<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://techponder.org/2020/04/28/case-study-incorporating-disruptive-technologies-into-existing-products-part-2/</loc><lastmod>2020-05-05T15:02:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/05/05/case-study-incorporating-disruptive-technologies-into-existing-products-part-3/</loc><lastmod>2020-05-05T15:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/04/21/case-study-incorporating-disruptive-technologies-into-existing-products-part-1/</loc><lastmod>2020-04-28T14:26:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/26/yellow-stick-of-doom-revisited/</loc><lastmod>2020-04-22T22:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/21/207/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/william-the-manager.jpg</image:loc><image:title>William the Manager</image:title></image:image><lastmod>2020-04-22T22:05:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/07/threats-sphinx-the-script-kiddie/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/sphinx.jpg</image:loc><image:title>Sphinx</image:title></image:image><lastmod>2020-04-22T22:04:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/30/who-is-the-greatest-threat/</loc><lastmod>2020-04-22T22:03:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/01/20/running-scap-scans/</loc><lastmod>2020-04-22T21:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/01/12/security-tests-scap-content/</loc><lastmod>2020-04-22T21:42:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/01/05/scap-component-technologies/</loc><lastmod>2020-04-22T21:40:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/12/02/security-audit-automation-made-easy-with-scap/</loc><lastmod>2020-04-22T21:39:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/24/security-checklists-and-the-us-national-checklist-program/</loc><lastmod>2020-04-22T21:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/18/automation-a-security-imperative/</loc><lastmod>2020-04-22T21:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/10/system-audits-there-has-to-be-a-better-way/</loc><lastmod>2020-04-22T21:31:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/06/sedurity-guide/</loc><lastmod>2020-04-22T21:29:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/04/what-is-a-security-guide/</loc><lastmod>2020-04-22T21:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/10/30/security-specifications/</loc><lastmod>2020-04-22T21:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/10/27/computer-security-audits/</loc><lastmod>2020-04-22T21:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/10/07/yellow-sticky-of-doom-in-the-cloud/</loc><lastmod>2020-04-22T21:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/09/16/electronic-yellow-sticky-of-doom/</loc><lastmod>2020-04-22T21:10:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/20/greatest-threat-yellow-sticky-of-doom/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/yellow-sticky.gif</image:loc><image:title>Yellow Sticky</image:title></image:image><lastmod>2020-04-22T21:07:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/18/threat-joe-the-backhoe-operator/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/backhoesmall.jpg</image:loc><image:title>BackhoeSmall</image:title></image:image><lastmod>2020-04-22T21:04:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/11/threat-dennis-the-weatherman/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/hurricanesandy.jpg</image:loc><image:title>HurricaneSandy</image:title></image:image><lastmod>2020-04-22T21:02:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/06/threat-dave-the-service-technician/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/emergencypoweroff.jpg</image:loc><image:title>EmergencyPowerOff</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/computerservicesmall.jpg</image:loc><image:title>ComputerServiceSmall</image:title></image:image><lastmod>2020-04-22T20:58:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/08/04/threat-sally-the-user/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/sallyuser.jpg</image:loc><image:title>SallyUser</image:title></image:image><lastmod>2020-04-22T20:55:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/31/threat-sam-the-disgruntled-employee/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/samdisgruntled.jpg</image:loc><image:title>SamDisgruntled</image:title></image:image><lastmod>2020-04-22T20:53:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/29/threat-tom-the-programmer/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/tomprogrammer2.jpg</image:loc><image:title>TomProgrammer</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/tomprogrammer.jpg</image:loc><image:title>Mid-Level System Administrator</image:title></image:image><lastmod>2020-04-22T20:49:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/25/threat-fred-the-system-administrator/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/fredsysadmin.jpg</image:loc><image:title>FredSysadmin</image:title></image:image><lastmod>2020-04-22T20:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/14/threats-stan-the-security-czar/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/07/stan-the-security-czar.jpg</image:loc><image:title>Stan