Categories
Pages
-

IT Center Blog

Overleaf at RWTH Aachen University

August 30th, 2024 | by
Logo Overleaf

Source: Overleaf

On 6 February 2024, Overleaf officially went into regular operation at RWTH Aachen University. Thanks to the cooperation with the Technical University of Darmstadt (TU Darmstadt), employees with active status at RWTH Aachen now have access to a powerful, web-based LaTeX platform that is revolutionising the creation of scientific documents. This introduction marks a significant step towards more efficient and collaborative research and teaching.

Read the rest of this entry »

Security in E-mail Traffic 1: Digital Signing

August 28th, 2024 | by
Vector graphic with user, certificate, and seal symbol

Source: Freepik

Did you know that in June 2024, more than 80% of all incoming emails at RWTH Aachen University were identified as suspicious by the email security defense systems? [1] You may now be thinking of terms such as phishing emails or spam emails.

At some point, every recipient of an email asks themselves the question: How do I know whether the sender address is trustworthy and genuine? On the other hand, every sender asks themselves at some point: How do I know whether my email has demonstrably reached the recipient unchanged? One answer to this is: Always sign emails digitally! We would like to take a closer look at this process with you in the following blog post.

Read the rest of this entry »

RWTHmoodle – Usage Survey Results

August 26th, 2024 | by
RWTHmoodle

Source: Own Illustration

In the summer semester 2024, RWTHmoodle users once again had the opportunity to evaluate the system and the associated services such as training and support services.

The usage survey started on June 17, 2024. In total, around 36,300 people who actively used at least one course room in the summer semester 2024 were invited to take part in the RWTHmoodle usage survey. 1,750 users accepted this invitation.

Read the rest of this entry »

Induction: Fit for the IT-ServiceDesk

August 23rd, 2024 | by
Vector shaking hands and welcoming other vectors

Source: Freepik

Today, the induction team from the Service & Communication department (SeKo) is introducing itself to you. The team consists of 3 employees (Alice, Daniel and Jonathan) who use a constantly evolving induction concept to prepare new team members for support at our IT-ServiceDesk.

Read the rest of this entry »

The Role of Firewalls in Network Security

August 21st, 2024 | by
chart network security

Source: Freepik

In a world that is increasingly characterised by digital connectivity, network security is becoming an essential issue. A fundamental but often misunderstood component of network security is the firewall. Most of you have probably heard the term before. In this blog post, we’ll take a closer look at the role of firewalls, their importance in network security and how they help to prevent threats. Read the rest of this entry »

IT-Bites: Quick Fixes

August 19th, 2024 | by
A man sitting in front of his laptop and looking at the screen.

Source: Freepik

In the age of digitalisation, IT problems are an everyday nuisance that can cause significant disruption at home. However, the good news is that many of these problems can be solved quickly and easily. In this blog post, we take a look at some of the most common IT problems at home and offer practical tips for quickly solving them. Please note that these solutions are intended for private use at home only.

 

Read the rest of this entry »

A Look Behind the Scenes of Apprenticeship – Part II

August 16th, 2024 | by
Group photo of the 54 apprentices at the RWTH certificate ceremony

Source: Andreas Schmitter

Let’s continue! After Yasin Kalem gave us a review of the beginnings and hurdles of his apprenticeship in the first part, the second part of the series now follows.

Today we take a look at the end of his apprenticeship, what awaited him there and whether he might even have a tip or two for you.

Read the rest of this entry »

Women in IT: Success Stories

August 14th, 2024 | by
Three Business Women

Source: Freepik

Welcome to the second instalment of our Women in IT blog series!

In our first blog post, we looked at the obstacles and challenges faced by women in the industry. Now we turn our attention to the inspiring success stories and lasting contributions that women have already made. These pioneering women have revolutionised the world of information technology and serve as role models for future generations.

Read the rest of this entry »

Data Privacy on the Internet: Protect Your Privacy

August 12th, 2024 | by
Vector standing on Laptop with lock icon

Source: Freepik

In our digital age, digital data has become the most valuable asset. Every click, every search query, every ‘Like’ are collected and analysed. For many companies, this data is of inestimable value, for example in order to better understand target groups, place personalised advertising, etc. However, while companies can use this data to boost their business, criminals also have a keen interest in such data, as any of this information can potentially be used to cause harm. From identity theft to financial losses – the risks are numerous. Protecting your own data is therefore more important than ever before. In this blog post, we would like to give you a few suggestions on how you can protect your privacy on the internet.

Read the rest of this entry »

New Milestone Reached – RWTHgpt

August 9th, 2024 | by
Logo RWTHgpt

Source: IT Center and CLS

It’s done: Since July 16, 2024, RWTH Aachen University has been one of the first universities in Germany to offer a new service – RWTHgpt. This makes RWTH one of the pioneers in the university-wide use of artificial intelligence. In this article, we introduce you to the new AI tool, which is being developed and made available by the IT Center in cooperation with the Center for Teaching and Learning Services (CLS).

Read the rest of this entry »