SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Monthly Archives: August 2017
In the article “Mining Student Data Could Save Lives” Michael Morris makes an interesting point about data mining on college campuses. According to Morris, since college students are already using accounts and internet access provided by the school, there is no reason that colleges should not be able to monitor student data for early warning […] Continue reading
In Chapter 1 of Singh’s The Code Book, he states that “The cipher of Mary Queen of Scots clearly demonstrates that a weak cipher can be worse than no cipher at all”. Singh means that sometimes having a layer of security can be more detrimental than having none at all because it gives the sender […] Continue reading
In saying “The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.”, I believe that Singh is implying that in using a cipher, Mary and her recipient felt much safer than if they had used no encryption at all. They believe their message is […] Continue reading
There is good merit in regards to reminding one’s self to the fact that they are never safe in comfort. Mary Queen of Scots and Anthony Babington communicated with this “comfort,” while a double agent, Gilbert Gifford, was secretly taking their encrypted messages to one of England’s leading cryptanalyst and cipher secretary, Thomas Phelippes. To […] Continue reading
In Singh’s The Code Book, the story of Mary Queen of Scots illustrates the dangers of having a false sense of security. There are countless examples throughout history, but perhaps the most well-known example of a false sense of security is George Washington’s crossing of the Delaware to attack the British on that fabled December […] Continue reading
The bigger they are, the harder they fall. In chapter one of The Code Bookby Simon Singh, Singh states that “…a weak encryption can be worse than no encryption at all” (Singh, 41). When it comes to cryptography, this could not be more true. A successfully encrypted message should only be decipherable to the intended […] Continue reading
With sophisticated and detailed research on statistics, al-Kindī invented his system of cryptanalysis, later known as the frequency analysis. It’s not surprised that he was considered as the greatest scientist in the ninth century when many disciplines including mathematics, statistics and linguistics that are well developed today were still in their rudimentary stages; thus his […] Continue reading
Cryptography — we have seen it everywhere, from the movie screens to the morning news. In fact, so much so that you might even begin to get tired of hearing about it. You may just start to associate it with a couple of things that are easy to remember like The Imitation Games or the […] Continue reading
[Response to question #1] When Singh says that “a weak encryption can be worse than no encryption at all,” it makes me want to equate it to a devastating mistake of leaving an unmistakable trace because with that, all of the evidence of enciphering a message to plot to kill Queen Elizabeth falls completely onto […] Continue reading
In The Code Book, by Simon Singh, the discovery of cryptanalysis is discussed. It is explained that without a strong background in core disciplines, cryptanalysis is impossible to achieve. Mathematics, statistics, and linguistics are vital in the development of many methods, such as frequency analysis. Earlier civilizations lacked a certain amount of efficiency in these fields, […] Continue reading