SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: growm
“Some teens see privacy as a right, but many more see privacy as a matter of trust. Thus, when their parents choose to snoop or lurk or read their online posts, these teens see it as a signal of distrust.” In this quote from her book It’s Complicated, danah boyd points out the potential effects of […] Continue reading
I greatly enjoyed the class debate passages (p. 92-93, 175-182) in Little Brother. In the first debate, Marcus brings up the effects of terrorism and the problems with reactions to it. Marcus’ argument about the effects of terrorism involves the types of reactions societies have to acts of terrorism. Post-attack, his school system decides to install […] Continue reading
While there are many reasons for the Allied cryptanalysts’ hard-won victory over the German cryptographers, the human factor—and German underestimation of its impact—stands foremost in my mind. Enigma machines, radios, weapons—these are all well and good, as long as people know how to use them. Clearly, the Germans were overconfident in the security […] Continue reading
I found Elonka Dunin’s website to be greatly interesting. Her small bits of information about the Zodiac Killer on her List of Famous Unsolved Codes and Ciphers specifically caught my eye. Before now, I had of course heard of this serial killer and his or her bold ciphers. However, I had not thought about it […] Continue reading
Admiral Hall’s decision not to inform the U.S. about the impending U-boat attacks was complex, to say the least. The reasons why he would share his new intelligence with President Wilson are clear–the U.S. and Britain were allies to some degree, and it might possibly bring the U.S. into the war. However, I find his reasoning […] Continue reading
Michael Morris’ article about mining student data greatly interests me. His chosen topic is one bursting with complexity. First, there are the moral implications of such actions. Is it an invasion of privacy? Or is it simply bettering the protection of the student population? These are questions which our country has struggled with since the […] Continue reading
I believe that, while a high level of scholarship was required to develop the frequency analysis approach, it is not critical to the use of this approach. When the world was new to this subject–when it had just discovered ciphers and keys and cryptanalysis–all of the knowledge was completely new. It was the cutting edge, […] Continue reading