SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Ling
In It’s Complicated, Emily Nussbaum states “Kids today…have no sense of shame. They have no sense of privacy” (boyd 55). She continues with a series of eloquent terms that describe how the “kids” publicly defame themselves with indecent pictures, and how they are “little loons who post…their stupid poetry” and thoughts “online” (boyd 55). […] Continue reading
For this blog post I would like to introduce a rather grim prospect that I’ve been pondering about the human knowledge threshold. I was reminded of the thought after reading Marcus’ discussion on how we can wield computers and other tools of such sophistication and power with just a few “lines of code” (Doctorow 119). The […] Continue reading
One of the main reasons for the success of the Allied cryptanalysts at Bletchley Park over German cryptographers is the acquisition of the previous work of the Polish on the German Enigma. Polish cryptanalyst, Marian Rejewski, led the polish to first break Enigma in 1932, and kept up with breaking any new security the Germans […] Continue reading
Upon learning the intended plans of the Germans from deciphering the Zimmerman telegram, it was ethical of Admiral Hall to withhold such information from the President. One may argue that Admiral Hall should morally concede the information to the President so that Britain may be subsequently informed, and lives could be potentially saved during […] Continue reading
In response to the reading question: “The Great Cipher used by Louis XIV remained unbroken for 200 years. What were the factors that led to such a secure cipher?” CONNA described how the death of the father and son duo led to the collapse of breaking the code due to the fact that there was […] Continue reading
In Hello Future Pastebin Readers, Quinn Norton talks about how everyone who has access to technology is essentially the same in that none of their personal information and data, no matter how securely uploaded or downloaded, is actually private. This particularly interests me because today’s society is so heavily centered around the distribution of information […] Continue reading