Categories
Blog Artificial Intelligence Future

2025-05-24: How Artificial Intelligence Is Changing the World of Work

? Report: Who Will Be Above or Below AI in the Future?

The world of work is undergoing a profound transformation, largely driven by the rapid development of Artificial Intelligence (AI). One central question is becoming increasingly important: Who will be above AI in the future – and who will be below it?

? The Office Sector in Decline – Administrative Roles Under Pressure

AI systems are already capable of performing simple administrative and routine tasks more efficiently, quickly, and cost-effectively than humans. Initial areas affected include data entry, appointment scheduling, invoice verification, and drafting standardized correspondence. But the trend goes further: More complex tasks such as legal reviews, accounting, and even strategic analysis are increasingly falling within the capabilities of intelligent algorithms.

This development means that office jobs – even those at higher levels – are being gradually replaced or significantly reshaped. What begins with simple tasks will, over time, impact even qualified knowledge-based roles. Companies face the challenge of retraining employees or fundamentally restructuring their organizations.

? Retail in Transition – Automation Displacing Jobs

The impact of automation is also clearly visible in the retail sector. Simple tasks like cashier work – typically performed by checkout staff – are increasingly being replaced by self-checkout systems. Many supermarkets today already require far fewer employees at the checkout.

As a result, customers now perform the payment process themselves, and the remaining staff focus primarily on stocking shelves – a task that is simpler, physically more demanding, and typically lower paid. This trend not only raises questions of fair labor conditions but also underscores the growing need for reskilling and new career paths.

? Skilled Trades and ? IT – The Winners of This Transformation

In contrast, there are professions that are largely resistant to AI-driven automation – most notably skilled trades. Whether carpenter, electrician, painter, or plumber: These jobs require physical presence, craftsmanship, and situational judgment – qualities that machines cannot match anytime soon.

At the same time, IT professions are becoming more valuable than ever. Today’s software developers, system administrators, and digital process designers are in high demand. These roles require not only technical skills but also creativity and problem-solving abilities – things AI alone cannot replicate.

? Germany – A Digital Latecomer

A critical look at Germany reveals that it has fallen behind in IT development over the past 25 years. While Silicon Valley leads the global AI revolution, Germany has invested too little in building its own digital infrastructure and technology ecosystem. Europe as a whole has little independence in this sector.

This is clearly reflected in the MSCI World Index, where the dominant companies are almost exclusively from the USA – Amazon, Apple, Microsoft, Google, Meta. European tech companies barely register. This poses not only economic but also geopolitical risks – and highlights the urgency for action.

?‍??‍? Advice for the Next Generation: Choose Skilled Trades or IT

Given these developments, my clear recommendation to young people – and to parents helping their children choose a career – is: Consider a career in the skilled trades or in IT. Both sectors are future-proof, offer strong career development, and in the best-case scenario, can lead to self-employment. Whether as an IT specialist or as a master craftsman with your own business: These fields offer real opportunities in a world increasingly shaped by AI.

? Useful AI Tools for Everyday Work

The practical use of AI is not limited to large corporations. It’s already accessible to small and medium-sized businesses and offers tangible benefits in terms of efficiency and productivity. Here are some current tools that can support everyday work:

  • ChatGPT / GPT-4 – for content creation, brainstorming, virtual assistance, and customer communication
  • Grammarly – for grammar, spelling, and style checking in multiple languages
  • Midjourney / DALL·E – to generate images for marketing, presentations, or visual concepts
  • Notion AI – to organize projects, ideas, and summaries intelligently
  • DeepL Write – for high-quality translations and stylistic improvements
  • Runway / Descript – for automated video editing and podcast production
  • Pictory – creates short social media videos from blog posts or written content
  • Microsoft Copilot / Google Duet AI – AI features directly integrated into Office tools like Word, Excel, and Gmail

These tools are already powerful – and improving rapidly. They offer real competitive advantages for businesses willing to embrace innovation.

