SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Author Archives: youngar
“Kids today. They have no sense of shame. They have no sense of privacy. They are show-offs, fame whores, pornographic little loons who post their diaries, their phone numbers, their stupid poetry—for privacy God’s sake, their dirty photos!—online.” – Emily Nussbaum I strongly disagree with this statement, as it makes a lot of assumptions about today’s […] Continue reading
99% Invisible’s “Vox Ex Machina” tells of the history of vocal synthesis. This episode of the podcast was very informative, following vocal synthesis from it’s inception to its modern-day applications. As I learned during the episode, vocal synthesis played a key role in secure communications for the Allies during World War 2. I found this interesting […] Continue reading
In a post 9/11 America, which is all I’ve ever known, I am paranoid. When I enter public spaces like movie theaters or airports, there’s always an irrational fear in the back of my head that something is going to go wrong. This fear was undoubtedly placed there by terrorists, so they are clearly succeeding […] Continue reading
The first thing The Great Cipher used by Louis XIV did well was not being a monoalphabetic cipher. These ciphers are too susceptible to frequency analysis, making them crackable in a matter of hours at the most. Instead, the Great Cipher is more along the lines of a polyalphabetic cipher. Instead of letters, however, the […] Continue reading
Whether or not he was willing to accept it, Marcus is the leader, the figurehead of a revolution against his own government. He created a secret network over which he could securely communicate with other defectors and used it to plot against the DHS, eventually getting them removed from San Francisco. As displayed during the […] Continue reading
In Michael Morris’s essay “Mining Student Data Could Save Lives,” Morris argues that by allowing universities access to student’s online histories, campuses become much safer. In accessing this data, colleges can tell if a student is planning to cause harm to themselves or others and then step in to prevent the student from taking any drastic […] Continue reading
In saying “The cipher of Mary Queen of Scots clearly demonstrates that a weak encryption can be worse than no encryption at all.”, I believe that Singh is implying that in using a cipher, Mary and her recipient felt much safer than if they had used no encryption at all. They believe their message is […] Continue reading