Categories
Pages
-

IT Center Blog

Women in IT: TANDEM Mentoring

November 22nd, 2024 | by
TANDEM Mentoring Programme

Source: Martin Braun

As part of our ‘Women in IT’ series, we have already talked about the challenges faced by women in IT and shared some success stories. In the third article, we presented the FEMTEC Career Building Programs. Today, in the fourth part, we would like to introduce the TANDEM mentoring programs at RWTH Aachen University – important tools for equal opportunities career development that support women in shaping their careers in science and research while promoting gender equality in the academic environment.

Read the rest of this entry »

From Click to Display, This Is How Computers Calculate

November 20th, 2024 | by
Visual Binary System

Source: Freepik

Computers are undoubtedly one of the most important inventions of mankind. Their influence extends to almost every area of our lives and is becoming increasingly important in our everyday lives. These machines can perform complex calculations at lightning speed. But how exactly does it work?”

Today we are therefore looking at how a computer calculates and what the binary system is.

 

Read the rest of this entry »

Moodle-Templates: Didactical Course Design

November 18th, 2024 | by
moodlemonday logo

Source: Own illustration

Designing course rooms in Moodle can be a challenge – especially for those who are not yet familiar with the platform’s extensive possibilities. It is therefore not surprising that in our last RWTHmoodle user survey in the summer semester, more than two thirds of lecturers expressed great interest in course templates. We take this feedback very seriously and are actively addressing the issue.

Read the rest of this entry »

Put me There: Teleportation in VR

November 13th, 2024 | by

Source: Put Me There Project

Virtual reality (VR) has developed into a promising technology that opens up new ways for people to interact with digital content. By putting on VR glasses, users are immersed in a virtual 3D environment that they can explore through natural body movements and direct interaction with their hands. In addition to games, VR is already being used successfully in a variety of ways, for example to train new skills, support medical procedures, preserve cultural heritage and evaluate architectural designs, to name just a few of the different areas of application.

However, most virtual environments in the various application areas are larger than the physical area in which a user can move around with VR glasses. Therefore, navigation techniques that move the user’s position through the environment purely virtually are crucial to enable unrestricted exploration.

Read the rest of this entry »

Carnival at the IT Center: Ready for the Clownish Season!

November 11th, 2024 | by

Source: Own Illustration

The fifth season is just around the corner, and at the IT Center we can hardly wait to celebrate these colourful days in style! Carnival is not only a time of celebration, but also a wonderful opportunity to experience community and admire the creative costumes of our colleagues. The festive season begins on November 11 at 11:11 am.

Read the rest of this entry »

Firewalls – The OSI Model

November 6th, 2024 | by

Source: Freepik

Welcome to the third and final part of our blog series on firewalls! In the first post we looked at the role of firewalls, and in the second we looked at the types of firewalls. In this post, we take a look at the OSI model (Open Systems Interconnection Model) and the different levels at which firewalls can operate.

Read the rest of this entry »

The Impact of Social Media on It Security

November 4th, 2024 | by
Einfluss von social media auf die IT-Sicherheit

Source: Freepik

Nowadays, almost everyone can be found on one or more social media platforms and runs one or more profiles, some of them for personal and others for professional purposes. Some use them to network, share photos of special events or stay in touch with their friends. Others use them to promote their company, association or organization. Although social networks offer numerous benefits and have become an integral part of our everyday lives, they also pose a number of risks, particularly in terms of IT security. In this post, we would like to highlight the various aspects of the impact of social media on IT security and provide an insight into how these challenges can be overcome.

 

 

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

CLAIX-2023: A Milestone for Research

October 30th, 2024 | by
High Performance Computer CLAIX-2023

Source: Own Illustration

October 23, 2024 marks a significant day for us: It was with great joy that we inaugurated our High Performance Computer CLAIX-2023! This modern system marks a significant advance for High Performance Computing and is available to researchers at RWTH and all German universities.

 

 

Read the rest of this entry »