Kategorie: ‘Audience’
SysAdmin Day 2024: A Big Thank You!
![Yellow badge with thank-you title](https://blog.rwth-aachen.de/itc/files/2024/07/34680457_8183433-1-300x204.png)
Source: freepik
Today we are honouring the invisible heroes who work behind the scenes to ensure that our IT infrastructure runs smoothly. Whether it’s computers, networks, data backups, printers or internet connections – the people we’re talking about are of course our system administrators – SysAdmins for short.
In fact, today we are celebrating System Administrator Appreciation Day!
A Look Behind the Scenes of Apprenticeship – Part I
![Green traffic sign with learning imprint in different directions](https://blog.rwth-aachen.de/itc/files/2024/07/to-learn-64058_1280-300x200.jpg)
Source: pixabay
After Daniel Malenkovic successfully completed his apprenticeship as a dialog marketing specialist at the IT Center in February 2024, we were delighted to welcome another graduate in June: Yasin Kalem.
After three years of hard work, he too has finally achieved his goal. But what was it like for him? What did he do with us, how did he feel and what’s next for him?
That’s exactly what we asked him and we take a look at his journey with us in a one-to-one interview.
Rwthapp Relaunch: Your Feedback is Needed
More than a year has already passed since the relaunch of RWTHapp on 3 April 2023. In this blog post, we want to give you an insight into what has happened since then and what the future holds for RWTHapp. Your opinion is particularly important to us. Which is why at the end of the post you will also find out how you can directly influence the further course of development and maybe even win a little something by doing so
Ethical Hacking: Hacking for More Security
![A woman focused on computer code, engaged in hacking activities.](https://blog.rwth-aachen.de/itc/files/2024/07/Ethical-Hacking-1-300x200.png)
Source: Freepik
Imagine you let someone deliberately try to break into your house to test your security system. Sounds strange, doesn’t it? But that’s exactly what ethical hackers do in the digital space. They try to break into systems – with permission, of course – to uncover security vulnerabilities before they can be exploited by criminals. In this article, you will learn everything you need to know about ethical hacking, the important role it plays in IT security and how it is used in practice.
Help, My Email Password Was Compromised!
![Laptop with spam pop-ups](https://blog.rwth-aachen.de/itc/files/2024/07/18841272_5987262-1-e1721290547893-300x200.jpg)
Source: Freepik
In the digital world, email accounts are a central part of our lives. If your email password has been compromised, it can have serious consequences: A hacked email account gives cybercriminals the opportunity to send phishing emails with fraudulent links to your family members, friends and addressees in your name.
In this article, you will learn how you can better protect your accounts and devices to prevent them from being compromised.
The Evolution of Emojis Part 2
![An assortment of colorful emojis on the keyboard](https://blog.rwth-aachen.de/itc/files/2024/06/Emojis-2-3000-x-2000-px-min-1-300x200.png)
Source: Unsplash
In the last part on the evolution of emojis, you were able to delve deeper into the development process and historical background. Today it’s all about the evolution in terms of influencing our digital communication.
Archer: Error Detection for HPC
![Archer Logo](https://blog.rwth-aachen.de/itc/files/2024/07/Blog-Layout-1-300x200.png)
Source: Pruners Github
The world of high-performance computing is developing rapidly and computing capacities are reaching new heights. In this context, tools for error detection and correction are essential to ensure the reliability of applications. One such tool is Archer, which was specially developed to detect data races in OpenMP programmes.
The Evolution of Emojis Part 1
![An assortment of colorful emojis](https://blog.rwth-aachen.de/itc/files/2024/06/Emojis-3D-3000-x-2000-px-1-300x200.png)
Source: Freepik
Everyone knows them and almost everyone has used them at some point – welcome to the world of emojis!
But when did emojis come into existence and what exactly is the difference between emojis and emoticons and what does emoji mean?
We answer these and many other questions in the following blog post.
Exam Scan – Digital Inspection
![Moodle Monday](https://blog.rwth-aachen.de/itc/files/2024/07/MoodleMonday_mit_Muster.file_-300x200.png)
Source: Own Illustration
Digital inspections offer a number of advantages: They save resources by reducing the use of staff, students can participate remotely and receive a copy of the exam without additional effort, which they are allowed to request in accordance with the Higher Education Act in NRW.
In order to be able to use these advantages for paper pencil exams, the IT Center, CLS and the Chair of Controlling at RWTH Aachen University have developed Exam Scan, a Moodle plugin that prepares such exams for digital viewing.
ZKI – From Project to Working Group
![Surreal photo: Finger click on cloud in the sky](https://blog.rwth-aachen.de/itc/files/2024/07/Blog-Layout-300x200.png)
Source: Pixabay
As a partner, the IT Center actively supports the design of digitalisation processes at RWTH Aachen University. This also includes the use of cloud services and the correspondingly increasing needs of teaching staff, researchers and students at RWTH Aachen University. The flexibility and scalability of cloud services can be a means of meeting the ever more rapidly changing IT requirements of users.