? My Offer: Guiding You into the Digital Future

I support businesses in becoming future-ready – by developing digital strategies and introducing AI applications into day-to-day operations. From process analysis to tool selection and employee training, I offer hands-on, practical guidance through the transformation.

Because the right response to the rise of AI isn’t fear – but proactive innovation.

If you’re looking for support in your company’s digital transformation or would like to know which AI tools are best suited to your specific business model, feel free to reach out.

Categories
Blog Messenger Server

2025-05-20: Matrix + Video Calls – Exploring ElementCall & ElementX

Over the past few weeks, I’ve been diving into ElementCall and ElementX – two exciting projects in the Matrix ecosystem that push decentralized communication even further.

? ElementCall enables secure, peer-to-peer video calls using the Matrix protocol – built on top of LiveKit.
? ElementX is a next-generation Matrix client – fast, lightweight, and built with modern architecture.

? New Tutorial Available!
I’ve written a step-by-step tutorial on how to integrate ElementCall (with LiveKit and JWT authentication) as an addon to an existing Matrix Synapse installation running in Docker.

? This makes it easy to upgrade your Matrix setup with full-featured video calling – fully self-hosted and privacy-respecting.

? Check out the tutorial here:
? https://it-service-commander.de/en/tutorials-2/docker/elementcall-as-add-on-for-matrix-synapse-docker/

Feel free to reach out if you’re experimenting with Matrix or looking to add video calling to your infrastructure!

#Matrix #ElementCall #ElementX #SelfHosting #VideoCalling #Synapse #LiveKit

Categories
Anonymity Blog Security

2025-05-17: Anonymous. Secure. Free: TOR Network

Why you should not only use the network, but also support it:

The internet should be a place of freedom — a space where you can inform yourself, communicate, and express your opinion without being constantly watched or controlled. Unfortunately, the reality looks quite different: surveillance, data collection, censorship. That’s where TOR comes in — the “The Onion Router” network. And no, it’s not just for hackers or whistleblowers. TOR is for anyone who wants to protect their privacy online.

? TOR Is Not a Hiding Place for Criminals — It’s a Shield for Citizens

TOR often has a bad reputation because it’s associated with the so-called “dark web.” But that image is misleading. TOR was not created for illegal purposes — it was developed as a tool for ordinary citizens who want to keep their online activity private.

Whether you want to browse anonymously, avoid being tracked by advertisers, or bypass censorship in authoritarian regimes — TOR gives you the ability to move through the internet securely and without being watched.

?️‍♂️ Snowden, Assange, and the Reality of Mass Surveillance

You may remember Edward Snowden, who revealed in 2013 how extensively the NSA and other intelligence agencies are monitoring people around the world. Or Julian Assange, who, through WikiLeaks, published confidential documents exposing war crimes and corruption.

Both men used secure, anonymous communication methods — including TOR — to protect their sources and themselves. Without such tools, many of these truths would have remained hidden. TOR is not just a piece of software — it’s a symbol of transparency, accountability, and freedom of information.

⚙️ How You Can Support TOR — By Running a Relay

TOR relies on its users to stay strong. Especially important are Middle Relays — the servers that forward encrypted traffic through the network. The more of these relays exist, the faster, more stable, and more secure the entire system becomes.

The good news: Running a relay is technically simple, inexpensive, and has a big impact — for you and for millions of users around the globe.

I have provided a corresponding tutorial for your own Linux server here for free:

https://it-service-commander.de/en/tutorials-2/docker/install-tor-server-in-a-docker-container-on-your-vps/

? Digital Freedom Is Not a Given

Data retention laws, chat control, constant tracking — these are not just buzzwords. They represent real threats to civil liberties. Both governments and corporations are collecting data at a scale that would have seemed impossible just a few years ago.

Privacy is not a luxury — it is a fundamental digital right. And now, more than ever, it needs to be defended.

✅ Conclusion

TOR is not a criminal hiding place, but a protective tool for free speech, journalism, and digital self-determination.

