Blog about IT infrastructure,
IT security and communication technology

Latest post

Newly certified: AI Privacy Expert – Competent support for data protection-compliant AI use

IT information

Practical issues, secure IT concepts and technological innovations in the fields of communication technology and critical infrastructure (KRITIS).

The btQ.blog keeps you up to date and provides you with information for your successful IT project.

NEWS FROM THE IT OFFICE & LAB

Blog posts & guides

Newly certified: AI Privacy Expert – Competent support for data protection-compliant AI use

Artificial intelligence (AI) is rapidly finding its way into companies and public administrations. However, the ...

Artificial intelligence in expert offices – presentation at the BVS general meeting in Saxony

On March 29, 2025, I gave a presentation on the topic of “Artificial intelligence in ...

Post-mortem analyses in IT environments: Learning from incidents – systematically and sustainably

Failures are part of everyday life in IT. Systems are becoming more complex, dependencies more ...

10 years of successful planning and consulting – a look back and a step forward

10 years of successful planning and consulting – a look back and a step forward ...

AI in everyday office life and its challenges: Lecture at the TGA symposium and the GTÜ-BQÜ regional day

At this year’s TGA symposium of b.v.s. Saxony and the 19th GTÜ-BQÜ/Bau Regional Day on ...

5G & Wireless LAN

5G and Wi-Fi are both wireless communication technologies that can be used to transmit data. ...

Maximize your WLAN: Your expert with design certification for optimal networks

We are passionate WLAN enthusiasts and have underpinned this with a design certification. Despite years ...

Wireless LAN (WLAN) should be well planned

Wireless LAN (WLAN) coverage is a complex task that requires careful planning. One of the ...

Lecture on cyber security – sensitivity and measures for experts

On March 18, 2023, we gave a presentation on cyber security at the BVS Sachsen ...

Post-mortem analyses in IT environments: Learning from incidents – systematically and sustainably

Failures are part of everyday life in IT. Systems are becoming more complex, dependencies more ...

AI in everyday office life and its challenges: Lecture at the TGA symposium and the GTÜ-BQÜ regional day

At this year’s TGA symposium of b.v.s. Saxony and the 19th GTÜ-BQÜ/Bau Regional Day on ...

5G & Wireless LAN

5G and Wi-Fi are both wireless communication technologies that can be used to transmit data. ...

Maximize your WLAN: Your expert with design certification for optimal networks

We are passionate WLAN enthusiasts and have underpinned this with a design certification. Despite years ...

Wireless LAN (WLAN) should be well planned

Wireless LAN (WLAN) coverage is a complex task that requires careful planning. One of the ...

Maximize your WLAN: Your expert with design certification for optimal networks

We are passionate WLAN enthusiasts and have underpinned this with a design certification. Despite years ...

Wireless LAN (WLAN) should be well planned

Wireless LAN (WLAN) coverage is a complex task that requires careful planning. One of the ...

Lecture on cyber security – sensitivity and measures for experts

On March 18, 2023, we gave a presentation on cyber security at the BVS Sachsen ...

Newly certified: AI Privacy Expert – Competent support for data protection-compliant AI use

Artificial intelligence (AI) is rapidly finding its way into companies and public administrations. However, the use of modern AI systems – whether via internet services or on-premises in your own data center – gives rise to considerable legal, technical and organizational requirements. As an IT planner and publicly certified expert, I have therefore undergone extensive … Read more

Artificial intelligence in expert offices – presentation at the BVS general meeting in Saxony

On March 29, 2025, I gave a presentation on the topic of “Artificial intelligence in the appraisal office” at the general meeting of the BVS Saxony in Grimme. The presentation provided a practical overview of current AI developments, in particular language models such as ChatGPT, as well as their potential fields of application in the … Read more

Post-mortem analyses in IT environments: Learning from incidents – systematically and sustainably

Failures are part of everyday life in IT. Systems are becoming more complex, dependencies more numerous, and even with a high degree of automation, technical faults or misconfigurations are inevitable. But every incident also presents an opportunity: the chance to learn systematically and become more resilient. Post-mortem analysis – also known as a post-incident review … Read more

10 years of successful planning and consulting – a look back and a step forward

10 years of successful planning and consulting – a look back and a step forward The festive time of year invites us to pause and say thank you. I have not only done this in the Christmas cards to my customers, but would also like to do it again here. Because the year 2024 was … Read more

5G & Wireless LAN

5G and Wi-Fi are both wireless communication technologies that can be used to transmit data. Although they fulfill similar purposes, there are some key differences between the two. Speed and capacity: 5G offers significantly higher speed and capacity compared to Wi-Fi. While WLAN normally achieves speeds of up to a few gigabits per second, 5G … Read more

Maximize your WLAN: Your expert with design certification for optimal networks

We are passionate WLAN enthusiasts and have underpinned this with a design certification. Despite years of experience in this environment, this type of training brings clear added value for design and also for troubleshooting in enterprise WLAN networks. The constant further development in the Wi-Fi sector makes continuous training essential. New standards such as Wi-Fi … Read more

Lecture on cyber security – sensitivity and measures for experts

On March 18, 2023, we gave a presentation on cyber security at the BVS Sachsen e.V. general meeting. The presentation explained the possible gateways of cyber attacks and their effects. Specifically, the dangers posed by For each gateway, risk minimization measures have been identified that can be used in expert offices and by solo self-employed … Read more