Kategorie: ‘Fun & Facts’
Green HPC: Sustainability in the Data Centers of Tomorrow

Recooler with optional “adiabatic” pre-cooling. The visible filter mats are moistened with water if required.
Digital technologies have become an integral part of science and industry – but data centers are among the biggest energy consumers in the IT sector. High-performance computers in particular are essential for complex calculations in research, but at the same time cause high electricity costs and CO2 emissions. To meet these challenges, RWTH Aachen University is focusing on innovative solutions for energy efficiency and sustainable resource utilisation.
Neural Networks – The Basis of Modern AI

Source: Freepik
Neural networks are models inspired by the functioning of the human brain. They consist of artificial neurons that process information and communicate with each other. These networks enable machines to learn from data and recognise patterns without any explicit programming for each task. Examples include virtual assistants such as Alexa and Siri, translation tools such as Google Translate and creative AI systems such as ChatGPT. In this article, we will look at how neural networks work, what advantages and disadvantages they have and how RWTH Aachen University uses them.
Microsoft Office at RWTH: An Overview

Source: Unsplash
Progressive digitalisation and flexible adaptation to new circumstances have significantly changed everyday working life, studies and research at RWTH Aachen University since spring 2020. Without the right tools, communication and collaboration between members of RWTH would have been much more limited in times of home office and distance learning.
Face ID on the Rise – But What Is Behind the Technology?

Source: Freepik
Face ID has been around for a relatively short time. Facial recognition secures our data and makes it accessible only to us. We have explored this technology and gathered all the essential information to provide insight into its complex mechanics and potential security risks.
Effective Backup Strategies: Correct Data Backup

Source: Freepik
Backing up important professional or private files, such as texts, images and other documents, is essential. Data loss can have catastrophic consequences, whether caused by technical mishaps, accidental deletion or even hardware theft. Data loss can also be caused by viruses or hacker attacks. Viruses can, for example, encrypt the hard drive and then demand a ransom. Here are some proven strategies and tools to ensure that your data always remains safe and accessible. You can also take a look at the category IT-Security on our website to find out more tips.
The Printing Service at the IT Center Is Extending Its Hours!

Source: Own illustration
We have great news for you! Starting April 1, 2025, we are extending our hours: The printing service will be available Monday to Friday for RWTH institutions!
The ITSSM Department in Focus: IT Services & IT Security

Source: Alexander Müller
The IT Service & Security Management (ITSSM) department plays a key role in the establishment, control and further development of IT service management processes and security processes in the IT center. The processes support service provision, service operations, IT security, reporting and support. In the following blog post, we take a closer look at the department’s areas of work.
Blockchain Technology

Source: Freepik
Blockchain technology, often referred to simply as ‘blockchain’, is transforming the way data is stored and secured. Originally developed as the basis for cryptocurrencies such as Bitcoin, it has quickly developed into a versatile technology that is used in numerous industries.
In this blog post, you can find out how it all works and what applications there are in general.
Exmatriculation – What Then?

Source: Unsplash
The last exams have been written and the final thesis has been handed in – your studies are coming to an end. An era is ending and new paths are waiting for you, be it a job, further studies or other exciting challenges.
But what happens to the RWTH services that accompanied you during your studies? How long will you still have access to your accounts, documents and data?
Here you can find out what remains and what you should definitely do before exmatriculating.
The Beginnings of Computer Technology – Part 3

Source: Wikimedia Commons
In our previous post we explored the basic architecture of the Z3, now let’s look at the aspect that made the Z3 so special: the ability to program it freely. In this third, and final, part of this series, we will focus on how programs were entered and processed and what limitations existed. We will also take a look at the input and output methods to get a more comprehensive picture of how users interacted with the machine.