the Security Czar</image:title></image:image><lastmod>2020-04-22T20:36:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/17/threats/</loc><lastmod>2020-04-22T20:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/20/operational-integrity/</loc><lastmod>2020-04-22T20:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/14/application-and-system-integrity/</loc><lastmod>2020-04-22T20:24:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/12/user-needs/</loc><lastmod>2020-04-22T20:21:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/07/creating-business-value/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2014/05/business-value.png</image:loc><image:title>Business Value</image:title></image:image><lastmod>2020-04-22T19:43:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/05/security/</loc><lastmod>2020-04-22T19:40:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/08/15/iot-security-for-developers/</loc><lastmod>2020-04-22T19:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/07/25/security-by-isolating-insecurity/</loc><lastmod>2020-04-22T19:19:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/07/20/goldilocks-security-bad-wont-work-and-plausible/</loc><lastmod>2020-04-22T19:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/07/17/representative-iot-device-ip-video-camera/</loc><lastmod>2020-04-22T19:17:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/07/11/how-i-survived-the-internet-of-things/</loc><lastmod>2020-04-22T19:14:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/03/31/false-dichotomy/</loc><lastmod>2020-04-22T19:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/02/25/unknowable-markets/</loc><lastmod>2020-04-22T19:05:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2019/12/03/innovation/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/12/technologytransition.png</image:loc><image:title>TechnologyTransition</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/12/technologyscurve.png</image:loc><image:title>TechnologyScurve</image:title></image:image><lastmod>2020-04-22T19:05:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2019/11/18/building-successful-products/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/11/chasmplushypecycle.png</image:loc><image:title>ChasmPlusHypeCycle</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/11/gartnerhypecurveexplained.png</image:loc><image:title>GartnerHypeCurveExplained</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/11/gartnerhypecurve.png</image:loc><image:title>GartnerHypeCurve</image:title></image:image><image:image><image:loc>https://techponder.org/wp-content/uploads/2019/11/chasmmodel.png</image:loc><image:title>ChasmModel</image:title></image:image><lastmod>2020-04-22T19:04:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/04/14/incorporating-disruptive-technologies-into-existing-products/</loc><lastmod>2020-04-22T19:04:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2020/04/08/investing-in-disruptive-technologies/</loc><lastmod>2020-04-22T19:01:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/08/20/embedded-systems-meet-the-internet-of-things/</loc><lastmod>2020-03-31T14:57:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2016/06/01/the-internet-of-things/</loc><lastmod>2020-03-31T14:57:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2016/06/07/iot-technology-devices/</loc><lastmod>2020-03-31T14:56:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2016/07/20/iot-gateways/</loc><lastmod>2020-03-31T14:56:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2017/10/20/where-did-that-software-come-from/</loc><lastmod>2020-03-31T14:56:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/about/</loc><lastmod>2019-11-18T16:20:27+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://techponder.org/2016/11/04/red-hat-improves-iot-communications/</loc><lastmod>2016-11-04T20:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/07/13/skills-mastery/</loc><lastmod>2015-07-13T22:17:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/02/21/superfish-man-in-the-middle-adware/</loc><lastmod>2015-04-01T02:11:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/03/31/report-on-iot-internet-of-things-security/</loc><lastmod>2015-03-31T21:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/02/24/what-can-we-do-about-superfish/</loc><lastmod>2015-03-29T20:08:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2015/02/17/scap-workbench/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2015/02/scap-workbench-tailoring.png</image:loc><image:title>SCAP Workbench Tailoring</image:title></image:image><lastmod>2015-02-21T17:05:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/19/availability-of-openlmi-in-various-linux-distributions/</loc><lastmod>2015-01-05T15:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/11/18/lisa14-are-we-making-linux-too-easy/</loc><lastmod>2014-11-19T21:01:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/10/22/lisa14-simplified-remote-management-of-linux-servers/</loc><lastmod>2014-10-22T18:03:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/05/30/managing-linux-systems/</loc><lastmod>2014-07-22T14:02:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/06/07/introducing-openlmi/</loc><lastmod>2014-07-22T14:02:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/06/14/openlmi-agent-infrastructure/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2013/06/openlmi-agent-architecture1.png</image:loc><image:title>OpenLMI