Kategorie: ‘Fun & Facts’
New Year’s Resolutions for More IT Security
![Empty list for New Year's resolutions](https://blog.rwth-aachen.de/itc/files/2024/01/stillleben-mit-neujahrsvorsaetzen-1-300x200.jpg)
Source: Freepik
For many, it’s part of the New Year’s ritual: New Year’s resolutions! According to Statista, the top three resolutions in Germany this year include saving more money, doing more sport, and eating more healthily. 17% of respondents even said they wanted to spend less time on social networks. When using social media, however, it is also important to make the user experience itself as secure as possible.
In the following blog post, we introduce you to five resolutions that will help you increase your IT security and support your approach to IT.
Security Mechanisms Unravelled: MFA
![Laptop surrounded by security icons](https://blog.rwth-aachen.de/itc/files/2023/12/Blog-Layout-1-1-300x200.png)
Source: Freepik
Multifactor-authentication (MFA) is a security method that enables access to digital resources such as devices, networks or online services by combining multiple authentication factors. Essentially, MFA requires at least two independent confirmations of a user’s identity to access the resource.
The Leap Year 2024
![](https://blog.rwth-aachen.de/itc/files/2023/12/flacher-schreibtischkalender-und-uhr-1-300x201.jpg)
Source: Freepik
Every year again … or rather every four years again.
The coming year 2024 has another day in store for us – February 29.
But what is a leap year and why does it exist?
It generally only occurs every four years, but there are some exceptions. In this blog post, you can find out more about the background to leap years, how they are calculated and why they exist at all.
IT-Zauber: Efficient Data Centres
![IT Zauber Logo](https://blog.rwth-aachen.de/itc/files/2023/12/Blog-Layout-4-300x200.png)
Source: Own illustration
The IT-Zauber project, funded by the BMBF as part of the nine joint research projects of the GreenHPC program, aims to improve the efficiency and sustainability of data centres through digital twins. These digital images enable a holistic view of data centres by encompassing the entire operation including the computer load as well as the power supply and cooling infrastructure.
Sustainable Email Use: CO2 Impact
After highlighting the environmental impact of emails in a previous article, we now take a closer look at the digital carbon footprint of digital activities, including email communication. In the previous article, we emphasized that although emails may seem more environmentally friendly than traditional letters at first glance, they still leave their own ecological footprint. We gave some tips on how to make your email traffic more environmentally friendly. But what is the actual environmental impact?
De Supinski: El Capitan – Exascale System
![Bronis Talk in SW23](https://blog.rwth-aachen.de/itc/files/2023/12/Bild1-300x225.jpg)
Source: Own Illustration
Recently, we had the honour of experiencing a remarkable talk by Bronis R. de Supinski, the CTO of Livermore Computing, who dove deep into the design and insights behind the NNSA (National Nuclear Security Administration, part of the United States Department of Energy) Exascale System, El Capitan.
Internship Abroad in Malta
Our apprentice, Yasin Kalem, who has already given us an insight into DiMa apprenticeship in the past, was able to complete an internship abroad in Malta as part of the apprenticeship and Erasmus+ program. He spent a total of five weeks on the Maltese islands, where he worked as a “Business Development Manager” at the esports academy “Level Academy Malta”.
He has summarized everything he experienced there for us.
From Cog Wheels to High Technology
The beginnings of IT go back a long way. It all started with a calculating machine. Today, we’re way beyond that. But how did we get there? This article is about the long but successful journey of IT. We’ll tell you about the milestones in the history of IT and of the IT Center. Read the rest of this entry »
IT Fairy Tale Hour – What’s Behind the Myths?
Welcome back to the IT fairy tale hour! Today, we dive once again into the fascinating world of IT myths. There are some mysterious myths to discover about Artificial Intelligence.
Today: Part 3 – The Enchanted AI World