<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://securemachinery.com/2025/12/18/loss-functions-and-optimizers/</loc><lastmod>2026-01-08T06:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/08/10/chronological-list-of-known-learned-representations-increasing-date/</loc><lastmod>2026-01-04T09:34:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/09/14/toy-models-of-superposition-anthropic-paper-summary/</loc><lastmod>2026-01-04T08:56:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/11/09/understanding-reasoning-in-thinking-language-models-via-steering-vectors-a-summary-and-analysis/</loc><lastmod>2026-01-04T06:22:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/09/03/transformer-revisited/</loc><lastmod>2025-12-24T06:02:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/08/31/invitation-is-all-you-need-how-a-calendar-event-became-an-attack-vector/</loc><lastmod>2025-12-24T04:06:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/06/29/anthropic-activations-to-interpretable-features-with-monosemanticity/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2025/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-11-16T19:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2025/05/31/absolute-zero-zero-reliance-on-external-data-to-improve-model-reasoning/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2025/05/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-21T03:13:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/09/29/vllm-project-goals-comparisons/</loc><lastmod>2025-02-10T10:19:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/12/29/infiniband-roce-cxl-shaping-the-future-of-high-performance-networking/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/12/rdma.gif</image:loc><image:title>rdma</image:title></image:image><lastmod>2025-02-10T09:32:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/08/19/ai-risks-repository-from-mit/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/08/rai2024_q1-ai-risk-chart-white.jpg</image:loc><image:title>RAI2024_Q1-AI-Risk-Chart-white</image:title></image:image><lastmod>2024-11-27T22:39:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/07/07/sizing-an-llm-for-gpu-memory/</loc><lastmod>2024-10-07T09:50:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/09/12/alphafold-for-protein-structure-prediction-with-deep-learning-how-does-it-work/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-23T05:45:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/05/19/llm-optimization-peft-lora-qlora-and-more/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/08/llm-optimization-overview.png</image:loc><image:title>llm-optimization-overview</image:title></image:image><lastmod>2024-08-21T09:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/06/02/sagemaker-hyperpod-for-distributed-model-training/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-08-21T09:07:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/08/29/opendns-and-cisco/</loc><lastmod>2024-07-16T18:40:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/02/14/brief-history-of-cloud-time/</loc><lastmod>2024-07-16T18:38:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2024/02/25/direct-preference-optimization-dpo-vs-proximal-policy-optimization-ppo/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/02/dpo-flow.png</image:loc><image:title>DPO-flow</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2024/02/rlfh-rewardmodel-ppo-chart.png</image:loc><image:title>RLFH-RewardModel-PPO-chart</image:title></image:image><lastmod>2024-07-08T09:17:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/12/17/gpu-kernel-functions-for-deep-learning/</loc><lastmod>2024-07-04T13:52:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/07/02/deep-learning-and-reinforcement-learning-key-papers/</loc><lastmod>2024-07-02T15:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/11/12/torchscript-uses-for-model-optimization-and-serving/</loc><lastmod>2024-07-02T13:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/04/27/faceid-vs-touchid-on-iphone-and-fido-on-android/</loc><lastmod>2024-06-10T08:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/02/26/ec2-trainium-ultraclusters/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-04-21T12:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/03/24/ec2-p5-ultraclusters/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/aws-ultracluster-ec2-p4d.gif</image:loc><image:title>aws-ultracluster-ec2-p4d</image:title></image:image><lastmod>2024-04-21T12:04:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/10/08/basecoin/</loc><lastmod>2024-04-21T10:13:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/07/11/saml-oauth-jwt-openid/</loc><lastmod>2024-04-21T10:11:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/09/30/decentralized-identity/</loc><lastmod>2024-04-21T10:06:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/11/05/blockchain/</loc><lastmod>2024-04-21T10:03:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/04/08/elliptic-curve-crypto/</loc><lastmod>2024-04-21T09:41:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/03/17/bitcoin-market-cap-reaches-1t/