If you use TOR, you protect your own data.
If you actively support TOR, for example by running a relay, you help make the internet a freer and safer place — for everyone.

Real freedom begins with digital responsibility — and that’s in your hands.

More Information: https://www.torproject.org/

Categories
Blog Security

2025-04-30: Avoid Port Forwarding – Use VPN Instead

? In an increasingly interconnected world, many people want secure access to their home network from anywhere. However, significant security risks exist, especially if you simply open ports on your router. A better alternative is using VPN technologies like WireGuard or OpenVPN.

VPN stands for “Virtual Private Network” and refers to a secure connection that encrypts your internet traffic and routes it through a protected tunnel between your device and the network. This keeps your data safe from prying eyes and ensures that only authorized users gain access.

⚠️ Risks of Port Forwarding

Port forwarding on a router may initially seem like a simple solution for accessing NAS devices, smart home systems, or surveillance cameras remotely. However, each open port creates a potential entry point for cybercriminals:

  • ? Open Attack Surface: Every forwarded port can be discovered and attacked from the outside. Hackers and automated scripts actively look for open ports and vulnerabilities.
  • ? Lack of Encryption: Without additional security measures, data traffic usually remains unencrypted, making sensitive information easily readable.
  • ? Weak Authentication: Many devices offer insufficient protection or default passwords that can easily be compromised.

✅ Benefits of WireGuard and OpenVPN

Instead of directly forwarding ports, you should use VPN solutions like WireGuard or OpenVPN, which offer numerous advantages:

  • ? Enhanced Security Through Encryption: All data traffic is securely encrypted, making it unreadable to unauthorized parties.
  • ?️ Strong Authentication: Only authorized users can access your network, significantly reducing the risk of unauthorized access.
  • ?️ Hidden Infrastructure: No directly visible ports from outside, effectively making your devices invisible to automated attacks.

? Why Choose WireGuard or OpenVPN?

Both technologies have proven their reliability:

  • ? WireGuard is lightweight, fast, easy to set up, and offers state-of-the-art cryptography. Ideal for home users looking for straightforward and quick access.
  • ⚙️ OpenVPN has been established for years, is highly flexible, and widely supported. Perfect for complex requirements and professional environments.

? Conclusion

If you take your privacy and security seriously, avoid simple port forwarding and instead use proven VPN solutions such as WireGuard or OpenVPN. This ensures your data remains protected and your home network stays safe from attackers.

Categories
Blog Health

2025-04-20: electronic patient record in germany

Source: https://www.bfdi.bund.de/DE/Buerger/Inhalte/GesundheitSoziales/eHealth/elektronischePatientenakte.html

The electronic patient record (ePA) is a digital collection of medical data such as doctor’s reports, X-rays, vaccinations, or medication plans. Insured individuals in Germany can decide for themselves which information is stored and which doctors are allowed to access it. The goal is better, more connected healthcare and greater transparency.

?‍? As an IT specialist, I have personally opted out of having a digital patient record (ePA) created for myself.
This article reflects my subjective opinion and is based on my experience in the IT field. While the ePA offers potential benefits, such as improved networking in healthcare, I consider the associated risks and challenges to be too great.

? 1. Data Protection and Security:
The ePA stores highly sensitive health data. Although recently discovered security vulnerabilities highlighted by the Chaos Computer Club (CCC) have been addressed, it still cannot be ruled out that hackers could gain access again through future security gaps.
Furthermore, the health data is not stored on the insurance card itself but on centralized servers located in Germany. Even though the data is encrypted, it is potentially accessible 24/7, since it is stored permanently online.
This central storage significantly increases the risk of hacker attacks and data leaks.

?️ 2. Integration, Compatibility, and User Acceptance:
Each medical practice must keep its IT systems — including operating systems — consistently up to date to ensure that they do not become the weakest link in the encryption chain and vulnerable to cyberattacks.
Moreover, the widespread implementation of the ePA requires extensive training for doctors, healthcare staff, and patients. Especially older individuals or those unfamiliar with digital systems often struggle to adapt, leading to frustration and resistance.

