SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: Blog Assignments
In his essay, “Mining Student Data Could Save Lives”, Michael Morris argues that universities should implement data mining technology to prevent crime and make universities safer. Data mining technology would help a university predict crime. In his essay, Morris uses pathos to gain the attention of his readers. School shootings are events that are emotional […] Continue reading
To set the premise of my argument, I would like to quote Cory Doctorow in his novel “Little Brother” where he uses the phrase ” The truth is I had everything to hide, and nothing”. I feel this statement expresses the thought that we all have our “dark secrets”, so to say, which are inconsequential […] Continue reading
In his essay “Mining Student Data Could Save Lives”, Michael Morris argues that universities should take actions to threat-assess their students’ online activities as well as mental states, thus maximizing the protection of campus safety and preventing large-scale assaults. In his article, Morris argues that since universities already have access to almost all students’ online […] Continue reading
Arnie: The issue of privacy vs security is one that we have been asking and will continue asking in the age of the internet, and this question arose in the article by Michael Morris. College campuses and schools are a unique place where this issue manifests itself. Students use university wifi, and with this, a […] Continue reading
In this essay, the author hopes that the threat-assessment teams use of the Students’ internet data or the daily behavior to verify does the student have a tendency to endanger the safety of the campus. Why don’t we start with the basic part of the problem, but stop them when they have turned students into dangerous people? The […] Continue reading
“A false sense of security is the only kind there is” -Michael Meade In the epoch of technology and the internet, this particular quote rings painfully true. We read about black hat hacking being ubiquitous yet we don’t think twice before entering privileged information into a website whilst being connected to the free, unprotected airport […] Continue reading
The Memory Palace’s blog Greenway Girls in centered around the life of Rose Greenway and her mother also Rose Greenway. Interestingly, the main character in the story was the daughter, who actually didn’t have much to do with ciphers bar her 8-month stint in prison with her mother. The way the story was told leaves […] Continue reading
While most people only credit Alan Turing for cracking of the Enigma, it is important to recognize the critical role that Marian Rejewski in paving the way for the Allies’ success. In the early days of the war, Rejewski along with the Polish Cipher Bureau were able to identify that each letter in the ciphertext […] Continue reading
If my reaction to Chapter Four could be summarized in three words, they would be “hooded”, “gas,” and “mask.” Separated, those are just three innocent words, but if you put them side by side, suspicion would loom over your head as if you were its shadow. “Suspicion… by who” you may be wondering. Well, in […] Continue reading