Agent Architecture</image:title></image:image><lastmod>2014-07-22T14:01:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/06/21/system-manageability/</loc><lastmod>2014-07-22T14:01:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/06/28/standards-for-manageability/</loc><lastmod>2014-07-22T14:01:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/07/11/openlmi-released-in-fedora-19/</loc><lastmod>2014-07-22T14:01:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/07/19/openlmi-client-interfaces-2/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2013/06/openlmi-client-interfaces.png</image:loc><image:title>OpenLMI Client Interfaces</image:title></image:image><lastmod>2014-07-22T14:01:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/07/28/openlmi-bringing-it-all-together/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2013/06/openlmi-architecture-e1370110826362.png</image:loc><image:title>OpenLMI Architecture</image:title></image:image><lastmod>2014-07-22T14:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/08/16/pegasus/</loc><lastmod>2015-06-26T18:29:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/08/23/openlmi-storage/</loc><lastmod>2014-07-22T14:00:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/09/13/openlmi-networking/</loc><lastmod>2014-07-22T14:00:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/10/04/new-openlmi-website/</loc><lastmod>2014-07-22T14:00:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/10/18/openlmi-meeting-on-irc/</loc><lastmod>2014-07-22T14:00:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/10/25/discovering-systems-that-can-be-managed-with-openlmi/</loc><lastmod>2014-07-22T14:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/11/01/configuring-ssl-certificates-for-openlmi/</loc><lastmod>2014-07-22T14:00:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/11/14/openlmi-vs-puppet/</loc><lastmod>2014-12-04T21:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/12/02/introducing-lmishell-the-openlmi-client/</loc><image:image><image:loc>https://techponder.org/wp-content/uploads/2013/12/lmishell.png</image:loc><image:title>LMIShell</image:title><image:caption>OpenLMI Architecture featuring LMIShell structure.</image:caption></image:image><lastmod>2014-07-22T13:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/12/09/installing-openlmi-and-lmishell/</loc><lastmod>2015-02-17T19:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2013/12/12/openlmi-certificate-lessons/</loc><lastmod>2014-07-22T13:59:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/01/08/openlmi-on-rhel-7-beta/</loc><lastmod>2014-07-22T13:59:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/01/10/update-lmishell-for-rhel-7-beta/</loc><lastmod>2014-07-22T13:58:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/01/14/using-lmi-commands/</loc><lastmod>2014-07-22T13:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/01/21/automating-system-management/</loc><lastmod>2014-07-22T13:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/02/03/manualizing-system-management/</loc><lastmod>2014-07-22T13:58:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/03/06/openlmi-cli-interface-updates/</loc><lastmod>2014-07-22T13:58:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/03/10/openlmi-at-red-hat-summit/</loc><lastmod>2014-07-22T13:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/03/11/openlmi-cli-interface-now-supports-networking/</loc><lastmod>2014-07-22T13:58:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/03/23/openlmi-developer-projects/</loc><lastmod>2014-07-22T13:57:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/04/23/red-hat-summit/</loc><lastmod>2014-07-22T13:57:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/05/31/openlmi-working-as-intended/</loc><lastmod>2014-07-22T13:56:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/02/openlmi-on-youtube/</loc><lastmod>2014-07-22T13:56:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/04/new-openlmi-web-site/</loc><lastmod>2014-07-22T13:56:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/10/openlmi-ships-in-rhel-7/</loc><lastmod>2014-07-22T13:55:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/06/19/using-openlmi-to-join-a-machine-to-a-freeipa-domain/</loc><lastmod>2014-07-22T13:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/02/lmishell-on-rhel-7/</loc><lastmod>2014-07-22T13:55:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org/2014/07/09/is-there-a-java-binding-for-lmishell/</loc><lastmod>2014-07-10T00:12:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://techponder.org</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2020-05-05T15:02:28+00:00</lastmod></url></urlset>
