Kategorie: ‘Support, Services & Updates’
News From the Areas of Servers, Storage and Server Hosting

Source: Freepik
We have some news to announce since our last status report from the Systems & Operation Department (SuB). Since December 1, 2021, there are new framework agreements for the procurement of servers and SAN storage systems. In the Virtual Server Hosting section, we have updated information on the infrastructure, the updated VM limits of Virtual Server Hosting as well as new processes for ordering VMs. Stay tuned to learn more about virtual machines and resources at RWTH Aachen University.
How Do I Get Access to My RWTH Email Account?

Source: Freepik
At the beginning of the semester, we are currently receiving a lot of support requests regarding the “RWTH E-Mail account”. Therefore, in this article we would like to briefly and concisely inform you about everything important regarding your faithful study companion, in order to facilitate communication and the exchange of information as quickly as possible!
Changed Opening Hours of the IT-ServiceDesk on October 21, 2022

Source: Freepik
Due to an internal event, the IT-ServiceDesk will be open on Friday, October 21, 2022 at limited hours.
On this day, our locations Seffenter Weg 23 and SuperC will be closed for personal support. Read the rest of this entry »
Welcome to the Winter Semester 2022/23!

Source: Pixabay
We’re glad you’re here and happy to start the new semester with you!
For the new international students, the RWTH has already organized the Welcome Week – also the IT Center was there to make the start in the new country and at the (yet) foreign university a little more pleasant.
You are also new at RWTH and still have difficulties with the IT services? Below in the text you will find a small guide for a good start: A Good Start – IT Services for the Start at RWTH Aachen University
NHR4CES – In a New Design

Source: NHR4CES
In order to focus on the strengths of the collaboration between RWTH Aachen University and Darmstadt University of Technology and to put the goals of NHR4CES in the spotlight, a redesign of its website has been carried out over the last few months. We are very pleased to introduce you to this project and its website as well as the new features added in the process.
Project Delay Archive Migration

Source: Pixabay
***Update***
Currently, the migration of the archive data is still ongoing and will last beyond the extended project goal. Users whose data has not yet been migrated will be contacted by email. You can check the current status of the migration on our reporting page. (*)
The “Archive Migration” project, in which we are transferring archived data from the TSM inventory system to the new target systems DigitalArchive and Coscine, is developing more and more into a mammoth project. Despite extensive planning of the five sub-projects and comprehensive communication on the classification of the archived nodes, unforeseeable problems occurred and continue to occur in the technical implementation of the migration, which are now leading to a project delay. Read the rest of this entry »
Email Security – Why Are Redirections Bad?

Source: Freepik
The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.
In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.
MUST
MPI Runtime Correctness Analysis
High performance computing (HPC) is largely concerned with parallelizing programs, especially complex simulations such as models for weather forecasting or climate. To ensure that computations finish quickly, the work to be done is divided among different processes in parallel. Depending on the use case, the processes must exchange their intermediate results with other processes at program runtime.
The IT Center’s IT Security Measures

Source: Freepik
With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »




