SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: milfored
I do not listen to podcast at all. They are just not something that I bother to make time for. However, if I had to trust one media outlet with persuading to me to do otherwise, it would be Vox. They always know how to make a story interesting, and if it is already interesting, […] Continue reading
I like to think of cryptography as a game. There are two sides, and each must play offense and defense when necessary — offense being the cryptographers and defense being the cryptanalyst. Now in terms of World War II, the Allies succeeded because they made sure to play both offense and defense while the Axis powers […] Continue reading
With an even mix of pro-security and pro-privacy statements, this display reminds me of how half-and-half the country is on the privacy versus security debate which always intrigues me. No matter where or when the question is asked excluding the aftermaths of a few terrorist attacks, people always seem to be divided evenly between both […] Continue reading
What was the difference? There was none! The environment that Mary Queen of Scots experienced is quite the same compared to the environment leading up to the development of the Vigenère cipher. In fact, it even states in the book that Vigenère’s publication of Traicté des chiffres happened “ironically… [in] the same year that Thomas […] Continue reading
If my reaction to Chapter Four could be summarized in three words, they would be “hooded”, “gas,” and “mask.” Separated, those are just three innocent words, but if you put them side by side, suspicion would loom over your head as if you were its shadow. “Suspicion… by who” you may be wondering. Well, in […] Continue reading
“But if colleges use the crystal ball that’s available to them, they will surely come much closer to that goal.” Throughout the article, “Mining Student Data Could Save Lives,” Michael Morris, the author, made many arguments, but his central argument was that college campuses should in fact mine their students’ data. That is the “crystal […] Continue reading
Here is an article, written by Tony Youngblood of Nashville Public Radio, that explains how a Nashville local has been trying to break one of the toughest codes in the world: Nashville software developer Elonka Dunin spent the better part of two decades trying to unravel a mystery on the grounds of CIA headquarters in Langley, Va. Her […] Continue reading
Cryptography — we have seen it everywhere, from the movie screens to the morning news. In fact, so much so that you might even begin to get tired of hearing about it. You may just start to associate it with a couple of things that are easy to remember like The Imitation Games or the […] Continue reading