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/05/img_6778.png</image:loc><image:title>img_6778</image:title></image:image><lastmod>2024-04-21T09:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/04/29/llm-inferencing-is-hard-problem-tools-and-techniques/</loc><lastmod>2024-02-12T01:16:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/03/06/erlang-for-and-if/</loc><lastmod>2023-10-20T04:38:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/11/26/reinforcement-learning/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/11/ppo-with-actor-critic-style.png</image:loc><image:title>PPO-with-Actor-Critic-style</image:title></image:image><lastmod>2023-09-16T21:32:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/01/29/weights-vs-activations/</loc><lastmod>2023-09-16T08:42:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/01/30/solarwinds-incident-overview/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/07/img_4053.png</image:loc><image:title>img_4053</image:title></image:image><lastmod>2023-07-08T05:33:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/05/14/llm-evolution-anthropic-claude-ai21-cohere-gpt-4/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/06/llm_survey.gif</image:loc><image:title>llm_survey</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/llm-model-survey-2.gif</image:loc><image:title>llm-model-survey-2</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/survey-gif-test-1.gif</image:loc><image:title>survey-gif-test-1</image:title></image:image><lastmod>2023-06-21T22:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/04/08/feature-vectors-embeddings-vector-databases-feature-stores/</loc><lastmod>2024-10-16T19:05:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/10/09/pytorch/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/06/dynamic_graph.gif</image:loc><image:title>dynamic_graph</image:title></image:image><lastmod>2023-06-19T07:34:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/04/04/multimodal-neurons-typographic-attacks/</loc><lastmod>2023-06-10T16:16:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/02/26/security-of-solidity-smart-contracts-evm-bridges/</loc><lastmod>2023-06-10T16:14:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/04/10/distributed-training/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-06-01T09:35:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/05/17/hugging-face/</loc><lastmod>2023-05-31T07:47:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2023/03/25/langchain-example/</loc><lastmod>2023-05-23T09:02:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/12/03/reasoning-and-acting-interleaving-react-paper/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/react-diagram.png</image:loc><image:title>react-diagram</image:title></image:image><lastmod>2023-05-23T08:51:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/11/04/iptables/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/iptables_diagram.png</image:loc><image:title>iptables_diagram</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-05-02T15:53:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/12/27/tesla-dojo/</loc><lastmod>2023-05-02T09:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/06/13/openai-scaling-kubernetes-cluster-to-7500-nodes/</loc><lastmod>2023-05-02T08:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/06/09/apache-druid-horizontally-scalable-time-series-database/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-04-20T19:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/09/19/ml-for-forecasting/</loc><lastmod>2023-04-20T07:21:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/03/28/bgp-and-resource-public-key-infrastructure-rpki/</loc><lastmod>2023-04-18T07:48:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/10/29/apache-yunikorn/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-14T08:09:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/11/06/apache-iceberg/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2023/04/iceberg-anim.gif</image:loc><image:title>iceberg-anim</image:title></image:image><lastmod>2023-04-05T02:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/05/30/kubernetes-security/</loc><lastmod>2023-03-25T04:33:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/01/30/machine-learning-security/</loc><lastmod>2022-12-18T19:17:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/05/24/transformer-gpt-2/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1571-3.jpg</image:loc><image:title>img_1571</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1570-4.jpg</image:loc><image:title>img_1570</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1570-3.jpg</image:loc><image:title>img_1570-3</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1571-1-1.jpg</image:loc><image:title>img_1571-1</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1570-2.jpg</image:loc><image:title>img_1570-2</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1570-1.jpg</image:loc><image:title>img_1570-1</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1571-2.jpg</image:loc><image:title>img_1571</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