SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: ragieleg
Simon Singh makes many predictions about evident trends in the increasingly digital world. 20 years later, he got a lot of things right, although from our digitally oversaturated viewpoint, they seem obvious now. Singh was definitely correct in his prediction that soon email would overtake normal mail, and this rang true for the early 2000s […] Continue reading
As we’ve discussed at length in this course—the history of cryptography is riddled with instances of problems that at first glance seem immutable. The issue of key distribution was one of these supposedly immutable doctrines of secret writing. However, as we have also seen—the history of cryptography is also riddled with people so determined to […] Continue reading
Although female codebreakers were completing some of the most important work on the intelligence front during World War II, the necessary secrecy of their work as well as their gender led these women to not always receive the treatment that they deserved. In the 1940s women in general were seen as subordinate to men, and […] Continue reading
In the Zodiac Killer episode from the One Time Pod, the podcast creator kept her audience engaged both through stylistic aspects and an interesting topic. I particularly enjoyed the use of ominous background music that changed as the speaker told the story to build the mood—it was also just the perfect sound level so […] Continue reading
In The Code Book, Simon Singh details the codebreaking successes of the British military during World War I–successes that often needed to be kept secret and prevented the spread of some important, yet sensitive information during the war. One such piece of critical information was the Zimmerman telegram. While some may think it completely unethical […] Continue reading
I would agree with Walker’s claim that the Panopticon is not an accurate metaphor for the average human’s interaction with surveillance today. While it could be argued that the government does watch over us and large corporations do silently collect our data, most people are not aware of this and thus it does not enact […] Continue reading
Because the onset of the telegraph inserted a middleman in the communication of a sender and receiver, messages not meant for prying eyes understandably needed to be encrypted with a more secure cipher like the Vigenère cipher. Since the invention of the telegraph in the 19thcentury, several other inventions or innovations in the world of […] Continue reading
Before Marcus holds the first alternative/video-game-generated/XNet run press conference the world has ever seen after the gross media bias taking place in response to the Don’t Trust “riot,” Ange gives him this pep talk—“If you want to really screw the DHS, you have to embarrass them…your only weapon is your ability is to make them […] Continue reading
In his essay “Mining Student Data Could Save Lives,” Michael Morris urges universities to act upon their unique ability to prevent possible acts of mass violence by screening student’s data footprints. Morris explains that the use of university email addresses and campus wireless networks permits most college IT departments the ability to mine the data […] Continue reading