<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://kscottmorrison.com/about/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/05/f1000028.jpg</image:loc><image:title>F1000028</image:title><image:caption>K. Scott Morrison</image:caption></image:image><lastmod>2022-04-27T21:41:57+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://kscottmorrison.com/2014/04/09/upcoming-talks-at-mobileweek-2014-in-nyc/</loc><lastmod>2014-04-09T18:59:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2014/02/26/what-we-should-learn-from-the-apple-ssl-bug/</loc><lastmod>2014-02-26T23:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2014/02/20/rsa-conference-2014-preview-and-a-special-ca-technologieslayer-7-event/</loc><lastmod>2014-02-21T00:26:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2014/02/14/new-ebook-five-simple-strategies-for-securing-your-apis/</loc><lastmod>2014-02-14T21:57:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2014/02/12/sex-lies-and-acquisitions/</loc><lastmod>2014-02-14T00:46:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2013/02/21/cisco-and-the-internet-of-everything/</loc><lastmod>2013-02-21T20:27:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2013/01/03/ces-2013-panel-privacy-and-security-in-the-cloud/</loc><lastmod>2013-01-03T20:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/12/17/do-you-agree-to-the-terms-and-conditions-mobile-devices-and-the-tipping-point-of-informed-consent/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2012/12/handshake.jpg</image:loc><image:title>handshake</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2012/12/to-sign-a-contract-3.jpg</image:loc><image:title>To sign a contract 3</image:title></image:image><lastmod>2012-12-18T00:41:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/10/24/isc-webinar-identity-is-the-new-perimeter-identity-and-byod/</loc><lastmod>2012-10-24T23:11:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/10/24/the-ipad-mini-is-for-cars/</loc><lastmod>2012-11-01T22:22:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/07/30/why-i-still-like-oauth/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2012/07/simple-house.jpg</image:loc><image:title>simple house</image:title></image:image><lastmod>2012-07-30T20:03:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/07/09/hey-twitter-api-management-developer-management/</loc><lastmod>2012-07-09T22:59:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/06/07/platform-comes-to-washington/</loc><lastmod>2012-06-07T16:57:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/05/15/apis-cloud-and-identity-tour-2012-three-cities-two-talks-two-panels-and-a-catalyst/</loc><lastmod>2012-05-15T17:18:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/04/20/the-well-designed-api/</loc><lastmod>2012-04-21T00:08:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/04/16/developers-developers-developers-why-api-management-should-be-important-to-you-featuring-redmonk/</loc><lastmod>2012-04-16T18:14:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/03/07/qcon-london-2012-is-the-place-to-be-this-week/</loc><lastmod>2012-03-11T19:50:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/02/20/upcoming-rsa-conference-talk-hackings-gilded-age-how-apis-will-increase-risk-and-chaos/</loc><lastmod>2012-02-20T23:57:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/02/16/the-resilient-cloud-for-defense-maintaining-service-in-the-face-of-developing-threats/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2012/02/esri-picture.png</image:loc><image:title>ESRI picture</image:title></image:image><lastmod>2012-12-21T05:59:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2012/02/03/security-in-the-clouds-the-ipt-swiss-it-challenge/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2012/02/gstaad.jpg</image:loc><image:title>Gstaad</image:title></image:image><lastmod>2012-02-04T00:27:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/12/22/the-future-is-a-story-about-mobile-computing/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/12/screen-shot-2011-12-22-at-4-03-17-pm.png</image:loc><image:title>Screen shot 2011-12-22 at 4.03.17 PM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/12/screen-shot-2011-12-22-at-3-59-59-pm1.png</image:loc><image:title>Screen shot 2011-12-22 at 3.59.59 PM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/12/screen-shot-2011-12-22-at-3-59-59-pm.png</image:loc><image:title>Screen shot 2011-12-22 at 3.59.59 PM</image:title></image:image><lastmod>2012-03-12T09:12:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/12/05/gartner-aadi-2011-presenation-video-api-management-governance-oauth/</loc><lastmod>2011-12-08T21:52:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/11/24/nothing-succeeds-like-success-analysts-place-layer-7-on-top-once-again/</loc><lastmod>2011-11-24T23:42:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/09/23/clouds-down-under/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/09/drain.jpg</image:loc><image:title>Dark