Categories
Pages
-

IT Center Blog

From Click to Display, This Is How Computers Calculate

November 20th, 2024 | by
Visual Binary System

Source: Freepik

Computers are undoubtedly one of the most important inventions of mankind. Their influence extends to almost every area of our lives and is becoming increasingly important in our everyday lives. These machines can perform complex calculations at lightning speed. But how exactly does it work?”

Today we are therefore looking at how a computer calculates and what the binary system is.

 

Read the rest of this entry »

Moodle-Templates: Didactical Course Design

November 18th, 2024 | by
moodlemonday logo

Source: Own illustration

Designing course rooms in Moodle can be a challenge – especially for those who are not yet familiar with the platform’s extensive possibilities. It is therefore not surprising that in our last RWTHmoodle user survey in the summer semester, more than two thirds of lecturers expressed great interest in course templates. We take this feedback very seriously and are actively addressing the issue.

Read the rest of this entry »

Put me There: Teleportation in VR

November 13th, 2024 | by

Source: Put Me There Project

Virtual reality (VR) has developed into a promising technology that opens up new ways for people to interact with digital content. By putting on VR glasses, users are immersed in a virtual 3D environment that they can explore through natural body movements and direct interaction with their hands. In addition to games, VR is already being used successfully in a variety of ways, for example to train new skills, support medical procedures, preserve cultural heritage and evaluate architectural designs, to name just a few of the different areas of application.

However, most virtual environments in the various application areas are larger than the physical area in which a user can move around with VR glasses. Therefore, navigation techniques that move the user’s position through the environment purely virtually are crucial to enable unrestricted exploration.

Read the rest of this entry »

Carnival at the IT Center: Ready for the Clownish Season!

November 11th, 2024 | by

Source: Own Illustration

The fifth season is just around the corner, and at the IT Center we can hardly wait to celebrate these colourful days in style! Carnival is not only a time of celebration, but also a wonderful opportunity to experience community and admire the creative costumes of our colleagues. The festive season begins on November 11 at 11:11 am.

Read the rest of this entry »

Firewalls – The OSI Model

November 6th, 2024 | by

Source: Freepik

Welcome to the third and final part of our blog series on firewalls! In the first post we looked at the role of firewalls, and in the second we looked at the types of firewalls. In this post, we take a look at the OSI model (Open Systems Interconnection Model) and the different levels at which firewalls can operate.

Read the rest of this entry »

The Impact of Social Media on It Security

November 4th, 2024 | by
Einfluss von social media auf die IT-Sicherheit

Source: Freepik

Nowadays, almost everyone can be found on one or more social media platforms and runs one or more profiles, some of them for personal and others for professional purposes. Some use them to network, share photos of special events or stay in touch with their friends. Others use them to promote their company, association or organization. Although social networks offer numerous benefits and have become an integral part of our everyday lives, they also pose a number of risks, particularly in terms of IT security. In this post, we would like to highlight the various aspects of the impact of social media on IT security and provide an insight into how these challenges can be overcome.

 

 

Read the rest of this entry »

Halloween: The Nightmares of Cyber Security

October 31st, 2024 | by
Three carved halloween pumpkins

Source: Freepik

Fear. A feeling that probably all of us are familiar with. Especially around Halloween, the potential for scares increases. Be it the fear of disguised, made-up figures or even the worry that your sensitive data will fall into the hands of unauthorized persons. Perhaps it’s no coincidence that October of all months is IT Security Month? In this article, we take a look at a few “IT horror stories”, how you can protect yourself from them and share some interesting figures.

 

Read the rest of this entry »

CLAIX-2023: A Milestone for Research

October 30th, 2024 | by
High Performance Computer CLAIX-2023

Source: Own Illustration

October 23, 2024 marks a significant day for us: It was with great joy that we inaugurated our High Performance Computer CLAIX-2023! This modern system marks a significant advance for High Performance Computing and is available to researchers at RWTH and all German universities.

 

 

Read the rest of this entry »

Email Security – Evaluation and Application of the SPF Policy

October 28th, 2024 | by
Symbolic image of the evaluation and application of the SPF policy

Source: Own illustration

In this post of our email security series, we would like to inform you about an upcoming tightening of the SPF policy that will apply to RWTH Aachen University as of December 5, 2024. The change will prevent RWTH email addresses from being used as sender addresses by mail servers outside of RWTH Aachen University in the future. This will further increase email security at our university. Please note that this article is mainly intended for mail administrators of RWTH institutions. (*)

Read the rest of this entry »