SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Elton
As a jury of a debate, I would like to consider several issues as the judging criteria for the debate on Monday. First of all, the basic points for pro team and con team must be explicit and reasonable. In their first round, they must build at least one solid point of view, which should […] Continue reading
After stepping into college, the internet becomes more and more popular in our daily life. Nowadays we purchase things through the internet, we upload our assignments through the internet, we book our session through the internet. Meanwhile, internet privacy gradually becomes a problem. The first advice I would give a college student is that do […] Continue reading
After listening to the podcast “Something Out of Nothing” by Maria Sellers, I found many interest points about this podcast, both the content and the structure. Also, I learned several useful ideas about the production of a podcast. First of all, The title of the show notes of the podcast, “Something Out of Nothing”, would […] Continue reading
In Chapter 3, Singh provides an example of breaking codes with keywords and makes everything seems quite easy. However, in practice, breaking such a code is definitely difficult and needs a lot of time and work. Say you have a message which is enciphered by using a keyword as long as the plaintext. The first thing is […] Continue reading
To be honest, I am not good with the USA Patriot Act, because it means I have no right to hide any secrets. If somebody could look over all my private staffs without my approvement or even without my acknowledgment, I will feel invaded. However, I have to admit that there is terrorism in this world […] Continue reading
In the time of the Mary Queen of Scots, people were confident with their encrypted messages and did not concern the privacy of their messages. However, for some time after that, people started to find a way to create more and more complicated ciphers, for the reason that they realized there are experts who could […] Continue reading
The most impressive passage for me is chapter 6. The author uses the dialogue between the Turk and Marcus to indicate the situation that citizens are under monitoring, through ways such as tracking their expense record. Marcus’s thinking afterward during school strengthen this point. “You think it’s no big deal maybe? What is the problem with the government […] Continue reading
In his essay, Michael Morris states that through mining student data, threat-assessment teams of universities have a great chance and plausible accuracy to predict possible violent behaviors with mining algorithms. As a result, it is responsible for every university to monitor students’ academic record and prevent every possible tragedy. Undoubtedly, in no way are we supposed to […] Continue reading