Kategorie: ‘Fun & Facts’
Basics at RWTH: Using the VPN

Source: Own Illustration
At RWTH Aachen University, the Virtual Private Network (VPN) provides an important and secure connection to the university network. This connection is secured by encryption protocols such as TLS. VPN ensures that all data traffic – either to the RWTH network or, depending on the configuration, also to the Internet – is routed via a so-called “tunnel”. This tunnel protects the data on its way between your end device and the VPN server, where it is then integrated into the RWTH network. In the “Full Tunnel”, for example, requests from your device for external services appear with an IP address of RWTH Aachen University. In this article, we explain how you can set up and use the RWTH VPN service.
Emojis in Everyday Life: These Are the Favorites

Source: Freepik
Most of us use them several times a day: emojis. Whether in a chat message to friends, on social media, or even in an email, these little yellow faces have become an integral part of our everyday lives. They help us express joy, irony, surprise, or compassion—often faster than words can.
In previous blog posts, we have already looked at the history of emojis. But this time we want to know: Which emojis do we actually like best and which ones do we dislike? Is it the classic laughing face with tears 😂 that accompanies every other conversation? Or does the red heart ❤️ come out on top?
Green HPC: Sustainability in the Data Centers of Tomorrow
Digital technologies have become an integral part of science and industry – but data centers are among the biggest energy consumers in the IT sector. High-performance computers in particular are essential for complex calculations in research, but at the same time cause high electricity costs and CO2 emissions. To meet these challenges, RWTH Aachen University is focusing on innovative solutions for energy efficiency and sustainable resource utilisation.
Neural Networks – The Basis of Modern AI

Source: Freepik
Neural networks are models inspired by the functioning of the human brain. They consist of artificial neurons that process information and communicate with each other. These networks enable machines to learn from data and recognise patterns without any explicit programming for each task. Examples include virtual assistants such as Alexa and Siri, translation tools such as Google Translate and creative AI systems such as ChatGPT. In this article, we will look at how neural networks work, what advantages and disadvantages they have and how RWTH Aachen University uses them.
Microsoft Office at RWTH: An Overview

Source: Unsplash
Progressive digitalisation and flexible adaptation to new circumstances have significantly changed everyday working life, studies and research at RWTH Aachen University since spring 2020. Without the right tools, communication and collaboration between members of RWTH would have been much more limited in times of home office and distance learning.
Face ID on the Rise – But What Is Behind the Technology?

Source: Freepik
Face ID has been around for a relatively short time. Facial recognition secures our data and makes it accessible only to us. We have explored this technology and gathered all the essential information to provide insight into its complex mechanics and potential security risks.
Effective Backup Strategies: Correct Data Backup

Source: Freepik
Backing up important professional or private files, such as texts, images and other documents, is essential. Data loss can have catastrophic consequences, whether caused by technical mishaps, accidental deletion or even hardware theft. Data loss can also be caused by viruses or hacker attacks. Viruses can, for example, encrypt the hard drive and then demand a ransom. Here are some proven strategies and tools to ensure that your data always remains safe and accessible. You can also take a look at the category IT-Security on our website to find out more tips.
The Printing Service at the IT Center Is Extending Its Hours!

Source: Own illustration
We have great news for you! Starting April 1, 2025, we are extending our hours: The printing service will be available Monday to Friday for RWTH institutions!
The ITSSM Department in Focus: IT Services & IT Security

Source: Alexander Müller
The IT Service & Security Management (ITSSM) department plays a key role in the establishment, control and further development of IT service management processes and security processes in the IT center. The processes support service provision, service operations, IT security, reporting and support. In the following blog post, we take a closer look at the department’s areas of work.
Blockchain Technology

Source: Freepik
Blockchain technology, often referred to simply as ‘blockchain’, is transforming the way data is stored and secured. Originally developed as the basis for cryptocurrencies such as Bitcoin, it has quickly developed into a versatile technology that is used in numerous industries.
In this blog post, you can find out how it all works and what applications there are in general.