Whirlpool</image:title></image:image><lastmod>2011-09-23T22:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/08/31/clouds-on-a-plane-vmwares-micro-cloud-foundry-brings-paas-to-my-laptop/</loc><lastmod>2011-09-02T16:42:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/08/16/the-cloud-security-alliance-introduces-the-security-trust-and-assurance-registry/</loc><lastmod>2011-08-16T23:52:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/08/08/amazon-web-services-startup-challenge/</loc><lastmod>2011-12-17T23:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/08/05/certificate-program-in-cloud-computing/</loc><lastmod>2011-08-06T00:50:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/08/04/cant-see-the-soa-for-the-clouds/</loc><lastmod>2011-08-06T13:19:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/07/26/introducing-layer-7%e2%80%99s-oauth-toolkit/</loc><lastmod>2011-07-27T03:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/06/27/lulzsec-disbands/</loc><lastmod>2011-06-27T21:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/05/17/upcoming-cloud-identity-talk-at-tmforum-management-world/</loc><lastmod>2011-05-17T18:05:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/05/16/amazons-mensis-horribilis/</loc><lastmod>2011-05-16T17:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/05/13/nist-seeks-public-input-on-new-cloud-computing-guide/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/05/dictionary-small.jpg</image:loc><image:title>dictionary-small</image:title></image:image><lastmod>2011-05-13T18:25:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/05/11/layer-7-to-demonstrate-cloud-network-elasticity-at-tmforum-management-world-in-dublin/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/05/slide11.jpg</image:loc><image:title>Slide1</image:title><image:caption>    Layer 7's CloudControl acts as API glue between cloud infrastructure components.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/05/slide1.jpg</image:loc><image:title>Slide1</image:title><image:caption>Layer 7's CloudControl acts as API glue between cloud infrastructure components.</image:caption></image:image><lastmod>2011-05-11T19:52:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/04/26/vmware%e2%80%99s-cloud-foundry-ushers-in-the-era-of-open-paas/</loc><lastmod>2011-04-26T20:09:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/04/22/why-cloud-brokers-are-the-foundation-for-the-resilient-api-network/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/04/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><lastmod>2011-04-23T00:37:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/04/11/blowing-holes-in-the-web-of-trust/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/04/spiderweb.jpg</image:loc><image:title>Autosave-File vom d-lab2/3 der AgfaPhoto GmbH</image:title></image:image><lastmod>2011-04-14T22:38:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/04/12/space-exploration-and-the-trough-of-disillusionment/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/04/screen-shot-2011-04-12-at-9-26-54-am1.png</image:loc><image:title>Screen shot 2011-04-12 at 9.26.54 AM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/04/screen-shot-2011-04-12-at-9-26-54-am.png</image:loc><image:title>Screen shot 2011-04-12 at 9.26.54 AM</image:title></image:image><lastmod>2011-04-12T18:48:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/04/12/no-more-iron-in-the-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/04/oxygen.jpg</image:loc><image:title>oxygen</image:title></image:image><lastmod>2011-04-14T01:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/03/30/gateway-as-endpoint/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/slide2.jpg</image:loc><image:title>Slide2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/screen-shot-2011-03-17-at-11-27-28-am2.png</image:loc><image:title>Screen shot 2011-03-17 at 11.27.28 AM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/screen-shot-2011-03-17-at-11-27-28-am1.png</image:loc><image:title>Screen shot 2011-03-17 at 11.27.28 AM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/screen-shot-2011-03-17-at-11-27-28-am.png</image:loc><image:title>Screen shot 2011-03-17 at 11.27.28 AM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/screen-shot-2011-03-17-at-11-28-11-am.png</image:loc><image:title>Screen shot 2011-03-17 at 11.28.11 AM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/screen-shot-2011-03-17-at-11-27-40-am.png</image:loc><image:title>Screen shot 2011-03-17 at 11.27.40 AM</image:title></image:image><lastmod>2011-03-30T22:30:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/03/28/when-is-the-cloud-not-a-cloud/</loc><lastmod>2011-03-28T23:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/03/04/upcoming-webinar-extending-enterprise-security-into-the-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/skyscraper-small.jpg</image:loc><image:title>skyscraper