Kategorie: ‘Employees’
Company Excursion 2024 – Cologne Here we Come
The company excursion on April 19, 2024, was a highlight in the IT Center employees’ calendar. The idea of spending a day together outside the office was met with great enthusiasm. The plan was not only to strengthen team ties, but also to gain interesting insights into High Performance Computing at the University of Cologne’s Regional Computing Centre and then to undertake various activities together in Cologne. Almost 120 employees set off to explore Cologne and spend a great day together.
New Function in the Telephone-Administration
Until now, telephone numbers and telephones were managed and controlled centrally.
With a new function in the TK-Portal, administrators can now manage telephones for their facilities independently.
To be able to use this, you need the “Verwaltung Telefonie” role, which can be issued to you by the relevant role manager.
You can find out exactly what the new function means below.
Help Us to Improve Coscine!
Coscine has now been in regular operation at RWTH Aachen University for a year. On the occasion of this event, we are counting on your opinion. If you actively use Coscine, the platform for research data management, you now have the opportunity to share your experiences and give us valuable feedback from April 22 to May 6, 2024. Together, we can continue to improve Coscine and adapt the support offering accordingly.
Meet Us – The Editorial Team
Hey! 🙂
Or “Moin!” as our colleague Merrit from the north would say – we are the editorial team of the IT Center and would like to introduce ourselves to you with this article. Every day we work to provide you with information about our services, IT security updates and news from the IT Center cosmos.
Community Meeting of Moodle.NRW
After the Moodle university meeting at the University of Leipzig in March, the competence centers ILIAS.nrw and Moodle.NRW jointly invited to a community meeting at the Ruhr University Bochum (RUB) on April 10. The meeting was aimed at all those involved in the use and development of the Moodle or ILIAS learning platforms at their university or other educational institutions. Colleagues from the “Service & Communication” department also accepted the invitation and are happy to report on the gathering here.
In addition to the opportunity to exchange ideas with other participants in personal discussions, a total of 16 sessions were held on various topics relating to the platforms and the design of digital teaching. RWTH Aachen University was also involved with a presentation. As in Leipzig, Harald Schnurbusch from the Center for Teaching and Learning Services (CLS) presented the Moodle plugin Exam Scan developed at RWTH.
World Backup Day: Security Through Data Backup
March 31st is World Backup Day – a day to remind us how important it is to protect our digital data. In an increasingly connected world where our personal and business data is stored digitally, backing up this data is crucial to protect it from loss or cyber threats.
Webhosting: Registration, Security & Administration
What does webhosting mean?
Webhosting refers to the provision of storage space (webspace) for the provision of websites. The people who create the website fill this webspace with different content, including images, videos, files, and fonts. Websites are similar to text documents that can be made available and accessed on the Internet. The content of the websites must be saved so that we can access them from anywhere at any time. However, this storage does not take place on a local computer, but on a high-performance server that is connected to the Internet around the clock. In this way, the created website remains continuously available online and the content can be accessed by users worldwide. RWTH Aachen University and FH Aachen University of Applied Sciences cooperate to provide webspace to institutes and student associations as webhosting providers.
Spoofing: An Underestimated Threat
In the world of IT security, there are a variety of threats that can affect companies and individuals alike. One of these threats that is often underestimated is spoofing. Spoofing is a technique where the attacker attempts to disguise their true identity in order to gain access to sensitive information. In doing so, they attempt to cause damage or pretend to be a trustworthy source. In this blog post, we will take a closer look at the technique of spoofing, show the different forms it can take and explain how companies and individuals can protect themselves against spoofing attacks.
Mail Security – How to Configure Forwarding Correctly
In this article in our mail security series, we will show you how to configure the forwarding of incoming mails. In our previous articles, we have informed you about the problems involved in sending mails, possible security vulnerabilities and security mechanisms that have already been implemented and explained why redirects are bad. This article is about setting up forwarding in the RWTH Mail App, also known as “OWA” (Outlook Web App).