1570.jpg</image:loc><image:title>img_1570</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1571-1.jpg</image:loc><image:title>img_1571-1</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1571.jpg</image:loc><image:title>img_1571</image:title></image:image><lastmod>2023-11-03T18:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/10/09/ocsp-validation-and-ocsp-stapling-with-letsencrypt/</loc><lastmod>2022-11-12T09:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2022/03/26/airflow-and-orchestration/</loc><lastmod>2022-10-30T03:06:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/11/05/ethereum-security-and-the-dao-solidity-attack/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2022/01/img_2541.jpg</image:loc><image:title>img_2541</image:title></image:image><lastmod>2022-02-08T15:09:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/10/06/accuracy-vs-recall-vs-precision-vs-f1/</loc><lastmod>2022-02-01T06:02:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/08/19/keccak-or-sha-3/</loc><lastmod>2022-01-24T09:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/about/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2015/10/securemachinery.png</image:loc><image:title>securemachinery</image:title></image:image><lastmod>2022-01-24T09:34:47+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securemachinery.com/2017/03/12/git-merge-you-are-in-the-middle-of-a-merge-cannot-amend/</loc><lastmod>2024-02-20T09:46:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/10/25/spark-dremio/</loc><lastmod>2022-01-18T06:40:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/02/29/rsa-world-2020/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2020/05/img_7100.jpg</image:loc><image:title>img_7100</image:title></image:image><lastmod>2022-01-17T21:57:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/01/05/spark-and-scala/</loc><lastmod>2022-01-13T23:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/10/16/reinforcement-learning-in-chip-design/</loc><lastmod>2022-01-03T11:11:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/07/10/self-signed-cert-genrsa-primality-testing/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/07/img_7194.jpg</image:loc><image:title>img_7194</image:title><image:caption>Michael Rabin</image:caption></image:image><lastmod>2021-12-05T12:07:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/01/30/understanding-and-designing-for-rpo-and-rto/</loc><lastmod>2021-12-05T11:30:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/01/26/aws-builders-library/</loc><lastmod>2021-11-17T07:45:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2021/05/30/cncf-securing-the-software-supply-chain/</loc><lastmod>2021-09-20T17:11:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2020/08/06/supply-chain-logistics-and-sap-tm/</loc><lastmod>2021-09-10T00:54:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/03/31/sgx-vs-tpm-vs-se-security-in-silicon/</loc><lastmod>2021-08-12T18:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/09/08/firecracker-microvm-security/</loc><lastmod>2021-07-16T23:01:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/08/25/micros-pos-attacks/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/08/sca_diagram.jpg</image:loc><image:title>sca_diagram</image:title></image:image><lastmod>2021-06-01T09:05:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/04/06/golang-interface-ducktype-and-type-assertion/</loc><lastmod>2021-05-24T08:17:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/04/07/open-compute-project-2019/</loc><lastmod>2021-05-20T07:34:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/10/28/safety-concepts/</loc><lastmod>2021-05-19T06:33:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/09/15/siem-analytics-growth/</loc><lastmod>2021-05-10T06:22:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/04/14/traffic-limits-with-haproxy/</loc><lastmod>2021-04-26T09:12:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/05/18/lacework-intrusion-detection-system-cloud-ids/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2021/04/img_1432.jpg</image:loc><image:title>img_1432</image:title></image:image><lastmod>2021-04-24T21:52:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/08/25/rdp-security/</loc><lastmod>2021-04-07T05:33:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/09/19/techcrunch-disrupt-hackathon/</loc><lastmod>2021-04-05T23:20:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/01/28/git-error-failed-to-push-some-refs-to/</loc><lastmod>2021-04-05T07:35:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/12/29/aws-security-talks-2019/</loc><lastmod>2021-04-05T07:33:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/06/02/aviatrix-controller-on-aws-for-secure-networking/</loc><lastmod>2019-07-01T07:56:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/05/24/omnisci-gpu-based-columnar-database/</loc><lastmod>2019-07-01T07:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/01/10/real-world-crypto-2016/</loc><lastmod>2019-05-20T20:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/05/22/webservices-composition-with-aws/</loc><lastmod>2019-05-12