Basics at RWTH: RWTHmoodle

Source: Own Illustration
Welcome to the fourth article in our series: Basics at RWTH. Having already dealt with topics such as the e-mail service, ConnectMe and the IdM self-service, today we are taking a closer look at RWTHmoodle – the central learning platform at RWTH Aachen University.
RWTHmoodle is the hub of learning for many students. Here you will not only find course materials and submission options, but also many other tools that make your everyday study life easier.
From AiXcelerate 2024 to PPCES 2025
After the aiXcelerate 2023 was replaced by the VI-HPS Porting & Tuning Workshop, the traditional aiXcelerate took place again last year.
In the following blog post, we look back at aiXcelerate 2024 and take a look at the upcoming PPCES 2025.

Source: Own illustration
European Data Privacy Day 2025

Source: Freepik
Every year on January 28 is European Data Privacy Day – a date that reminds us of the importance of protecting our personal data and privacy in the digital world. We at the IT Center take this day as an opportunity to draw attention to key aspects of data protection. We already emphasised the importance of protecting our personal data in last year’s article.
Women in IT: Women at the IT Center

Source: Freepik
This post concludes our blog series “Women in IT”, which we have published over the last few months. In the previous posts, we have already highlighted the challenges, success stories and initiatives for women in IT. Today, we would like to present the Women at the IT Center event, which is not only another highlight in our series, but also further promotes networking and equality in the IT sector.
Between Viruses and Worms

Source: Freepik
With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous – from stealthy data theft to automatic distribution via botnets.
WestAI: Access to AI for Business and Science

Source: Own illustration
The launch of the WestAI AI service centre will revolutionise access to artificial intelligence for companies and scientists in Germany. Under the leadership of the University of Bonn and with the support of leading research institutions from North Rhine-Westphalia, WestAI offers innovative AI services and state-of-the-art computing infrastructure that can be used immediately – and currently even free of charge. The IT Center of RWTH Aachen University offers part of this infrastructure.
Migration From RDS to DataStorage.nrw – What You Need to Know

Source: DataStorage.nrw
With the switch from Research Data Storage (RDS) to DataStorage.nrw, the migration of research data is due from the launch of DataStorage.nrw. In this article, we will give you an overview of how the migration works, what you should bear in mind and what changes you will have to expect.
Zero-Day Vulnerabilities

Source: Own Illustration
Imagine working every day on a computer that seems to run smoothly. Everything works as usual – until one day a security problem is discovered that nobody knew about. Suddenly, a security vulnerability is discovered that attackers have known about for weeks or even months and taken advantage of undetected. This type of vulnerability is known as a zero-day vulnerability. In this blog post, we’ll explore what exactly zero-day vulnerabilities are, why they are particularly dangerous and how best to deal with them.
RWTHapp: New Feature for Loans in the University Library
We are pleased to announce an exciting new feature in the RWTHapp! From now on, all RWTH students have the opportunity to borrow books from the University Library (UB) even more easily. The new barcode scanning feature of the RWTHapp makes borrowing books easier than ever before.
The Beginnings of Computer Technology – Part 2

Source: Konrad Zuse Internet Archive
In our last article, The beginnings of computer technology, we already took a look at the first calculating machines by Konrad Zuse. Now we want to discuss the individual components of the Z3, which is considered to be the world’s first fully programmable computer, and find out which of its concepts are still used in modern computer technology. In particular, this article will focus on the architecture of the Z3.



