<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://jljuarez.com/la-cache-en-arquitecturas-bancarias</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/el-desarrollo-y-sus-enfoques</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/cuando-pueden-pedirte-una-copia-del-dni</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/bootstrapping-seguro-de-dispositivos-iot</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/no-cometas-los-mismos-fallos-que-yo-copy</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/protocolo-tls-13-vs-tls-12</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/tech-lead-de-experto-tecnico-a-facilitador-del-saber</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/autenticacion-con-2fa-y-2sv</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/explicando-el-handshake-tls</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/escribiendo-codigo-limpio-parte-1</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/la-entrega-de-copias-del-dni</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/cifrado-aleatorio-de-datos</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/fido2-la-autenticacion-sin-contrasenas</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/tech-lead-vs-team-lead</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/ssl-y-tls-principales-diferencias</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/arquitecturas-multi-tenant</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/escribiendo-codigo-limpio-parte-2</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/algoritmos-ocra-hotp-y-totp</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/chapuza-napa-llamalo-como-quieras-menos-solucion</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com/almacenamiento-distribuido-y-sincronizado</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>0.5</priority></url><url><loc>https://jljuarez.com</loc><lastmod>2025-12-23T11:20:32.000Z</lastmod><priority>1.0</priority></url></urlset>