T23:24:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/09/24/privacy-and-marketing-automation/</loc><lastmod>2019-05-10T10:00:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/06/03/zero-trust-networks-properties/</loc><lastmod>2019-05-06T10:03:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/02/04/neural-network-learning/</loc><lastmod>2019-05-03T10:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/08/04/threat-modelling/</loc><lastmod>2019-05-03T10:50:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2019/04/27/software-integrity-tools/</loc><lastmod>2019-04-30T10:04:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/07/09/linux-firewalls/</loc><lastmod>2019-04-19T11:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/05/12/scram-salted-challenge-response-authentication-mechanism/</loc><lastmod>2019-04-13T13:26:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/01/08/awesome-iot-hacks-repost/</loc><lastmod>2019-04-13T11:29:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/02/28/bytecode-vms/</loc><lastmod>2019-04-01T00:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/02/10/industrial-robot-safety-systems/</loc><lastmod>2019-03-26T07:27:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/07/01/vpnfilter-iot-router-malware/</loc><lastmod>2018-12-26T06:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/03/17/hatman-triton-ics-malware-analysis/</loc><lastmod>2018-12-16T12:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/02/docker-container-security/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2015/12/docker-containers-vms.png</image:loc><image:title>docker-containers-vms</image:title></image:image><lastmod>2018-12-01T02:52:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/12/02/roca-coppersmith-tpm-fast-primes/</loc><lastmod>2018-08-23T05:17:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/12/10/lessons-from-sf-muni-ransomware/</loc><lastmod>2018-08-18T04:14:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/06/18/bitcoin-ransomware-attacks-malware/</loc><lastmod>2018-08-18T04:13:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/04/22/weeping-angel-privacy/</loc><lastmod>2018-08-18T04:11:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/03/14/the-imitation-game-the-movie/</loc><lastmod>2018-06-13T01:38:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/06/20/ios-touchid-enterprise-use-cases/</loc><lastmod>2018-04-18T08:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/10/23/the-dyn-dns-ddos-attack-oct-21/</loc><lastmod>2018-04-18T08:31:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/01/27/one-time-passwords-for-authentication/</loc><lastmod>2018-04-08T09:49:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/12/15/software-defined-networking-security/</loc><lastmod>2018-03-30T05:21:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2018/02/18/javascript-timing-and-meltdown/</loc><lastmod>2018-03-20T00:50:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/03/31/ics-threat-landscape/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2017/04/ics_cert_en_1.png</image:loc><image:title>ics_cert_en_1</image:title></image:image><lastmod>2018-03-19T08:40:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/06/10/nvidia-tiny-linux-kernel-and-trustzone/</loc><lastmod>2018-01-08T13:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/04/03/s-boxes/</loc><lastmod>2018-01-01T07:25:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/01/30/lets-encrypt-less-green/</loc><lastmod>2017-09-15T23:09:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/01/22/industrial-ethernet-projections-2017/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2017/01/industrial_network_distribution.png</image:loc><image:title>industrial_network_distribution</image:title></image:image><lastmod>2017-06-24T10:20:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/08/29/embedded-neural-nets/</loc><lastmod>2017-06-24T09:53:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/05/14/nvidia-volta-gpu-vs-google-tpu/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2017/05/3d_matrix_multiply.png</image:loc><image:title>3d_matrix_multiply</image:title></image:image><lastmod>2017-05-30T09:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2017/02/26/rsa-world-2017/</loc><lastmod>2017-04-22T10:12:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/01/31/oauth-threat-model-mobile-and-oracle-mobile-security-suite/</loc><lastmod>2017-02-07T22:10:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/03/12/the-drown-attack-extension-to-quic/</loc><lastmod>2017-01-23T23:16:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/11/28/containers-and-privileges/</loc><lastmod>2016-12-27T12:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/07/25/on-software-requirements/</loc><lastmod>2016-11-25T19:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/10/10/ethical-considerations-in-autonomous-vehicles/</loc><lastmod>2016-10-14T01:09:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/09/14/neural-network-training-and-inferencing-on-nvidia/</loc><lastmod>2016-10-08T20:09:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/04