Categories
Pages
-

IT Center Blog

Making Video Conferences more efficent- Tips for Presenters 4/4

September 12th, 2022 | by
Presenter stands in front of online video conference and speaks to participants

Presenter speaks in online meeting
Source: Pixabay

In our previous blogposts in the series “Efficient video conferencing” we have already reported on which tools you can use for a successful online meeting, how to plan and structure an online meeting correctly and which roles you should assign in a meeting with several participants.

Face-to-face meetings are becoming online meetings, physical training is becoming virtual training, and professional meetings are becoming digital. For many, the workday has changed, and even after the pandemic, some employees will take advantage of the opportunity to work from a home office.

We will give you a few tips on how you, as a facilitator, can guide participants through such online events. Read the rest of this entry »

New Year – New CLAIX Report

September 9th, 2022 | by
yellow background design with year 2021

Source: Freepik

The year 2021 is again characterized by progress in research.

High-performance computers such as the Cluster Aix-la-Chapelle (CLAIX) help to understand global issues and solve problems that challenge science. Find out which interesting projects were running on CLAIX in 2021 and which solutions were found for which problems in the CLAIX Annual Report 2021.

Read the rest of this entry »

E-Mail Security – Why Are Redirections Bad?

September 7th, 2022 | by
Illustration mail correspondence

Source: Freepik

The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.

In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.

 

 

Read the rest of this entry »

MUST
MPI Runtime Correctness Analysis

September 5th, 2022 | by
logo MUST

Source: Own illustration

High performance computing (HPC) is largely concerned with parallelizing programs, especially complex simulations such as models for weather forecasting or climate. To ensure that computations finish quickly, the work to be done is divided among different processes in parallel. Depending on the use case, the processes must exchange their intermediate results with other processes at program runtime.

Read the rest of this entry »

The IT Center’s IT Security Measures

September 2nd, 2022 | by
Falling dominoes

Source: Freepik

With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »

Deactivation of the Feedback-Function

August 31st, 2022 | by

 

Feedback written with chalk on a blackboard

Source: Pixabay

As we already know, everything has an end at some point.

So does our ticket feedback. After more than a year of testing, it’s time to say goodbye to our feedback function.

Read the rest of this entry »

Artificial Intelligence – Curse or Blessing for IT Security?

August 29th, 2022 | by
Concept of digital transformation of the brain of AI technology

Source: Freepik

We are increasingly coming across the term “artificial intelligence” (AI). Whenever we come across this term that has become a fashionable phenomenon in the media, there are regularly reports about self-thinking AI, fully autonomous means of transport or other similar applications. For many of us, it can be hard to figure out what is actually meant by the term. However, the application areas of AI that seem to be particularly popular in the media are in reality only a very small segment of the actual application field of AI. Many a user would probably even be surprised to know in which areas AI is already being implemented today. In this article, we would like to take a closer look at the term and explain what role artificial intelligence can play in the field of IT security.

Read the rest of this entry »

IT Center Summer Party 2022

August 26th, 2022 | by
Group photo of the IT Center toasting

Source: Own illustration

The IT Center Summer Party 2022 was held on August 12, 2022.

The party team invited all employees, trainees and student assistants to participate in the summer party.
It was a great day with fantastic weather, good drinks, delicious food and the best team.

Read the rest of this entry »

RWTHcontacts – Now Online!

August 24th, 2022 | by
Screenshot of the Website RWTHcontacts

Source: Own Illustration

With RWTHcontacts, you get insight into the new organization directory at RWTH Aachen University. To support digitalized processes and in everyday work, we often need information about which employees work at RWTH, where exactly they work and, most importantly, how to reach them.

An organization directory helps us to get this information. It is an information system that contains important data about the mapped institutions. In addition to the master data record, this also includes contacts and addresses. Read the rest of this entry »

RWTHmoodle – Results of This Year’s User Survey

August 22nd, 2022 | by
Hashtag moodle monday

Source: Own Illustration

This summer semester, RWTHmoodle users once again had the chance to evaluate the system and its associated services.

The user survey started in June 2022. 37.300 people who actively used at least one course room in the summer semester 2022 were asked to participate in the RWTHmoodle user survey. 1.820 users complied with this request.

Read the rest of this entry »