SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Sandra
In the “Number Stations” podcast, I enjoyed learning about the fact that actual secret messages that nobody knows the reason or meaning of is actually being constantly transmitted on certain radio frequencies and generally accessible to pretty much anyone who has a radio and a knack for tuning to every possible station. Their message itself […] Continue reading
One overlooked important contribution to Allied success in cracking Enigma was that the Allies had knowledge of the structure of Enigma machines; had the Germans kept Scherbius’s invention as classified as possible—including exactly how many scramblers were used and the plugboard—efforts on the Allied side would have been much more stymied by pure bafflement of […] Continue reading
On the Newseum board, there are a lot of arguments for pro-privacy. At the same time, there is another compelling argument to take as much as it has to in order to make people feel safe. I feel like people come from many different sides when they are voicing their opinions; their personal experiences in their […] Continue reading
I see The Great Cipher is synonymous to the simple monoalphabetic substitution cipher, just on steroids. The concept is the same—one cipher letter or multiple cipher numbers represent a number of plaintext letters. However, what makes the two so different in their difficulty to be cracked lies in the sheer possibility of combinations that could be created from […] Continue reading
On page 99 of Little Brother by Cory Doctorow, Marcus delineates the flaws of cryptology and how ultimately cracking the Enigma led to the victory against the Nazis in WWII. One of the flaws was secrecy; after Alan Turing cracked the Enigma, any Nazi message could be deciphered because “Turning was smarter than the guy […] Continue reading
In the article “Mining Student Data Could Save Lives” by Michael Morris, I believe Morris argues that in order to mitigate or even repel completely the threat of student violence, an option lies in “data mining”–the process of collecting massive amounts of data from students using their emails, computer use in the university, and other […] Continue reading
[Response to question #1] When Singh says that “a weak encryption can be worse than no encryption at all,” it makes me want to equate it to a devastating mistake of leaving an unmistakable trace because with that, all of the evidence of enciphering a message to plot to kill Queen Elizabeth falls completely onto […] Continue reading