Categories
Pages
-

IT Center Blog

Kategorie: ‘Support, Services & Updates’

MoodleCafé – Exchange Format for Good Teaching With RWTHmoodle

September 18th, 2024 | by
RWTH MoodleCafé

Source: own illustration

Are you looking for good practice examples for the use of RWTHmoodle in teaching? Then visit the ‘MoodleCafé’.

In this new digital exchange format, lecturers from different departments at RWTH Aachen University will present concrete examples of how they use specific functions such as StudentQuiz, PDF annotation or gamification to benefit their teaching. Take the opportunity to familiarise yourself with previously little-known functions in RWTHmoodle, exchange ideas about challenges and solutions and benefit from the positive experiences of your colleagues.

Read the rest of this entry »

Security in E-mail Traffic 3: LDAP Address Book

September 11th, 2024 | by
Isometric hacking password stealing icon with 3d computer key and warning notification vector illustration

Source: Freepik

The LDAP address book (LDAP = Lightweight Directory Access Protocol) is a type of database or directory that an email application queries via a predefined path (server name, port, branch/search base) in order to find out the user certificate of an email address, for example. If such an LDAP address book is integrated into your own email application, encrypted emails can be sent directly, for example, provided the recipients have published their user certificate in the LDAP address book. Not every e-mail has to be sent encrypted, but you can select this option if you wish and after successful setup. Read more about the encryption of emails in part 2 of the blog series.

 

Read the rest of this entry »

Security in E-mail Traffic 2: Encryption

September 4th, 2024 | by
Vector graphic with computer and lock and mail icons

Source: Freepik

It regularly happens that personal data or other sensitive information such as temporary passwords, application documents etc. need to be transmitted quickly. The choice often falls on the exchange by e-mail. However, this data must be protected against unauthorized access by third parties. In order to still be able to use e-mail, the e-mails must be encrypted. We will show you how this works in the following blog post, along with other relevant information on the subject. Go back to the first blog post in our series to read more about digital signatures.

Read the rest of this entry »

Storage Space Reduction on OneDrive & SharePoint Online

September 2nd, 2024 | by
White cloud as storage icon with file icons around it

Source: Freepik

Microsoft products play a major role in everyday university life, especially for many students. Services such as Word, PowerPoint, Excel and OneNote are part of the Microsoft licences included in the Microsoft federal contract that RWTH Aachen University has concluded with Microsoft. This gives students (and employees) the necessary rights to use the software.

Due to new votes and licence changes on the part of Microsoft, the storage space for OneDrive and SharePoint Online on the tenant for students has been redefined.

You can find out what has changed for you and how to proceed in this blog post.

Read the rest of this entry »

Overleaf at RWTH Aachen University

August 30th, 2024 | by
Logo Overleaf

Source: Overleaf

On 6 February 2024, Overleaf officially went into regular operation at RWTH Aachen University. Thanks to the cooperation with the Technical University of Darmstadt (TU Darmstadt), employees with active status at RWTH Aachen now have access to a powerful, web-based LaTeX platform that is revolutionising the creation of scientific documents. This introduction marks a significant step towards more efficient and collaborative research and teaching.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »

RWTHmoodle – Usage Survey Results

August 26th, 2024 | by
RWTHmoodle

Source: Own Illustration

In the summer semester 2024, RWTHmoodle users once again had the opportunity to evaluate the system and the associated services such as training and support services.

The usage survey started on June 17, 2024. In total, around 36,300 people who actively used at least one course room in the summer semester 2024 were invited to take part in the RWTHmoodle usage survey. 1,750 users accepted this invitation.

Read the rest of this entry »

Induction: Fit for the IT-ServiceDesk

August 23rd, 2024 | by
Vector shaking hands and welcoming other vectors

Source: Freepik

Today, the induction team from the Service & Communication department (SeKo) is introducing itself to you. The team consists of 3 employees (Alice, Daniel and Jonathan) who use a constantly evolving induction concept to prepare new team members for support at our IT-ServiceDesk.

Read the rest of this entry »

Data Privacy on the Internet: Protect Your Privacy

August 12th, 2024 | by
Vector standing on Laptop with lock icon

Source: Freepik

In our digital age, digital data has become the most valuable asset. Every click, every search query, every ‘Like’ are collected and analysed. For many companies, this data is of inestimable value, for example in order to better understand target groups, place personalised advertising, etc. However, while companies can use this data to boost their business, criminals also have a keen interest in such data, as any of this information can potentially be used to cause harm. From identity theft to financial losses – the risks are numerous. Protecting your own data is therefore more important than ever before. In this blog post, we would like to give you a few suggestions on how you can protect your privacy on the internet.

Read the rest of this entry »

New Milestone Reached – RWTHgpt

August 9th, 2024 | by
Logo RWTHgpt

Source: IT Center and CLS

It’s done: Since July 16, 2024, RWTH Aachen University has been one of the first universities in Germany to offer a new service – RWTHgpt. This makes RWTH one of the pioneers in the university-wide use of artificial intelligence. In this article, we introduce you to the new AI tool, which is being developed and made available by the IT Center in cooperation with the Center for Teaching and Learning Services (CLS).

Read the rest of this entry »