small</image:title></image:image><lastmod>2011-03-04T20:38:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/03/03/the-api-lab/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/03/chemistry.jpg</image:loc><image:title>chemistry</image:title></image:image><lastmod>2011-03-06T04:47:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/02/11/layer-7-technologies-joins-the-cloud-security-alliance-csa/</loc><lastmod>2011-02-11T19:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/02/04/rest-is-simple-but-simple-is-not-rest/</loc><lastmod>2011-02-04T20:25:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/02/04/a-clear-view-of-virtualization/</loc><lastmod>2011-02-04T19:30:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/27/defeating-the-facebook-hack/</loc><lastmod>2011-01-28T01:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/25/how-to-choose-a-soa-gateway/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2011/01/monitor.jpg</image:loc><image:title>Monitor</image:title></image:image><lastmod>2011-01-25T22:42:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/24/hacking-the-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/lightening.jpg</image:loc><image:title>lightening</image:title></image:image><lastmod>2011-01-24T22:18:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/13/using-securespan-gateways-for-traffic-distribution-into-oracle-osb/</loc><lastmod>2011-01-13T20:18:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/07/dilbert-on-cloud-computing/</loc><lastmod>2011-01-09T00:49:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/05/over-to-you-rush/</loc><lastmod>2011-01-12T02:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2011/01/04/is-web-connected-tv-the-new-power-play-for-hackers/</loc><lastmod>2011-01-06T18:53:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/11/27/securing-odata/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide41.jpg</image:loc><image:title>Slide4</image:title><image:caption>CloudSpan Gateways managing access to OData data sources.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide31.jpg</image:loc><image:title>Slide3</image:title><image:caption>    The Web application tier as security buffer between the database and the Internet.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide24.jpg</image:loc><image:title>Slide2</image:title><image:caption>It can be extremely risky to permit direct outside connections into a database.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/policy-long.png</image:loc><image:title>policy long</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/policy-short.png</image:loc><image:title>policy short</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/service.png</image:loc><image:title>service</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide4.jpg</image:loc><image:title>Slide4</image:title><image:caption>CloudSpan Gateways managing access to OData data sources.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide3.jpg</image:loc><image:title>Slide3</image:title><image:caption>The Web application tier as security buffer between the database and the Internet.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide23.jpg</image:loc><image:title>Slide2</image:title><image:caption>It can be extremely risky to permit direct outside connections into a database.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/slide22.jpg</image:loc><image:title>Slide2</image:title><image:caption>It can be extremely risky to permit direct outside connections into a database.</image:caption></image:image><lastmod>2010-11-28T06:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/17/upcoming-webinar-how-to-implement-enterprise-scale-api-management-the-secret-to-making-your-business-into-a-platform/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide211.jpg</image:loc><image:title>    Figure 1: The role of gateways in API management.</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide21.jpg</image:loc><image:title>Slide2</image:title><image:caption>Figure 1: The role of gateways in API management.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide2.jpg</image:loc><image:title>Slide2</image:title><image:caption>Figure 1: The role of gateways in API management.</image:caption></image:image><lastmod>2010-11-25T00:31:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/11/22/virtualization-vs-the-auditors/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/to-sign-a-contract-3.jpg</image:loc><image:title>To sign a contract 3</image:title></image:image><lastmod>2011-02-04T17:25:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/11/19/how-to-fail-with-web-services/</loc><lastmod>2010-12-03T08:22:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/11/14/talk-at-upcoming-gartner-aadi-2010-in-la-bridging-the-enterprise-and-the-cloud/</loc><lastmod>2010-11-15T04:58:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/11/08/there%e2%80%99s-a-cloudstream-for-that/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/martindale2.jpg</image:loc><image:title>Martindale</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/martindale1.jpg</image:loc><image:title>Martindale</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/11/martindale.jpg</image:loc><image:title>Martindale</image:title></image:image><lastmod>2010-11-09T17:18:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/24/bi-is-dead-long-live-bi-the-future-of-business-intelligence-in-the-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/lightbulb.jpg</image:loc><image:title>lightbulb</image:title></image:image><lastmod>2011-05-11T17:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/24/virtualizations-second-act/</loc><lastmod>2010-09-24T20:16:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/14/the-increasing-importance-of-cloud-governance/</loc><lastmod>2010-09-14T22:12:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/10/how-to-secure-vcloud-director-and-the-vcloud-api/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide12.jpg</image:loc><image:title>Slide1</image:title><image:caption>Figure 1: vCloud Director API management and security with CloudSpan from Layer 7.