Making Video Conferences more efficent- Tips for Presenters 4/4
In our previous blogposts in the series “Efficient video conferencing” we have already reported on which tools you can use for a successful online meeting, how to plan and structure an online meeting correctly and which roles you should assign in a meeting with several participants.
Face-to-face meetings are becoming online meetings, physical training is becoming virtual training, and professional meetings are becoming digital. For many, the workday has changed, and even after the pandemic, some employees will take advantage of the opportunity to work from a home office.
We will give you a few tips on how you, as a facilitator, can guide participants through such online events. Read the rest of this entry »
New Year – New CLAIX Report
The year 2021 is again characterized by progress in research.
High-performance computers such as the Cluster Aix-la-Chapelle (CLAIX) help to understand global issues and solve problems that challenge science. Find out which interesting projects were running on CLAIX in 2021 and which solutions were found for which problems in the CLAIX Annual Report 2021.
E-Mail Security – Why Are Redirections Bad?
The third part of our series of articles on e-mail security deals with the identification protocol DKIM and the standard method for e-mail authentication DMARC.
In our first article and second article on the topic of e-mail security, we informed you about the origins of e-mail and the current statistics in mail traffic at RWTH. In addition, we explained what the SMTP protocol is and what problems it can cause.
MUST
MPI Runtime Correctness Analysis
High performance computing (HPC) is largely concerned with parallelizing programs, especially complex simulations such as models for weather forecasting or climate. To ensure that computations finish quickly, the work to be done is divided among different processes in parallel. Depending on the use case, the processes must exchange their intermediate results with other processes at program runtime.
The IT Center’s IT Security Measures
With technological progress and the increasing digitization of processes, the topic of IT security is gaining more and more importance. The risks associated with digitalization affect us all. Improper behavior and naivety in dealing with information technology can have serious, costly consequences. That is why the security awareness of users in particular should be actively encouraged. IT security also plays a major role at the IT Center. In this blog, for example, we repeatedly draw your attention to security risks and explain how you can be more aware when using information technology. In this post, we would like to give you an overview of the IT security measures that have been implemented at the IT Center, for both yours and our protection. Read the rest of this entry »
Deactivation of the Feedback-Function
As we already know, everything has an end at some point.
So does our ticket feedback. After more than a year of testing, it’s time to say goodbye to our feedback function.
Artificial Intelligence – Curse or Blessing for IT Security?
We are increasingly coming across the term “artificial intelligence” (AI). Whenever we come across this term that has become a fashionable phenomenon in the media, there are regularly reports about self-thinking AI, fully autonomous means of transport or other similar applications. For many of us, it can be hard to figure out what is actually meant by the term. However, the application areas of AI that seem to be particularly popular in the media are in reality only a very small segment of the actual application field of AI. Many a user would probably even be surprised to know in which areas AI is already being implemented today. In this article, we would like to take a closer look at the term and explain what role artificial intelligence can play in the field of IT security.
RWTHcontacts – Now Online!
With RWTHcontacts, you get insight into the new organization directory at RWTH Aachen University. To support digitalized processes and in everyday work, we often need information about which employees work at RWTH, where exactly they work and, most importantly, how to reach them.
An organization directory helps us to get this information. It is an information system that contains important data about the mapped institutions. In addition to the master data record, this also includes contacts and addresses. Read the rest of this entry »
RWTHmoodle – Results of This Year’s User Survey
This summer semester, RWTHmoodle users once again had the chance to evaluate the system and its associated services.
The user survey started in June 2022. 37.300 people who actively used at least one course room in the summer semester 2022 were asked to participate in the RWTHmoodle user survey. 1.820 users complied with this request.