? 3. Limitation of Patient Rights:
The ePA stores patient data centrally. Although this is intended to make access easier, it also means patients lose control over where and how their data is stored and used.
They can no longer decide who has access or keep track of how the data is being utilized. This increases the risk of unauthorized access and reduces transparency for the patient.

?️ 4. Risk of Digital Surveillance:
There is a concern that health data might be used not only for medical purposes but for other interests as well.
In the future, this information could potentially be used by insurers, employers, or other institutions to monitor patient behavior. This kind of digital surveillance could endanger privacy and erode trust in the healthcare system.

? Conclusion:
Digitization in healthcare can offer many benefits, but all technical, legal, and security-related questions must be thoroughly resolved. Only then can the trust of both patients and professionals be ensured. Digitization must be implemented in a secure, privacy-compliant, and transparent way in order to protect patients and strengthen confidence in the system.

Everyone should be free to decide for themselves whether they want a digital patient record.
As for me, I have chosen to opt out — because the risks regarding data protection, security, and potential digital surveillance outweigh the possible benefits in my view.

Sample objections can be found here:

https://widerspruch-epa.de/
https://widerspruch-epa.de/wp-content/uploads/2025/01/widerspruch_EPA.pdf

Categories
Blog Bitcoin

2025-04-06: Bitcoin Node with Umbrel

Running your own Bitcoin node is a crucial step toward true financial sovereignty. You verify transactions yourself, protect your privacy, and become an active part of the decentralized network—without relying on third parties. Whether for security, independence, or learning purposes, your own node brings you closer to the heart of Bitcoin.

? Full Control

You verify transactions yourself—no reliance on third parties.
No censorship: send and receive Bitcoin directly through your own node.

?️ More Privacy

Your wallet communicates only with your node—no data leaks.
No need for external block explorers.

Lightning Integration

Run your own Lightning channels and wallets directly via Umbrel.
Fast, low-cost payments without middlemen.

? Learn & Understand

Gain a deeper understanding of Bitcoin and the network.
Perfect for the curious, tech enthusiasts, and developers.

? Apps & Extensions

Umbrel offers a variety of useful apps: Electrum Server, Mempool, Nextcloud, and more.
All easily installable via a simple web interface.

? Easy Start

Intuitive user interface, ideal for Raspberry Pi & more.
Quick setup with regular updates. Alternatively, can be virtualized with Proxmox.

? Hardware Checklist for Your Umbrel Node

? Raspberry Pi 5
? 1 TB SSD
? SSD enclosure or adapter (USB 3.0 to SATA)
? microSD card (at least 32 GB, e.g., SanDisk Ultra)
? USB-C power supply (original power adapter recommended)
? Case for the Pi (with cooling)
? Ethernet cable (for a stable connection)

Optional:

? UPS (Uninterruptible Power Supply) – protects against power outages
? Router port forwarding – for a publicly reachable Lightning node or alternatively: via the Tor network

As an IT service provider, I’m happy to offer guidance and support.

https://github.com/getumbrel/umbrel

Categories
Proxmox Blog

2025-04-03: Central Windows system on Proxmox for multiple users

A Windows system on Proxmox VE offers companies a practical solution to provide multiple employees with flexible access to a centralized Windows environment. Virtualization with Windows 11 Enterprise or Windows Server 2022 creates a manageable and scalable IT infrastructure.

System Setup

The system is based on a Windows virtual machine in Proxmox. Thanks to Remote Desktop Services (RDS), multiple users can work simultaneously. User management is handled either through Active Directory or local accounts. Security measures such as VPN and firewall policies protect access.

Access Options

Employees can connect to the system from anywhere via Remote Desktop Protocol (RDP), regardless of the device used. Linux computers can also establish a stable connection using tools like Remmina or FreeRDP. This allows even simple, low-performance devices to be used as Windows workstations.

