SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Riley
I’ve only recently begun working on my paper, but it has proved to be much more interesting than I originally anticipated. Online voting is such a relevant and current issue, as it very well could be widely instituted in the near future, and it has such large implications. It is basically a distillation of the […] Continue reading
The government should absolutely not have “wide latitude” to use cryptography to surveil citizens. Throughout history, the role of United States government has been to protect the rights of its citizens. It is bound to this duty, especially when it … Continue reading → Continue reading
Allied cryptanalysts succeeded over German cryptographers largely because of collaboration. It was not just one country working against the Germans, but the entire Allied powers. The chain of collaboration began with the French: though they didn’t feel the need to … Continue reading → Continue reading
Little Brother, while it is an incredible novel, is also a brilliant argument. The construction of the novel reads like a well planned out, immensely entertaining argumentative essay. Cory Doctorow presents readers with a situation in which privacy is being … Continue reading → Continue reading
To the amateur cryptographer, or simply the budding enthusiast, the Beale Ciphers represent the ideal, a perfect challenge, and, the clincher, buried treasure. Starting as children, we are read pirate stories: buried treasure, untold riches, fame and fortune for those … Continue reading → Continue reading
In this day and age, very little is more important in everyday life than keeping safe while on the internet. As described in “the 5 Biggest Online Privacy Threats of 2013,” there are many online threats that many people don’t … Continue reading → Continue reading
In Chapter 1 of The Code Book Singh discusses the overarching issues that Mary Queen of Scots faced during and leading up to the trial for her execution. What I found most interesting, and enlightening, about the chapter were the circumstances … Continue reading → Continue reading