyโ€™s digital transformation or would like to know which AI tools are best suited to your specific business model, feel free to reach out.

Categories
Blog Messenger Server

2025-05-20: Matrix + Video Calls – Exploring ElementCall & ElementX

Over the past few weeks, Iโ€™ve been diving into ElementCall and ElementX โ€“ two exciting projects in the Matrix ecosystem that push decentralized communication even further.

๐Ÿ”น ElementCall enables secure, peer-to-peer video calls using the Matrix protocol โ€“ built on top of LiveKit.
๐Ÿ”น ElementX is a next-generation Matrix client โ€“ fast, lightweight, and built with modern architecture.

๐Ÿ“š New Tutorial Available!
Iโ€™ve written a step-by-step tutorial on how to integrate ElementCall (with LiveKit and JWT authentication) as an addon to an existing Matrix Synapse installation running in Docker.

๐Ÿ’ก This makes it easy to upgrade your Matrix setup with full-featured video calling โ€“ fully self-hosted and privacy-respecting.

๐Ÿ‘‰ Check out the tutorial here:
๐Ÿ”— https://it-service-commander.de/en/tutorials-2/docker/elementcall-as-add-on-for-matrix-synapse-docker/

Feel free to reach out if you’re experimenting with Matrix or looking to add video calling to your infrastructure!

#Matrix #ElementCall #ElementX #SelfHosting #VideoCalling #Synapse #LiveKit