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide11.jpg</image:loc><image:title>Slide1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/09/slide1.jpg</image:loc><image:title>Slide1</image:title><image:caption>Figure 1: vCloud Director API management and security with CloudSpan from Layer 7.</image:caption></image:image><lastmod>2010-09-10T22:35:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/09/10/public-vs-private-clouds/</loc><lastmod>2010-09-10T17:44:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/08/27/the-top-50-cloud-bloggers-2/</loc><lastmod>2010-08-27T22:07:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/08/26/what-me-worry/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/trust.jpg</image:loc><image:title>trust</image:title></image:image><lastmod>2010-08-26T19:44:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/08/12/my-new-book-cloud-computing-principles-systems-and-applications-is-now-available/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/cloud-computing-springer1.png</image:loc><image:title>Cloud Computing Springer</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/cloud-computing-springer.png</image:loc><image:title>Cloud Computing Springer</image:title></image:image><lastmod>2010-08-12T16:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/08/11/why-health-care-needs-soa/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/testtubes.jpg</image:loc><image:title>testtubes</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/08/ucmc_cs_img1.jpg</image:loc><image:title>UCMC_CS_img1</image:title></image:image><lastmod>2010-08-11T18:36:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/07/16/timing-side-channel-attacks/</loc><lastmod>2010-07-17T00:02:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/07/16/how-to-get-rich-quick-with-cloud-computing/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/securitycam.jpg</image:loc><image:title>SecurityCam</image:title></image:image><lastmod>2010-07-16T22:41:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/06/03/fight-night-at-interop/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/06/img_0438.jpg</image:loc><image:title>IMG_0438</image:title><image:caption>Melee at the Mandalay 2010</image:caption></image:image><lastmod>2010-06-03T17:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/06/01/azure-broke-my-booth/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_04311.jpg</image:loc><image:title>IMG_0431</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0431.jpg</image:loc><image:title>IMG_0431</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0430.jpg</image:loc><image:title>IMG_0430</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0428.jpg</image:loc><image:title>IMG_0428</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0424.jpg</image:loc><image:title>IMG_0424</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0416.jpg</image:loc><image:title>IMG_0416</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/05/img_0410.jpg</image:loc><image:title>IMG_0410</image:title></image:image><lastmod>2010-06-01T17:04:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/05/31/beatniks-in-the-cloud/</loc><lastmod>2010-05-31T19:37:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/05/08/live-from-new-york-its-the-cloud-power-panel/</loc><lastmod>2010-05-09T01:45:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/05/03/the-top-5-mistakes-people-make-when-moving-to-the-cloud/</loc><lastmod>2010-05-03T18:16:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/04/30/the-swimming-pool-model-of-public-and-private-clouds/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/04/pool.jpg</image:loc><image:title>pool</image:title></image:image><lastmod>2010-04-30T23:07:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/04/16/xml-acceleration-using-virtual-appliances/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/04/slide11.jpg</image:loc><image:title>Slide1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/04/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><lastmod>2010-04-16T20:04:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/04/08/all-things-considered-about-cloud-computing-risks-and-challenges/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/04/espresso.jpg</image:loc><image:title>espresso</image:title></image:image><lastmod>2010-04-09T01:29:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/03/23/ws-i-publishes-basic-security-profile-bsp-1-1/</loc><lastmod>2010-03-23T23:22:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/03/22/upcoming-webinar-security-in-the-cloud-vs-security-for-the-cloud/</loc><lastmod>2010-03-25T04:21:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/28/soa-security-can-be-simple/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/encrypt.jpg</image:loc><image:title>encrypt</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/wss-1.jpg</image:loc><image:title>wss 1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/basic-scenario1.jpg</image:loc><image:title>basic scenario</image:title><image:caption>A simple, edge-of-network deployment of a SecureSpan Gateway as a border guard for internal services.