/09/nvidia-nvgraph-and-tesla-p100-gpu/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/04/rfmap1.gif</image:loc><image:title>rfmap1</image:title></image:image><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/04/graphdatabase_propertygraph.png</image:loc><image:title>graphdatabase_propertygraph</image:title></image:image><lastmod>2016-10-05T16:48:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/09/12/automotive-and-process-safety-standards/</loc><lastmod>2016-10-05T01:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/07/21/asn-1-buffer-overflow-puts-networks-at-risk/</loc><lastmod>2016-10-03T23:37:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/03/19/asn1-types/</loc><lastmod>2016-10-01T10:18:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/15/cassandra-and-the-internet-of-boilers/</loc><lastmod>2016-09-15T22:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/04/25/rsa-world-2015-san-francisco/</loc><lastmod>2016-09-15T22:04:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/14/identity-of-the-thing-in-iot/</loc><lastmod>2016-09-15T22:02:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/05/28/icsa-internet-of-things-security-certification-requirements/</loc><lastmod>2016-06-20T22:41:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/06/11/lexus-bad-update-details/</loc><lastmod>2016-06-20T22:40:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/05/14/security-competition-open-source/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/05/capture_the_flah_competition_on_day_3_at_the_innovation_zone_courtesy_ftw.jpg</image:loc><image:title>capture_the_flah_competition_on_day_3_at_the_innovation_zone_courtesy_ftw</image:title></image:image><lastmod>2016-05-25T15:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/10/29/security-and-compliance-standards/</loc><lastmod>2016-05-19T01:11:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/04/20/reactive-microservices/</loc><lastmod>2016-04-25T20:54:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/03/26/aes-pipeline/</loc><lastmod>2016-04-15T08:09:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/09/17/salesforce-dreamforce-conference-iot-demos/</loc><lastmod>2016-02-15T03:30:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/10/31/thingworx/</loc><lastmod>2016-02-08T05:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/20/kafka-security/</loc><lastmod>2016-02-03T01:50:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/12/spark-storm-ayasdi-hadoop/</loc><lastmod>2016-02-02T21:25:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/09/10/can-bus-attacks/</loc><lastmod>2016-01-23T12:04:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/04/amazon-s2n/</loc><lastmod>2016-01-21T11:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2016/01/17/cloud-access-security-brokers/</loc><image:image><image:loc>https://securemachinery.com/wp-content/uploads/2016/01/496ea-casb4.jpg</image:loc><image:title>496ea-casb4</image:title></image:image><lastmod>2016-01-21T09:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/29/computer-detective-in-the-cloud/</loc><lastmod>2016-01-18T21:52:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/03/28/simple-crypto-operations/</loc><lastmod>2016-06-20T22:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/30/uber-security-keys-on-github/</loc><lastmod>2016-01-06T06:53:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/iotsecurity/</loc><lastmod>2015-12-19T11:59:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://securemachinery.com/2015/10/21/its-back-to-the-future-day/</loc><lastmod>2015-12-17T13:20:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/15/how-does-iot-affect-identity-and-access-management/</loc><lastmod>2015-12-17T13:16:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/12/14/cert-warns-wind-turbines-open-to-compromise/</loc><lastmod>2015-12-17T13:13:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/08/12/zigbee-scanning-from-overhead-drone/</loc><lastmod>2015-12-09T11:56:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/05/23/os-x-malware-and-connected-homes/</loc><lastmod>2015-12-01T10:38:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/08/16/tesla-model-s-hacked-by-researchers/</loc><lastmod>2015-11-19T01:18:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/13/biometric-identification-for-iot/</loc><lastmod>2015-11-19T01:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/10/13/aws-reinvent-iot/</loc><lastmod>2015-11-16T00:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/08/02/hvac-security-plan/</loc><lastmod>2025-03-24T20:35:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/09/28/integrate-conference-2015/</loc><lastmod>2015-11-15T07:51:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/03/security-acquisitions-for-integrations-oct-15/</loc><lastmod>2015-11-15T05:33:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com/2015/11/10/secureauth-and-behaviosec-presentation-palo-alto/</loc><lastmod>2015-11-14T09:50:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://securemachinery.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-08T06:37:05+00:00</lastmod></url></urlset>
