SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: Wayne
In the podcast, there is an example of that some companies use a personal picture to predict what the person looks like in the future; this event also happens in China. When I surfing online or using apps for chatting, this kind of advertisement will come up sometimes. Expect about your future appearance, there are […] Continue reading
Whether privacy is a “right” that children can or cannot have, or a privilege that teens must earn, adult surveillance shapes teens’ understanding of—and experience with—privacy. Our parents are the earliest teachers of us and their actions and way of teaching really shape us the understanding of the world of privacy. Parents as the people […] Continue reading
I think the general public should hold strong encryption, even though the criminals will also get it. First, although the criminals will possess a strong encryption method, the profits of the general public are more important. Among the general public, the numbers of the criminal are much less than the good citizens, which means the […] Continue reading
People truly deserve the right to encrypt their messages in order to guarantee their privacy. Private is an important part of normal citizens. These citizens behave well and obey the laws, so they deserve the right to keep their privacy. Sending email is what people will almost do every day, which means this is a […] Continue reading
Sentences in the chapter directly shows how important the codebreaking is. It is said that “it was a grim time, Midway or no Midway.” What’s more, John Redman said that “the work the women are now doing is too important to the war effort to risk a period of absence and disorganization.” (Liza Mundy, Code […] Continue reading
In the podcast of the VIC Cipher, I find that the producer uses appropriate background music in different scenarios. It really creates the mood of the text and let the audience experience the historical content vividly. When she mentioned about the dropping of the coin, she actually played that sound of dropping coins. This bring […] Continue reading
The action of Admiral Hall is unethical. When the Room 40 deciphered Zimmerman telegram, Admiral Hall got to know how important this information was and the greatness of deciphering enemy’s ciphertext. He got to know that Germany will begin his plan in two weeks, but he chose not to tell America immediately. However, when the […] Continue reading
I do not agree with Benjamen Walker argument: “the Panopticon is a terrible metaphor”. Walker argues that there are many companies may have ability to surveillance and these companies can work as a better metaphor for the surveillance. However, I think these two examples are basically same because they both suggest that people are spied […] Continue reading
The first reason of the Great Cipher used was remained unbroken for 200 years is that the creative idea of replacing syllabus by different numbers. With the development of the cryptography, more and more encrypting methods are invented. This limits the thoughts of people to use previous methods to solve this new encrypted method. Also, […] Continue reading
At the beginning of the book, when Marcus skips the school with his friends, a terrorist attack happens and the Department of the Homeland Security “arrest” them since they doubt the Marcus and their friends may take part in this serious event. Without any strong evidences, DHS asked them to provide all of their privacy […] Continue reading