SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Safwaan
“Much to her frustration, she finds that sharing at least a little bit affords her more privacy than sharing nothing at all.” (p. 74) This statement by Taylor, in Boyd’s book It’s Complicated is a true reflection of the world we live in. We live in the 21st century and due to ever-advancing technology, it […] Continue reading
The Memory Palace’s blog Greenway Girls in centered around the life of Rose Greenway and her mother also Rose Greenway. Interestingly, the main character in the story was the daughter, who actually didn’t have much to do with ciphers bar her 8-month stint in prison with her mother. The way the story was told leaves […] Continue reading
While most people only credit Alan Turing for cracking of the Enigma, it is important to recognize the critical role that Marian Rejewski in paving the way for the Allies’ success. In the early days of the war, Rejewski along with the Polish Cipher Bureau were able to identify that each letter in the ciphertext […] Continue reading
What would you give up to feel safer? If it were possible, people should give up the existence of the United States. The US has been at war for 214 years out of a possible 235 years since its inception. (Donias, 2011). During this time, the US has been the cause of many atrocities abroad. […] Continue reading
Do you know how many people think they are smarter than everyone else? 94%. — Or at least this was the case in 1977, where professors said they were above average in relation to their peers. When we rate others, we recognize the circumstances and characteristics that govern other people’s actions but when we think […] Continue reading
In Doctorow’s Little Brother, Marcus Yallow is a young boy who is falsely accused and interrogated on the grounds of being a terrorist. He decides to wage war against the DHS, the organization that kidnapped him, by creating more instances of suspicious behavior in order to make their security systems seem wildly inaccurate. He explains […] Continue reading
Michael Morris has written an article arguing that ‘Mining student data could save lives’ for The Chronicle. Morris thinks that places of higher education should use the data they gather about their students from their servers to spot certain behavioral patterns or “warning signs” that could lead to certain situations such as terrorist attacks. He […] Continue reading
In Chapter 1 of Singh’s The Code Book, he states that “The cipher of Mary Queen of Scots clearly demonstrates that a weak cipher can be worse than no cipher at all”. Singh means that sometimes having a layer of security can be more detrimental than having none at all because it gives the sender […] Continue reading