SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: jackso92
The most interesting passage from Cryptonomicon that relates to a discussion earlier in the course is found on page 89. Here, Lawrence describes the most intriguing machine found at Station Hypo: at machine built by Commander Schoen and designed to … Continue reading → Continue reading
I’m a staunch supporter of sharing information. In fact, I believe that patents should have a quicker expiration date (especially in fields where innovation moves very rapidly). Consider this: a patent filed in 1993 for a particular style of trackball … Continue reading → Continue reading
The passage in the book that I found most interesting comes from Chapter 4. Marcus discusses what it feels like to be locked up with all his privacy revoked. I often wondered why it matters so much that we keep … Continue reading → Continue reading
The Beale Ciphers remain tantalizing to this day for two main reasons. First, the magnitude of the reward is impressive. $20 million is a lot more money than the average American will see in his or her lifetime. Coming into such … Continue reading → Continue reading
The Great Cipher used by King Louis XIV was an extremely strong cipher for several reasons. First, the cipher text included 587 different numbers. This magnitude of possible decipherments was the first line of defense. Additionally, because multiple cipher types … Continue reading → Continue reading
I think that amateur cryptanalysts using methods that were impossible for some early civilizations to use demonstrates the accessibility and ubiquity of information today. For example, some puzzles are centered around ciphers and decryption. These puzzles attract the attention of … Continue reading → Continue reading