Grief and Rememberance – A Heathen’s reaction to the death of a loved one

This has been a difficult year for many of us.  In addition to economic troubles being very common, it seems as though the death of comrades is becoming increasingly common.   That may just be a sign of this heathen … Continue reading

The post Grief and Rememberance – A Heathen’s reaction to the death of a loved one appeared first on The Modern Heathen.

Source: Modern Heathen

On the theater of ritual and mysticism in heathenism

I was speaking with a good friend the other night, and she said that she really was missing the theater of ritual and mysticism in the heathen rituals.  While I have been to some very theatrical heathen rituals, and conducted … Continue reading

The post On the theater of ritual and mysticism in heathenism appeared first on The Modern Heathen.

Source: Modern Heathen

New rune poem

i ran across another Rune Poem today when exploring Sunnyways,   The Swiss poem Fee first,Aurochs after,Thurs the third stave,The Åse is above him,Wheel is written last,Then cleaves cancre;Hail has need;Ice, year, and sun.Tiu, birch and man in the middle;Water the bright, Yew holds all. It is based on the younger Futhark, but is still something to … Continue reading

The post New rune poem appeared first on The Modern Heathen.

Source: Modern Heathen

A useful pie chart in SecurityCenter

I’ll admit it.  I have a love/hate relationship with pie charts in SecurityCenter.   The problem I have with them is they show relative values, so typical data, like vulnerability counts, doesn’t display in a meaningful format.   In fact, I’ve always said there are really only two pie charts that I believe have value.

The first is compliance:

Compliance

 

 

 

 

and the other is Operating system Identification:

Operating system identification

 

 

 

 

 

 

But today I figured out a couple of more, we can use the IP summary (and various class summary) tools to show “relative vulnerability counts” to show us what hosts have the largest number of problems:

Configuration 1 Critical Vulnerabilitiy counts

 

We can also do this not based upon  individual host, but class summaries, all we do is change the analysis tool to class summary.

class summary

 

 

 

 

 

 

These are some pretty good uses for the pie chart that I hadn’t considered before.

Source: Nessus and SecurityCenter

Online Education – To Charge or Not to Charge – is that the question?

I’m currently in the middle of a virtual education class at Coursera and there was a discussion about MOOC‘s and there was a brief discussion about whether to charge or not to charge for the course.   I’ve encountered this topic with online educational materials (courses, etc) that I’ve put up on the web, as well as some other areas not related to education. Continue reading