Kategorie: ‘Topic’
IT Support Behind the Scenes

Source: Own Illustration
For many customers, IT support often looks like this: A click of a call or an email to the IT-ServiceDesk, and a short time later the problem is solved. But what happens behind the scenes to ensure that everything runs smoothly? In this blog post, we provide an insight into the varied day-to-day work of the IT-ServiceDesk.
Upgrade for Writing Back Exams: In-House Development “MosesInt” Helps

Source: Own Illustration
Do you know how exam dates are organized at RWTH? Every semester, a large number of dates are planned centrally using the “carpe diem!” software and then transferred to RWTHonline – a process known as “exam re-registration”.
Until now, the complex merging of data from both systems has posed a particular challenge. As the software providers were not yet able to provide an automated solution for the process, the IT Center and the departments involved had to resort to manual workarounds.
Thanks to the “MosesInt” project, this is now a thing of the past! Read more about the new local app “Exam planning and write-back”, which has now been made available, in the article.
Basics at RWTH: RWTHmoodle

Source: Own Illustration
Welcome to the fourth article in our series: Basics at RWTH. Having already dealt with topics such as the e-mail service, ConnectMe and the IdM self-service, today we are taking a closer look at RWTHmoodle – the central learning platform at RWTH Aachen University.
RWTHmoodle is the hub of learning for many students. Here you will not only find course materials and submission options, but also many other tools that make your everyday study life easier.
From AiXcelerate 2024 to PPCES 2025
After the aiXcelerate 2023 was replaced by the VI-HPS Porting & Tuning Workshop, the traditional aiXcelerate took place again last year.
In the following blog post, we look back at aiXcelerate 2024 and take a look at the upcoming PPCES 2025.

Source: Own illustration
European Data Privacy Day 2025

Source: Freepik
Every year on January 28 is European Data Privacy Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. We at the IT Center take this day as an opportunity to draw attention to key aspects of data protection. We already emphasised the importance of protecting our personal data in last year’s article.
Women in IT: Women at the IT Center

Source: Freepik
This post concludes our blog series “Women in IT”, which we have published over the last few months. In the previous posts, we have already highlighted the challenges, success stories and initiatives for women in IT. Today, we would like to present the Women at the IT Center event, which is not only another highlight in our series, but also further promotes networking and equality in the IT sector.
Between Viruses and Worms

Source: Freepik
With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous – from stealthy data theft to automatic distribution via botnets.
WestAI: Access to AI for Business and Science

Source: Own illustration
The launch of the WestAI AI service centre will revolutionise access to artificial intelligence for companies and scientists in Germany. Under the leadership of the University of Bonn and with the support of leading research institutions from North Rhine-Westphalia, WestAI offers innovative AI services and state-of-the-art computing infrastructure that can be used immediately – and currently even free of charge. The IT Center of RWTH Aachen University offers part of this infrastructure.
Migration From RDS to DataStorage.nrw – What You Need to Know

Source: DataStorage.nrw
With the switch from Research Data Storage (RDS) to DataStorage.nrw, the migration of research data is due from the launch of DataStorage.nrw. In this article, we will give you an overview of how the migration works, what you should bear in mind and what changes you will have to expect.
Zero-Day Vulnerabilities

Source: Own Illustration
Imagine working every day on a computer that seems to run smoothly. Everything works as usual – until one day a security problem is discovered that nobody knew about. Suddenly, a security vulnerability is discovered that attackers have known about for weeks or even months and taken advantage of undetected. This type of vulnerability is known as a zero-day vulnerability. In this blog post, we’ll explore what exactly zero-day vulnerabilities are, why they are particularly dangerous and how best to deal with them.