</image:caption></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/ssl-detail.jpg</image:loc><image:title>ssl detail</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/ssl-authn1.jpg</image:loc><image:title>ssl authN</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/ssl-authn.jpg</image:loc><image:title>ssl authN</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/basic-ssl-reverse-proxy.jpg</image:loc><image:title>basic SSL reverse proxy</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/basic-scenario.jpg</image:loc><image:title>basic scenario</image:title><image:caption>A simple, edge-of-network deployment of a SecureSpan Gateway as a border guard for internal services.</image:caption></image:image><lastmod>2010-03-22T20:10:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/03/15/why-intermediaries-matter-in-soa/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/03/slide3.jpg</image:loc><image:title>Slide3</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/03/slide2.jpg</image:loc><image:title>Slide2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/03/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><lastmod>2010-03-16T00:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/03/04/rest-security-does-exist%e2%80%94you-just-need-to-apply-it/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/03/threats.png</image:loc><image:title>Threats</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/03/rest-policy.png</image:loc><image:title>REST Policy</image:title></image:image><lastmod>2010-03-19T19:01:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/03/01/the-seven-deadly-sins-the-cloud-security-alliance-identifies-top-cloud-security-threats/</loc><lastmod>2010-03-05T21:49:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/02/22/you-can-help-the-cloud-security-alliance-classify-the-top-threats-in-the-cloud/</loc><lastmod>2010-02-22T21:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/02/17/the-revolution-will-not-be-televised/</loc><lastmod>2011-05-22T00:55:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/02/10/my-thoughts-on-cloud-security-in-searchcloudcomputing-com/</loc><lastmod>2010-02-10T19:51:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/02/09/how-to-safely-publish-internal-services-to-the-outside-world/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/policy-2.png</image:loc><image:title>policy 2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/codeinjection.png</image:loc><image:title>codeInjection</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/ratelimit.png</image:loc><image:title>rateLimit</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/policy-11.png</image:loc><image:title>policy 1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/wizard3.png</image:loc><image:title>wizard3</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/wizard2.png</image:loc><image:title>wizard2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/wizard1.png</image:loc><image:title>wizard1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/slide21.jpg</image:loc><image:title>Slide2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/02/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><lastmod>2010-10-26T11:17:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/01/20/the-dust-of-haiti/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/laptop-haiti.jpg</image:loc><image:title>laptop haiti</image:title></image:image><lastmod>2010-01-21T00:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/01/18/up-is-the-new-up/</loc><lastmod>2010-01-18T23:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/01/08/how-to-secure-rest-and-json/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/sslauth2.png</image:loc><image:title>SSLAuth</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/sslauth1.png</image:loc><image:title>SSLAuth</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/dashboard.png</image:loc><image:title>dashboard</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/threat-prot.png</image:loc><image:title>Threat prot</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/queryparams.png</image:loc><image:title>QueryParams</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/entirepolicy.png</image:loc><image:title>EntirePolicy</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/sslauth.png</image:loc><image:title>SSLAuth</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/publishsvcprop.png</image:loc><image:title>PublishSvcProp</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/routing.png</image:loc><image:title>Routing</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2010/01/slide1.jpg</image:loc><image:title>Slide1</image:title></image:image><lastmod>2010-01-12T20:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2010/01/07/on-the-death-of-design-time-service-governance/</loc><lastmod>2010-01-08T05:07:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/23/cloud-security