Categories
Pages
-

IT Center Blog

Kategorie: ‘General’

Availability During the Company Excursion

April 15th, 2024 | by
pink open sign in window

Source: Freepik

Our annual company excursion will take place on Friday, April 19, 2024, which means that some employees of the IT Center and the IT-ServiceDesk will not be available on this day. In some cases, there may be delays in ticket processing or telephone availability.

Read the rest of this entry »

PPCES – HPC is in the air in spring!

April 12th, 2024 | by

Source: Own illustration

The PPCES (Parallel Programming in Computational Engineering and Science) has been held at the IT Center since 2001 and has been a great success!

Read the rest of this entry »

Welcome to the Summer Semester 2024!

April 10th, 2024 | by
Clock and apple on school books

Source: Freepik

The nights are getting shorter and the days are getting long again – time for a new semester to start!

With this in mind, we would like to welcome you and wish you a successful summer semester 2024!

Studying has become much more digital in recent years. This means that people are not only learning from books but also a lot on their laptops, tablets and smartphones. Are you already connected?

Read the rest of this entry »

#RWTHWelcomeWeek for the Summer Semester 2024 – On Site for You!

April 8th, 2024 | by
Students at a stand

Source: Own illustration

RWTH Aachen University once again welcomed new students for the summer semester 2024 with the traditional Welcome Week! This series of events is an excellent opportunity, especially for international students, to get to know the services and processes at RWTH Aachen University.

The IT Center was also there again on April 3, 2024 and was live on site at the Freshers’ Fair as part of the Welcome Week to answer your questions. In the following blog post, we report on the successful exchanges with the students.

 

Read the rest of this entry »

RWTHonline: How to register for LV and PV

April 3rd, 2024 | by
Top view of school supplies range

Source: Freepik

Especially at the beginning of your studies, everything is new and confusing. How do I register for my courses? And what does “Requirements met ” mean? Why can’t I see my study room yet, even though I have registered for the course?

Good preparation for the coming semester includes registering promptly for the courses (LV) and, later in the semester, for the examinations (PV). You can register in RWTHonline via the “Study Overview (Curriculum Support)” application.

 

Read the rest of this entry »

World Backup Day: Security Through Data Backup

March 27th, 2024 | by
Person holding laptop with cloud icons in background

Source: Freepik

March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.

Read the rest of this entry »

Five Years of RWTHmoodle

March 25th, 2024 | by
Lettering 5 years RWTHmoodle in speech bubble

Source: Own illustration

With the go live of RWTHmoodle on March 5, 2019, a milestone was reached in the digitization strategy for teaching. This strategy provides for the development and implementation of digitalization concepts for excellent teaching. Among other things, the required system should be able to adapt to constantly changing requirements.

In the following blog post, you can read how the Moodle instance came to RWTH and what we have already experienced with it.

 

Read the rest of this entry »

RWTHmoodle University Meeting in Leipzig

March 22nd, 2024 | by
A picture of a black doctor's hat lying on an open laptop. The screen of the laptop is blank. Above the image is the text RWTH and moodle.

Source: Own Illustration

Current Developments & Trends –
Video Subtitling, Digital Exam Viewing and Organization of the Moodle Community

ChatGPT and Large Language Models – how they change teaching, learning and working. At the Moodle University Meeting at Leipzig University, there was a lot of discussion about generative AI and its application scenarios in university teaching. Nevertheless, there was still enough room for other exciting topics: from Moodle quizzes and the integration of Jupyter notebooks in Moodle to service strategies, plugin lifecycles and community work to accessibility, a wide range of topics was represented. RWTH Aachen University was also among the 120 participants with two people from the IT Center and the Center for Teaching and Learning Services (CLS) and supplemented the program with two presentations and a co-moderation.

Read the rest of this entry »

Webhosting: Registration, Security & Administration

March 20th, 2024 | by
Website Hosting Illustration with Computer Design

Source: Freepik

What does webhosting mean?
Webhosting refers to the provision of storage space (webspace) for the provision of websites. The people who create the website fill this webspace with different content, including images, videos, files, and fonts. Websites are similar to text documents that can be made available and accessed on the Internet. The content of the websites must be saved so that we can access them from anywhere at any time. However, this storage does not take place on a local computer, but on a high-performance server that is connected to the Internet around the clock. In this way, the created website remains continuously available online and the content can be accessed by users worldwide. RWTH Aachen University and FH Aachen University of Applied Sciences cooperate to provide webspace to institutes and student associations as webhosting providers.

 

Read the rest of this entry »

Spoofing: An Underestimated Threat

March 18th, 2024 | by
Businessman with megaphone that says "Lie"

Source: Freepik

In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.

Read the rest of this entry »