<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
        xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
        <url>
        <loc>https://knutmichael.com/articles/when-software-failures-become-catastrophic</loc>
        <lastmod>2026-04-19T02:02:01+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/1673296238254-e57890.jpg</image:loc>
                        <image:caption>Visualization of software failure propagation caused by small errors at system boundaries in complex systems</image:caption>
                    </image:image>
            </url>
        <url>
        <loc>https://knutmichael.com/articles/surveillance-security-and-the-architectural-paradox</loc>
        <lastmod>2026-04-19T02:00:37+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/1760267137473-5abf87.png</image:loc>
                        <image:caption>Illustration representing the tension between security, privacy and surveillance in system architecture</image:caption>
                    </image:image>
            </url>
        <url>
        <loc>https://knutmichael.com/articles/margaret-hamilton-and-modern-software-reliability</loc>
        <lastmod>2026-04-19T01:59:15+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/1677011566919-3772fc.jpg</image:loc>
                        <image:caption>Illustration representing software reliability principles such as failure handling, prioritization and graceful degradation in complex systems</image:caption>
                    </image:image>
            </url>
        <url>
        <loc>https://knutmichael.com/articles/women-who-shaped-modern-computing</loc>
        <lastmod>2026-04-19T01:57:42+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/1678279354755-9dbe92.png</image:loc>
                        <image:caption>Illustration representing foundational figures in computing and the principles of abstraction, reliability and system design</image:caption>
                    </image:image>
            </url>
        <url>
        <loc>https://knutmichael.com/articles/metadata-identity-and-the-shadows-we-leave-behind</loc>
        <lastmod>2026-04-19T01:56:28+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/image-848c50.png</image:loc>
                        <image:caption>Visualization of metadata relationships showing how communication patterns can reveal identity and behavior without accessing content</image:caption>
                    </image:image>
            </url>
        <url>
        <loc>https://knutmichael.com/articles/when-the-grid-goes-dark-infrastructure-dependency-europe</loc>
        <lastmod>2026-04-19T01:41:52+00:00</lastmod>
                <image:image>
            <image:loc>https://knutmichael.com/media/1745845179707-61a314.png</image:loc>
                        <image:caption>Map of Spain showing internet measurement nodes going offline during a large-scale power outage</image:caption>
                    </image:image>
            </url>
    </urlset>
