Monat: März 2019

Christian Hallqvist celebrates 25 years with ETH

Congratulations to Christian Hallqvist, ITS employee with ITS Network Security, ICT Networks

Weiterlesen

erstellt am ,

New IT security website online

A working group of the IT security delegates has completely revised the security information for IT Services. The simplicity of the website is deceptive. To put it simply: Nothing about this website has been left to chance.

What has been replaced on the Website?

Up until now, when an ETH member searched for information about IT security in the search field on the ETH website, the results were, shall we say, lacking. There was a page for IT Services online but the content was randomly selected and disorganised. As a result, the site was not able to fill the need for reliable information.

Weiterlesen

erstellt am ,

Making of: inside|out newsletter no. 18

IT news at ETH Zurich – «Find out what’s going on in terms of IT at ETH Zurich»: the 18th inside|out newsletter is online.

The topics of the current newsletter

The first newsletter this year is online.

Weiterlesen

erstellt am ,

IT Finds: What do you associate this with?

Join us on a journey into the past: When was this object built and what do you personally associate with it? Do you want to tell us your story?

Weiterlesen

erstellt am ,

How to detect phishing mails

Emails are a practical and useful means of communication. However, they are often used by fraudsters to steal confidential data such as passwords or bank information. These so-called phishing emails pose a real risk. Not all of them can be automatically detected and stopped by technical email filters. This also means that phishing emails cannot be prevented from appearing in your mailboxes now and again.

Weiterlesen

erstellt am ,

A look behind the IT scenes at refine

ETH Zurich’s new resources and financial platform was successfully put into production on 9 January 2019.

refine = renewing the REsources and FINance platform of ETH Zurich

This important step marks the achievement of the refine project’s most important milestone. This success has, of course, been achieved thanks to effort of everyone involved. Congratulations to the more than 100 people in many ETH organisational units and several external specialists. For IT Services, it was the areas of basic technologies, development and porting of existing products, data migration and process design. This post will elaborate on the roll of IT Services.

Weiterlesen

erstellt am ,

Discovering Computer Science at the ETH

On the 11th march it was that time of year again – the ETH Hönggerberg opened its doors for 2 days to bring school classes closer to computer science and to show them impressions from the everyday life of a student at the ETH Zurich. And it was a huge success!

Weiterlesen

erstellt am ,

Python Programmers in Kampala

For my professional training I prefer to attend software developer conferences, and among these the EuroPython conference has grown close to my heart. What sets this conference apart is the fact that it is community-driven and therefore offers a range of presentations and events rarely seen at more commercial developer conferences. I remember a keynote from the EuroPython Conference 2017, in which the speaker from Nigeria talked about the lively Python developer scene in sub-Saharan countries. I learned from this keynote that Django Girls courses have been organized in several countries (Django is a Python-based web framework) and national Python conferences have been held in Zimbabwe, South Africa and Nigeria.

Weiterlesen

erstellt am ,

PROTECT YOUR BRAINWORK. – Keep Intruders out

The 11th IT security campaign has started, focusing on how to keep intruders out.

Everyday life without IT devices is hard to imagine these days. They simplify our lives and accompany us almost everywhere. Unknowingly we give away more about our identity when we use these devices carelessly. Research data, hobbies, date of birth, interests, shopping behaviour or credit card numbers: Do you know what data is stored on your devices, and who has access to that data? With these tips, you can protect yourself against intruders.

Weiterlesen

erstellt am ,