SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: patelhg1
Citizen Four opened my eyes to the many different ways the government invades privacy in order to protect its citizens. The government uses many devices to spy on its citizens, including location tracking and following people online with tracking cookies. This invasion of privacy can easily be avoided by any citizen. This is the topic […] Continue reading
At the time Singh wrote the novel, there was no blatant reason for the government to use surveillance for the interest of national security. Then September 11, 2001 happened. This day completely changed the interests of both the American citizens … Continue reading → Continue reading
One of the main reasons the Allied code breakers were able to crack the German Enigma cipher was espionage. Both stealing code books and obtaining documents from Schmidt gave the Allies the edge they needed to crack the Enigma machine … Continue reading → Continue reading
New things can seem very challenging at first. For example, a question seems so much simpler when we already have an answer to it. However, the question without the answer can seem very daunting, making it seem too difficult to … Continue reading → Continue reading
There are several ways a college student can protect his or her online privacy. College students today accept terms of agreement without reading them and even save passwords onto their computer and phone without thinking about what would happen if … Continue reading → Continue reading
Cryptography is full of patterns. Patterns are evident in code-making, code-breaking, and even the history of cryptography itself. Code makers must use some sort of pattern when encrypting any message. Maybe the pattern is as simple as one in a … Continue reading → Continue reading