SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Julia
Many segments of Little Brother brought up interesting points about the frightening consequences of complete government surveillance and its relation to security. One passage that caught my eye was in the beginning of Chapter 6 when the Turkish coffee shop owner told Marcus about the newly implemented Patriot Act II. In this fictional world, Congress […] Continue reading
A variety of factors contributed to the Allied cryptanalysts’ success over German cryptographers, including espionage, determination, and cooperation. One main element that contributed to the Allied success was the employment of mathematicians and scientists in their cryptanalyst units. The Polish breakthroughs in cracking Enigma demonstrated the value of mathematicians as codebreakers. Marian Rejewski, the main Polish […] Continue reading
While perusing Elonka’s website, I was fascinated by her page of “Famous Unsolved Codes and Ciphers”. Like Sara stated in her blog post, it is so astonishing to think about how even with modern technology and current knowledge, there are still numerous ancient ciphers that have yet to be broken, including the Beale Ciphers and […] Continue reading
Finding the appropriate balance between privacy and surveillance is a pressing issue that afflicts 21st century society. The arguments for and against data mining are both very valid. In Michael Morris’s article, “Mining Student Data Could Save Lives,” student shootings evidence the demand for widespread student data mining to protect the campus community. Morris says […] Continue reading
The continuous tug-of-war between cryptographers and cryptanalysts has triggered the expansion and prominence of cryptography in the world today. Just as quickly as new encryption methods are developed, new decryption strategies are implemented, creating a state of equilibrium in cryptography. The art of secret writing dates back to Herodotus (Singh 3) and has had various […] Continue reading