-alliance-guidance-v2-released/</loc><lastmod>2009-12-23T22:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/23/ebizq-soa-in-this-year-and-the-next/</loc><lastmod>2009-12-23T18:27:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/14/identity-buzz-podcast-with-now-available-end-to-end-web-services-security/</loc><lastmod>2009-12-14T23:11:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/11/upcoming-webinar-controlling-your-soa-across-the-global-enterprise-and-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/slide2.jpg</image:loc><image:title>Slide2</image:title></image:image><lastmod>2009-12-14T22:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/11/using-uri-templates-on-xml-security-gateways/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screen-shot-2009-12-10-at-4-16-43-pm.png</image:loc><image:title>Screen shot 2009-12-10 at 4.16.43 PM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screenshot-2.png</image:loc><image:title>Screenshot-2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screen-shot-2009-12-10-at-3-59-38-pm.png</image:loc><image:title>Screen shot 2009-12-10 at 3.59.38 PM</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screenshot-1.png</image:loc><image:title>Screenshot-1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screenshot.png</image:loc><image:title>Screenshot</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/screen-shot-2009-12-10-at-3-41-47-pm.png</image:loc><image:title>Screen shot 2009-12-10 at 3.41.47 PM</image:title></image:image><lastmod>2009-12-11T18:38:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/12/01/visualizing-the-boundaries-of-control-in-the-cloud/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/12/cloudcontrolboundaries.jpg</image:loc><image:title>CloudControlBoundaries</image:title></image:image><lastmod>2009-12-10T22:24:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/11/27/how-secure-is-cloud-computing/</loc><lastmod>2009-11-27T20:07:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/11/26/i-went-for-coffee-and-rds-was-waiting-for-me-when-i-returned/</loc><lastmod>2009-12-01T18:19:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/11/26/webinar-available-new-security-model-requirements-for-the-cloud/</loc><lastmod>2009-11-26T23:34:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/11/03/abstracting-cloud-gateways/</loc><lastmod>2009-11-03T17:23:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/11/02/podcast-how-to-ultimately-secure-the-cloud/</loc><lastmod>2009-11-02T23:18:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/18/clouds-may-be-big-but-you-should-start-small/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/cloud-vpn2.jpg</image:loc><image:title>cloud VPN</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/cloud-vpn1.jpg</image:loc><image:title>cloud VPN</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/cloud-vpn.jpg</image:loc><image:title>cloud VPN</image:title></image:image><lastmod>2010-05-03T21:41:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/17/ebizq-forum-question-is-service-reuse-overrated-as-a-value-proposition-for-soa-does-reuse-even-work-in-real-life-situations/</loc><lastmod>2009-09-17T23:59:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/17/is-cloud-computing-secure-prove-it/</loc><lastmod>2009-09-17T21:23:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/11/ebizq-forum-question-do-you-think-the-pervasive-use-of-cloud-computing-will-expand-or-contract-the-use-of-soa/</loc><lastmod>2009-09-11T22:10:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/04/securespan-product-line-certified-against-red-hats-jboss-enterprise-soa-platform/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/jboss1.jpg</image:loc><image:title>jboss</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/jboss.jpg</image:loc><image:title>jboss</image:title></image:image><lastmod>2009-09-04T23:05:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/09/04/integrating-securespan-gateways-and-suns-opensso/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/09/pep-pdp.jpg</image:loc><image:title>PEP PDP</image:title></image:image><lastmod>2009-09-04T20:03:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/27/ebizq-forum-question-what-are-your-questions/</loc><lastmod>2009-08-27T18:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/27/avoiding-the-toll-road-into-the-cloud/</loc><lastmod>2009-08-27T17:50:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/25/randy-hefner-on-the-state-of-soa-security/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/securespan-dmz-deployment.jpg</image:loc><image:title>SecureSpan DMZ Deployment</image:title><image:caption>SecureSpan Gateway Cluster deployed in a common, edge-of-the-network scenario. This is just one example of many different deployment possibilities. Here, the gateway cluster provides consistent security policy enforcement for all services published by the organization.