SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: striclr1
I will be a member of the jury for a debate on Monday. There are several things that I expect to see from both teams. The arguments of both teams need to be well prepared. I want all of the arguments to be thorough and well organized. If the argument is confusing for me to […] Continue reading
Some advice that I would give to a college student is to never assume that what information is stored is safe. I think that if someone doesn’t want their information being leaked online, they shouldn’t put it online in the first place. There is always a possibility that something bad may happen. It would always […] Continue reading
In the book It’s Complicated, danah boyd wrote, “The most creative teens often respond to the limitations they face by experimenting with more innovative approaches to achieving privacy in order to control the social situation”. Social media is huge in today’s society, and Instagram is one of the most known social media accounts. Many people […] Continue reading
If a person was to make a piece of software available on the Internet that was used for malicious reasons by criminals or foreign governments, I do not think that they would be responsible. The person who created it just came up with the technology. They did not force people to use that technology in […] Continue reading
The first thing that I noticed in the podcast “A Killer on the Loose: The Zodiac Ciphers” by Kelsey Brown was the background music. The music went well with the topic of the podcast. The music sounded very ominous and I think that relates to the dark theme of the podcast. Without even completing the […] Continue reading
In the novel The Code Book, Singh argues that German overconfidence in the strength of Enigma was a primary reason why the Germans did not win the war. According to the blog post, “Never Become Lazy and False Genius During War”, the author, Naiksj, suggests that the laziness of the Germans and the way that […] Continue reading
I believe that the examples in the book would be harder to decipher when no assistance is given. It would be hard to decipher the message while not knowing what type of cipher it is. Telling the readers what kind of code the message is encrypted as gives a hint in how to solve it. […] Continue reading
At the Newseum, there is a board that lets people voice their opinion on the privacy versus security debate. The people were told to write down what they would give up to feel safer on a dry erase board. Someone on the board wrote that they would give up some of their privacy. This corresponds […] Continue reading
The Beale ciphers are a mystery. No one truly knows if the treasure is real or fabricated. The book said that “Skeptics believe that the entire story was fabricated to profit from the greed of others.” Even though the story may possibly be a hoax, people will not stop trying to decrypt the message. One […] Continue reading
In Little Brother by Cory Doctorow, the passage that caught my attention was in Chapter 5 when Marcus talked about how technology made him feel. He said that technology made him feel like he had control, and that technology works for, serves and protects him when it is used the right way. He says the […] Continue reading