SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: mohitesj
In the episode of Leading Lines, one point that Professor Gilliard brought up was that of how privacy infringements in the United States can have consequences that transcend national borders. The example provided: the oppression of Uyghurs in China. At one point in the episode, Professor Gilliard mentions how FaceApp, an app available to American […] Continue reading
The idea of perfect security is a tantalizing one on the surface. It guarantees anonymity and protection from unwanted attention; it facilitates and protects a bedrock of democracy, that being freedom of speech. Altogether, it’s no surprise that, in the interest of preserving the core values of democracy, people would want perfect security implemented for […] Continue reading
The National Security Agency has been criticized for decades due to the very nature of its purpose; no one likes the idea that someone can read their emails, listen to their phone calls, or act as an observant third-party on any private two-way communication. But, at the end of the day, so long as the […] Continue reading
Arlington Hall, the epicenter of the American code breaking effort, was s densely populated pseudo-tenement housing for some of the brightest and most flexible minds the country had to offer. Of course, with such a high population of men and women living together in close quarters, gender played a significant role in both the code […] Continue reading
The podcast on the Zodiac Killer was well made and well produced. From a technical standpoint, the intonation, projection, and fluency of the speaker made it very enjoyable to listen to the podcast. Often times, even when simply reading from a script, people can falter, trip over words and phrases, and stutter, all of which […] Continue reading
Admiral Hall of Room 40 – Britain’s analog to the American Black Chamber – was faced with an impossible choice during World War I: immediately release information of the Zimmermann Note to the Americans and risk the Germans developing new, more secure ciphers, or holding on to the note until the perfect moment, potentially risking […] Continue reading
The principle problem of the Panopticon metaphor is rooted in Bentham’s original purpose for the structure: behavioral modification. As Walker puts it, Bentham believed that the mere act of being being watched constantly would alter a person’s behavior, adding a layer of accountability and therefore pushing the person in question towards a more moral or […] Continue reading
As Singh indicates in his The Code Book, the Beale Ciphers have gone unbroken for over a hundred years, the best and brightest minds of recent decades pouring hours upon hours into the effort of deciphering them. Unfortunately, their work, as of yet, has borne no fruit. Ultimately, this begs the question: why do people continue […] Continue reading
One of the recurring themes of Cory Doctorow’s Little Brother is the trade-off between privacy and security. In the wake of a devastating terror attack, the city of San Francisco is effectively transformed into a police state, with the each person being monitored day in and day out. Marcus, the protagonist, and his fellow youth ultimately […] Continue reading