Backup & Security

Automatic backups using the Proxmox Backup Server (PBS) or snapshots ensure reliable data protection. Storage can also be outsourced to a NAS or the cloud. Regular updates keep the system stable and secure.

Installation Service for Businesses

As an IT service provider, I handle the complete setup and configuration of the system – from Proxmox VE and the Windows VM to licensing and the setup of Remote Desktop Services (RDS). I also ensure a secure network configuration and a reliable backup strategy. In addition, I offer support and maintenance to ensure the system runs stably over the long term.

This solution provides businesses with a powerful, secure, and easy-to-maintain IT environment that enables employees to access Windows applications from any location.

Categories
Blog Messenger

2025-03-29: Matrix Synapse and Element X

Secure corporate communication with open source technology

Matrix Synapse is a powerful open source server for the Matrix protocol that enables secure, decentralized and scalable real-time communication. Companies that value data protection, data sovereignty and interoperability can use it to create a powerful alternative to proprietary solutions such as Microsoft Teams, Slack or WhatsApp.

A major advantage of Matrix Synapse is that it can be used completely free of charge. As it is open source software, there are no license fees. Companies can operate the server on their own infrastructure or host it in the cloud without being tied to a specific provider.

In combination with Element X, a modern, fast and user-friendly matrix client, companies receive a secure messaging platform that can be used for both internal communication and for exchanges with external partners. Thanks to end-to-end encryption, all messages and calls are optimally protected. In addition, rooms and group chats can be managed flexibly so that different teams can work together efficiently.

My services as an IT service provider

As an IT service provider, I support companies in the planning, implementation and maintenance of their Matrix and Element-X infrastructure. My services include

  • Consulting and design: Analysis of requirements and creation of a customized solution
  • Installation and configuration: Setting up Matrix Synapse on dedicated servers or in the cloud
  • Support: Introduction to the use of Element X and ongoing technical support
  • Security and maintenance: Regular updates, monitoring and protection against security risks

With my support, companies can make a smooth transition to a data protection-friendly communication platform that gives them maximum control over their own data.

https://github.com/element-hq/synapse

Categories
Blog DNS

2025-03-26: AdGuard Home

AdGuard Home is a powerful open source software for filtering DNS requests. It enables companies to block unwanted or dangerous websites by filtering advertising networks, tracking services and potentially harmful domains at DNS level.

In companies, the use of AdGuard Home offers numerous advantages: It improves network security by blocking phishing and malware domains, reduces distraction from advertising and ensures more efficient bandwidth usage. It also contributes to data protection by preventing tracking requests and thus better protecting sensitive company data. Centralized management and customizability make AdGuard Home an ideal solution for a secure and productive IT environment.

AdGuard Home is open source software and is published under the GPL 3.0 license. This means:

A company can use AdGuard Home free of charge (privately and commercially)

There is no commercial license requirement for using the software.

The source code is open, so companies can adapt it as long as they comply with the license terms (e.g. disclose changes if they are redistributed).

I would be happy to help you operate an AdGuard service in your company network – be it as your ownenständige Maschine oder als Proxmox LXC Container.

Categories
Blog Proxmox

2025-03-23: Virtual servers with Proxmox

Proxmox is free software that can be used to create and manage virtual machines and containers on a server. It is based on the Debian Linux operating system and combines two technologies: KVM for high-performance virtual machines and LXC for lightweight containers.

With Proxmox, you can run multiple virtual systems on a single physical server, use resources efficiently and control everything conveniently via a web-based interface. It also offers practical functions such as live migration (moving running systems to another server), automatic backups and the option of connecting several servers to a cluster to safeguard against failures.

As an IT service provider, I can help you set up your own server with Proxmox and use it efficiently.

This not only saves you the cost of additional hardware, but also makes optimum use of your existing resources. You also benefit from a flexible and easy-to-manage environment in which you can easily create, manage and secure servers. I will assist you with setup, configuration and maintenance to ensure that your system remains reliable and efficient.

Whether for private individuals or companies – I will find an individual solution for you!