<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.solutioned.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-10</lastmod>
  </url>
  <url>
    <loc>https://www.solutioned.com/blog/reference-architecture-a-practical-example</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/b0792b1e-c99f-42c0-ab90-967a0a785273/reference-architecture-all-together.png</image:loc>
      <image:title>Blog - Reference Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 5 — Complete reference architecture for Demo Staffing Company Inc.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/ae2b4d26-3d72-4bb7-adab-b66d034d3a17/reference-architecture-data-app-layers.png</image:loc>
      <image:title>Blog - Reference Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 4 — Data and application layer showing services, collaborations, functions and components</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/327b0d5e-5004-4a62-9f7d-b16b4693303c/reference-architecture-motivation-layer.png</image:loc>
      <image:title>Blog - Reference Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 1 — Motivation layer showing drivers, goals, outcomes, and requirements</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/0ef6df4d-8431-47eb-bfdc-8cce6ee7e298/reference-architecture-business-layer.png</image:loc>
      <image:title>Blog - Reference Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 3 — Business layer showing business processes and roles</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/0e8c79d1-9e8c-4145-a665-0454a66f93aa/reference-architecture-strategy-layer.png</image:loc>
      <image:title>Blog - Reference Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 2 — Strategy layer showing courses of action, business capability, and resources</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.solutioned.com/blog/solution-architecture-a-practical-example</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/fab85e55-e8d4-433c-9f91-6cf8b2e2586b/solution-architecture-all-together.png</image:loc>
      <image:title>Blog - Solution Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 5 — Complete machine learning solution architecture</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/ba8ad3c5-5c75-4f97-b266-6ccdfadcb4db/solution-architecture-technology-layer.png</image:loc>
      <image:title>Blog - Solution Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 4 — Technology layer showing instrumentation in the cloud</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/d890730f-cd21-40ac-a6aa-4b3bbabce94b/solution-architecture-business-layer.png</image:loc>
      <image:title>Blog - Solution Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 2 — Business layer showing role and associated process</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/4fbf41d8-d6bd-4ef9-b2ec-14117b7638f3/solution-architecture-data-app-layers.png</image:loc>
      <image:title>Blog - Solution Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 3 — Data and application layer showing elements specific to machine learning and analytics</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/23b6b698-2e4c-49e7-a4f4-5aabd660979c/solution-architecture-strategy-layer.png</image:loc>
      <image:title>Blog - Solution Architecture: A Practical Example - Make it stand out</image:title>
      <image:caption>Fig 1 — Strategy layer showing IT organization resource</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.solutioned.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-03-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741380102173-XXF6HLV26ZNIEKQH4BRY/unsplash-image-FnA5pAzqhMM.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/ae65be93-dc82-4b27-b299-d4b260d6b461/services-insider-threat-trends.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/5a0a79a4-bd7c-41cf-a1a7-49815d3543fc/services-insider-onboarding-process.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741380382447-5LZLR52HE4DPY1G8N5HI/unsplash-image-40XgDxBfYXM.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/fecca1fb-de5b-4fe1-84d3-f152cf3c53a5/services-malware-trends.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/c5208dba-667a-4ac3-a222-5aba18c5e0ae/services-malware-unique-approach.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741380694631-WS48XAOEN4FVLS9W41AW/unsplash-image-376KN_ISplE.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741381051761-TR1OIDXLNJULOPF49KIN/unsplash-image-o4UhdLv5jbQ.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741252544105-HQP3BMF2ZHRBR2RLIXXS/unsplash-image-a6OQfCcnoYg.jpg</image:loc>
      <image:title>Advanced threat detection using artificial intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741252633201-27QAR4D56M6SIQ5WT9LQ/unsplash-image-ipzI4hX225M.jpg</image:loc>
      <image:title>Advanced threat detection using artificial intelligence</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1741252677139-JF919PX4RCRM6OMHDYED/unsplash-image-QweeHI91iVY.jpg</image:loc>
      <image:title>Advanced threat detection using artificial intelligence</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.solutioned.com/insider-threat-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/ae65be93-dc82-4b27-b299-d4b260d6b461/services-insider-threat-trends.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/5a0a79a4-bd7c-41cf-a1a7-49815d3543fc/services-insider-onboarding-process.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/58d3ee81-d8b0-45d8-b95a-372c0b4f5a41/services-insider-what-is-it.png</image:loc>
      <image:title>Protect your intellectual property with custom built insider threat detection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/85cf3b41-8fcf-4942-b530-9cea4633e48a/services-insider-why-important.png</image:loc>
      <image:title>Protect your intellectual property with custom built insider threat detection</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/3067f3e8-b422-44b7-9643-6a95c6601684/services-insider-what-can-be-done.png</image:loc>
      <image:title>Protect your intellectual property with custom built insider threat detection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.solutioned.com/malware-threat-detection</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/fecca1fb-de5b-4fe1-84d3-f152cf3c53a5/services-malware-trends.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/c5208dba-667a-4ac3-a222-5aba18c5e0ae/services-malware-unique-approach.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/e04cce93-1370-436c-a5e0-64030fc632be/services-malware-what-is-it.png</image:loc>
      <image:title>Secure your networks with custom built malware detection solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/4f7dcfc7-422d-4a03-aa31-0c46ef8af94c/services-malware-why-important.png</image:loc>
      <image:title>Secure your networks with custom built malware detection solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1a2d2421-5ee0-4830-aefe-14b83033ebdd/services-malware-what-can-be-done.png</image:loc>
      <image:title>Secure your networks with custom built malware detection solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.solutioned.com/cybersecurity-consulting</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/58d3ee81-d8b0-45d8-b95a-372c0b4f5a41/services-insider-what-is-it.png</image:loc>
      <image:title>Build a stronger security posture with cybersecurity and enterprise architecture consulting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/1a2d2421-5ee0-4830-aefe-14b83033ebdd/services-malware-what-can-be-done.png</image:loc>
      <image:title>Build a stronger security posture with cybersecurity and enterprise architecture consulting</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/67c36aeca5d3327a4038fe56/7135c99f-3b76-4af9-ba72-5a947b51da80/services-consulting-experience-expertise.png</image:loc>
      <image:title>Build a stronger security posture with cybersecurity and enterprise architecture consulting</image:title>
    </image:image>
  </url>
</urlset>

