SAMPLE ALL THE FLAVORS!Increasingly, Vanderbilt instructors are incorporating blogs into their course design. Course Blogs at Vanderbilt is a mash-up of live feeds representing a wide variety of Vanderbilt courses that use blogging to help students reflect on, comment about, and introduce new ideas to course material. Click on the blog title to view the originating course blog. You can also click on the Participating Blogs tab for links to each blog.
ADD YOUR COURSE BLOG TO THIS SITE!Are you administering or participating in a course blog as at Vanderbilt? SEND US THE URL and we'll include it on this site.
Category Archives: email
An example on privacy I found interesting was that colleges use tracking pixels embedded within their emails to gauge the interest of potential students in their university. Also that the pixels score each student depending on how quickly they open the email all the while doing this without asking for permission. I see this as […] Continue reading
The two most compelling reasons I found why strong encryption should be available to the public is the large amount of interceptable information spread daily via email and that individuals have enjoyed complete privacy for most of history. The hundreds of millions of emails sent back in forth within the masses of the online public […] Continue reading
Simon Singh makes many predictions about evident trends in the increasingly digital world. 20 years later, he got a lot of things right, although from our digitally oversaturated viewpoint, they seem obvious now. Singh was definitely correct in his prediction that soon email would overtake normal mail, and this rang true for the early 2000s […] Continue reading
I agree in believing that private citizens should have the right to secure encryption technologies. Throughout history, citizens have been granted the right of choice to encrypt their messages. The idea of sending encrypted messages via the postal service was for citizens to prevent private information from getting in the hands of someone who was […] Continue reading
In the least controversial way possible, I believe this can be related to arguments for and against the second amendment. In a sense, cryptography, similar to guns, can be easily weaponized. If a person encrypts a message it is because it contains something extreme that they do not want to get out to the public. […] Continue reading
By the mid 19th century, the skills and techniques used to break simple monoalphabetic substitution ciphers or keyword ciphers were well known between coder breakers. Tools such as frequency analysis were vital to decoding messages, encrypted messages intercepted through Morse code had no chance of staying secure. Messages needed to be encrypted with a stronger […] Continue reading