Categories
Pages
-

IT Center Blog

Basics at RWTH: Using the VPN

April 28th, 2025 | by

Source: Own Illustration

At RWTH Aachen University, the Virtual Private Network (VPN) provides an important and secure connection to the university network. This connection is secured by encryption protocols such as TLS. VPN ensures that all data traffic – either to the RWTH network or, depending on the configuration, also to the Internet – is routed via a so-called “tunnel”. This tunnel protects the data on its way between your end device and the VPN server, where it is then integrated into the RWTH network. In the “Full Tunnel”, for example, requests from your device for external services appear with an IP address of RWTH Aachen University. In this article, we explain how you can set up and use the RWTH VPN service.

Read the rest of this entry »

Emojis in Everyday Life: These Are the Favorites

April 25th, 2025 | by

Emojis with different facial expressions

Source: Freepik

Most of us use them several times a day: emojis. Whether in a chat message to friends, on social media, or even in an email, these little yellow faces have become an integral part of our everyday lives. They help us express joy, irony, surprise, or compassion—often faster than words can.

In previous blog posts, we have already looked at the history of emojis. But this time we want to know: Which emojis do we actually like best and which ones do we dislike? Is it the classic laughing face with tears 😂 that accompanies every other conversation? Or does the red heart ❤️ come out on top?

 

Read the rest of this entry »

IT Knowledge for Scrolling – Our Instagram Channel @itcenterrwthaachen

April 23rd, 2025 | by

Source: Own Illustration

Right at the start of 2025, we launched something completely new: Our Instagram channel @itcenterrwthaachen is live!

Since January 6, 2025, the IT Center of RWTH Aachen University has also been on Instagram – and we are delighted to welcome everyone who already follows us there, interacts with us or simply visits us regularly.

Read the rest of this entry »

Green HPC: Sustainability in the Data Centers of Tomorrow

April 16th, 2025 | by
Photo of recooler with optional "adiabatic" pre-cooling. The visible filter mats are moistened with water if required.

Source: Own Illustration

Digital technologies have become an integral part of science and industry – but data centers are among the biggest energy consumers in the IT sector. High-performance computers in particular are essential for complex calculations in research, but at the same time cause high electricity costs and CO2 emissions. To meet these challenges, RWTH Aachen University is focusing on innovative solutions for energy efficiency and sustainable resource utilisation.

Read the rest of this entry »

Neural Networks – The Basis of Modern AI

April 14th, 2025 | by
Graphic of three people, with dots connected by lines above them

Source: Freepik

Neural networks are models inspired by the functioning of the human brain. They consist of artificial neurons that process information and communicate with each other. These networks enable machines to learn from data and recognise patterns without any explicit programming for each task. Examples include virtual assistants such as Alexa and Siri, translation tools such as Google Translate and creative AI systems such as ChatGPT. In this article, we will look at how neural networks work, what advantages and disadvantages they have and how RWTH Aachen University uses them.

 

Read the rest of this entry »

Microsoft Office at RWTH: An Overview

April 9th, 2025 | by

Source: Unsplash

Progressive digitalisation and flexible adaptation to new circumstances have significantly changed everyday working life, studies and research at RWTH Aachen University since spring 2020. Without the right tools, communication and collaboration between members of RWTH would have been much more limited in times of home office and distance learning.

Read the rest of this entry »

Face ID on the Rise – But What Is Behind the Technology?

April 7th, 2025 | by

Source: Freepik

Face ID has been around for a relatively short time. Facial recognition secures our data and makes it accessible only to us. We have explored this technology and gathered all the essential information to provide insight into its complex mechanics and potential security risks.

Read the rest of this entry »

New Certification Authority: From Sectigo to Harica

April 4th, 2025 | by
Clipboard with paper on which several boxes are ticked off

Source: Own illustration

The time has come! Since April 1, 2025, user certificates (S/MIME) can again be requested in the RA-Portal. After our previous certificate provider, Sectigo, terminated its contract on January 10, 2025, we now have a new provider. The German Research Network (DFN) and GÉANT have contracted a new provider for public-key certificates. The choice fell on the Greek trusted provider HARICA (Hellenic Academic & Research Institutions Certification Authority). HARICA is a certification authority of the Greek university network GUnet, is specially optimized for research institutions and meets the highest security standards.

 

Read the rest of this entry »

Effective Backup Strategies: Correct Data Backup

March 31st, 2025 | by

Source: Freepik

Backing up important professional or private files, such as texts, images and other documents, is essential. Data loss can have catastrophic consequences, whether caused by technical mishaps, accidental deletion or even hardware theft. Data loss can also be caused by viruses or hacker attacks. Viruses can, for example, encrypt the hard drive and then demand a ransom. Here are some proven strategies and tools to ensure that your data always remains safe and accessible. You can also take a look at the category IT-Security on our website to find out more tips.

Read the rest of this entry »

IT Security When Traveling

March 28th, 2025 | by
Young man sitting on two suitcases, viewing travel destinations on his laptop

Source: Freepik

Those who frequently use public transportation are often reminded to take care of their personal belongings. The material damage caused by theft or loss is obvious. The dangers of data theft are perhaps less apparent but have equally serious consequences. These consequences include identity theft, unauthorized access to financial data and potential damage to your personal and professional reputation.

With the right IT security tips, you can reliably protect your data on the move and travel with peace of mind. In this blog post, you can find out how to protect your data effectively – whilst enjoying every trip in peace.

 

Read the rest of this entry »