Categories
Pages
-

IT Center Blog

Between Viruses and Worms

January 24th, 2025 | by

Source: Freepik

With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous – from stealthy data theft to automatic distribution via botnets.

Read the rest of this entry »

WestAI: Access to AI for Business and Science

January 22nd, 2025 | by

IT Center, RWTH Aachen University

The launch of the WestAI AI service centre will revolutionise access to artificial intelligence for companies and scientists in Germany. Under the leadership of the University of Bonn and with the support of leading research institutions from North Rhine-Westphalia, WestAI offers innovative AI services and state-of-the-art computing infrastructure that can be used immediately – and currently even free of charge. The IT Center of RWTH Aachen University offers part of this infrastructure.

Read the rest of this entry »

Migration From RDS to DataStorage.nrw – What You Need to Know

January 20th, 2025 | by
DataStorage.nrw

Source: DataStorage.nrw

With the switch from Research Data Storage (RDS) to DataStorage.nrw, the migration of research data is due from the launch of DataStorage.nrw. In this article, we will give you an overview of how the migration works, what you should bear in mind and what changes you will have to expect.

 

Read the rest of this entry »

Zero-Day Vulnerabilities

January 17th, 2025 | by

Source: Own Illustration

Imagine working every day on a computer that seems to run smoothly. Everything works as usual – until one day a security problem is discovered that nobody knew about. Suddenly, a security vulnerability is discovered that attackers have known about for weeks or even months and taken advantage of undetected. This type of vulnerability is known as a zero-day vulnerability. In this blog post, we’ll explore what exactly zero-day vulnerabilities are, why they are particularly dangerous and how best to deal with them.

Read the rest of this entry »

RWTHapp: New Feature for Loans in the University Library

January 15th, 2025 | by
RWTHapp

Source: Own illustration

We are pleased to announce an exciting new feature in the RWTHapp! From now on, all RWTH students have the opportunity to borrow books from the University Library (UB) even more easily. The new barcode scanning feature of the RWTHapp makes borrowing books easier than ever before.

Read the rest of this entry »

The Beginnings of Computer Technology – Part 2

January 13th, 2025 | by

In our last article, The beginnings of computer technology, we already took a look at the first calculating machines by Konrad Zuse. Now we want to discuss the individual components of the Z3, which is considered to be the world’s first fully programmable computer, and find out which of its concepts are still used in modern computer technology. In particular, this article will focus on the architecture of the Z3.

 

Read the rest of this entry »

Fire Safety in Focus: Smoke Detector Day

January 10th, 2025 | by

Source: RWTH Aachen

Friday, December 13, 2024, was the annual Smoke Detector Day – an event that draws attention to the importance of working smoke detectors. What is often regarded as an unlucky day is to be turned into a lucky day through preventative measures.

Thirty years ago, there were more than twice as many fire deaths as there are today. This decline is mainly due to the gradual introduction of mandatory smoke alarms in the individual federal states, which were implemented independently of each other. Hesse made the start in 2005, and Berlin finally introduced the obligation in 2017. The educational work of the fire department and initiatives such as “Smoke alarms save lives” from 2000 are also making a significant contribution to this.

Read the rest of this entry »

Research Data Management at RWTH Aachen University: An Overview

January 8th, 2025 | by
RDM at RWTH

Source: Own Illustration

Research data management (RDM) is a central topic in modern science that goes far beyond the mere collection and storage of data. It encompasses all processes that are necessary to securely collect, store and analyze data and make it usable in the long term. At RWTH Aachen University, a clear guideline and a structured infrastructure around the data lifecycle for RDM is provided, enabling researchers to manage their data sustainably and follow the principles of good scientific practice.

 

Read the rest of this entry »

How Does My Social Media Algorithm Work?

January 6th, 2025 | by

Illustration Person using Computer

Source: [freepik]

Social networks are now an indispensable part of our everyday lives. Billions of people connect with each other daily and publish countless posts. In order to maintain customer engagement, it is crucial that the content is appealing and relevant.

This is where social media algorithms come into play: they determine what content is displayed in our feeds and ensure that each user receives a personalized experience. This means that no two people see exactly the same content, even if they follow the same accounts.

 

 

 

 

 

Read the rest of this entry »

IT Center Annual Review 2024

January 3rd, 2025 | by

Source: Freepik

The year 2024 is drawing to a close – a year full of exciting projects, successful collaborations and unforgettable moments at the IT Centre. From innovative events and new partnerships to internal team celebrations and significant changes and new ones, the year was characterised by growth, collaboration and joint development. In our annual review, we take a look at the highlights, changes and successes that made our year so special.

 

Read the rest of this entry »