</image:caption></image:image><lastmod>2009-08-25T23:47:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/17/sql-attack-and-the-largest-data-breach-in-us-history/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/sqlattack2.jpg</image:loc><image:title>SQLAttack</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/sqlattackdetails.jpg</image:loc><image:title>SQLAttackDetails</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/sqlattack1.jpg</image:loc><image:title>SQLAttack</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/sqlattack.jpg</image:loc><image:title>SQLAttack</image:title></image:image><lastmod>2010-12-03T12:09:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/10/cloud-use-cases/</loc><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-31.jpg</image:loc><image:title>Scenario 3</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-21.jpg</image:loc><image:title>Scenario 2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-13.jpg</image:loc><image:title>Scenario 1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-3.jpg</image:loc><image:title>Scenario 3</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-2.jpg</image:loc><image:title>Scenario 2</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-12.jpg</image:loc><image:title>Scenario 1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-11.jpg</image:loc><image:title>Scenario 1</image:title></image:image><image:image><image:loc>https://kscottmorrison.com/wp-content/uploads/2009/08/scenario-1.jpg</image:loc><image:title>Scenario 1</image:title></image:image><lastmod>2009-08-10T19:52:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/08/06/ebizq-forum-question-is-soa-something-small-to-medium-size-businesses-can-work-with/</loc><lastmod>2009-08-06T22:52:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/07/29/application-governance-cannot-be-ignored-on-the-cloud/</loc><lastmod>2009-07-29T17:29:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/07/24/cloud-will-change-the-roles-in-it/</loc><lastmod>2009-07-24T23:03:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/07/24/do-cloud-initiatives-come-from-it-or-corporate-mgmt/</loc><lastmod>2009-07-24T18:46:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/07/23/ebizq-forum-question-are-web-services-protocols-such-as-soap-and-rest-and-ajax-effective-for-building-soa-off-of-mainframe-large-systems-or-legacy-environments/</loc><lastmod>2009-07-23T19:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/26/gigaom-structure-private-clouds/</loc><lastmod>2009-06-27T00:02:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/09/on-twitter-social-media-and-privacy/</loc><lastmod>2009-06-09T17:43:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/09/podcast-security-management-compliance-in-the-cloud/</loc><lastmod>2009-06-09T16:40:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/08/pirate-radio-evolves-with-the-times/</loc><lastmod>2009-06-08T20:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/08/eweek-managing-identity-in-the-cloud-podcast/</loc><lastmod>2009-06-08T16:38:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/04/hayes-produces-apollo-11-manual/</loc><lastmod>2009-06-04T18:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/02/video-24-practical-operations-governance-of-soa/</loc><lastmod>2009-06-02T21:19:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/29/video-14-securing-web-2-0/</loc><lastmod>2009-06-02T21:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/06/02/what-will-be-the-future-of-application-development-in-cloud-computing/</loc><lastmod>2009-06-02T21:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/29/economist-unlocking-the-cloud/</loc><lastmod>2009-05-30T00:01:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/29/nist-perspective-on-cloud-computing/</loc><lastmod>2009-05-30T00:00:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/27/omg-soa-in-healthcare-conference/</loc><lastmod>2009-05-27T16:57:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/27/governance-in-the-cloud-white-paper-now-available/</loc><lastmod>2009-05-27T16:44:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/27/upcoming-webinar-with-david-linthicum/</loc><lastmod>2009-05-27T16:42:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/26/gigaom-piece-soa-governance-determines-success-in-the-cloud/</loc><lastmod>2009-05-26T22:15:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/22/aws-implementing-a-drive-shipping-service/</loc><lastmod>2009-05-22T21:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/22/the-101-electronic-kit/</loc><lastmod>2009-05-22T16:53:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/21/a-brief-incomplete-and-mostly-wrong-history-of-programming-languages/</loc><lastmod>2009-05-21T23:39:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/21/recent-ebizq-posts/</loc><lastmod>2009-05-21T22:24:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/21/ebizq-forum-question-what-do-you-believe-is-the-biggest-inhibitor-today-to-soa-adoption/</loc><lastmod>2009-05-21T21:15:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/20/hello-world/</loc><lastmod>2009-05-21T17:53:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/21/the-web-2-0-uniform/</loc><lastmod>2009-05-21T17:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com/2009/05/21/lego-architecture-series/</loc><lastmod>2009-05-21T17:52:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://kscottmorrison.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-04-27T21:41:57+00:00</lastmod></url></urlset>
