<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://swenotes.com/2025/12/03/understanding-model-context-protocol-mcp-and-the-role-of-mcp-servers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/12/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/12/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2026-02-11T02:52:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/12/02/unit-testing-the-what-why-and-how-with-practical-examples/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-12-03T02:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/11/11/implements-vs-extends-in-java/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-11-12T02:03:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/26/what-is-captcha-understanding-the-gatekeeper-of-the-web/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-15.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-26T20:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/06/memorysanitizer-msan-a-practical-guide-for-finding-uninitialized-memory-reads/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-14.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-07T01:21:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/05/sample-ratio-mismatch-srm-in-a-b-testing/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-13.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-05T15:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/05/unit-of-randomization-in-a-b-testing-a-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-05T14:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/frequentist-inference-in-a-b-testing-a-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-11.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-05T02:44:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/stable-bucketing-in-a-b-testing/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-10.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T20:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/minimum-detectable-effect-mde-in-a-b-testing/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-9.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T14:51:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/a-b-testing-a-practical-guide-for-software-teams/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-8.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T14:05:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/end-to-end-testing-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T13:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/04/single-page-applications-spa-a-practical-guide-for-modern-web-teams/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-6.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T13:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/03/risk-based-authentication-a-smarter-way-to-secure-users/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-04T01:35:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/02/one-time-password-otp-a-practical-guide-for-engineers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-03T02:05:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/02/multi-factor-authentication-mfa-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-3.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-03T01:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/02/pkce-proof-key-for-code-exchange-a-practical-guide-for-modern-oauth-2-0/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-03T01:21:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/01/what-is-a-man-in-the-middle-mitm-attack/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-02T02:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/10/01/integration-testing-a-practical-guide-for-real-world-software-systems/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-02T02:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/30/ephemeral-nature-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-96.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-01T01:36:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/30/forward-secrecy-in-computer-science-a-detailed-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-95.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-01T01:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/30/homomorphic-encryption-a-comprehensive-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-94.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-10-01T00:18:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/29/iso-iec-ieee-42010-understanding-the-standard-for-architecture-descriptions/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-93.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T03:07:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/29/acceptance-testing-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-92.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T01:21:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/29/system-testing-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-91.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T01:07:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/29/regression-testing-a-complete-guide-for-software-teams/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-90.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-30T00:55:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/28/online-certificate-status-protocol-ocsp-a-practical-guide-for-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-89.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-29T00:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/28/secure-socket-layer-ssl-a-practical-guide-for-modern-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-88.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-29T00:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/28/recommendation-for-random-number-generation-using-deterministic-random-bit-generators-drbgs/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-87.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-28T09:06:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/cryptographically-secure-pseudo-random-number-generator-csprng/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-86.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-28T03:34:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/understanding-transport-layer-security-tls-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-85.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-28T03:21:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/salted-challenge-response-authentication-mechanism-scram-a-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-84.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T23:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/smoke-testing-in-software-development-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-83.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T17:45:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/simple-authentication-and-security-layer-sasl-a-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-82.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T14:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/contact-testing-in-software-development-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-81.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T14:15:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/27/addresssanitizer-asan-a-practical-guide-for-safer-c-c/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-80.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-27T13:41:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/26/fuzzing-a-practical-guide-for-software-engineers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-79.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-26T09:55:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/25/understanding-application-binary-interface-abi-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-78.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-26T02:19:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/25/foreign-function-interfaces-ffi-a-practical-guide-for-software-teams/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-77.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-26T02:08:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/25/polyglot-interop-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-76.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-26T01:34:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/25/dead-letter-queues-dlq-the-complete-developer-friendly-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-75.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-26T01:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/24/message-brokers-in-computer-science-a-practical-hands-on-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-74.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-25T01:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/24/eventual-consistency-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-73.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-25T00:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/24/event-driven-architecture-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-72.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-25T00:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/23/domain-driven-development-a-comprehensive-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-71.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-24T02:30:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/22/outbox-pattern-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-70.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-23T01:57:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/22/understanding-three-phase-commit-3pc-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-69.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-22T21:34:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/22/two-phase-commit-2pc-in-computer-science-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-68.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-22T21:26:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/22/saga-pattern-reliable-distributed-transactions-for-microservices/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-67.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-22T13:20:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/21/aspect-oriented-programming-aop-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-66.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-22T01:37:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/21/inversion-of-control-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-65.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-21T22:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/20/tight-coupling-in-software-a-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-64.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-21T03:13:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/20/understanding-loose-coupling-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-63.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-21T02:44:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/19/understanding-dependency-injection-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-62.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-20T01:06:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/19/understanding-idempotent-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-61.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-20T00:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/19/understanding-the-yagni-principle-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-60.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-19T23:51:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/18/kiss-principle-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-59.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-19T02:08:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/18/understanding-the-dry-principle-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-58.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-19T01:59:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/18/conflict-free-replicated-data-type-crdt/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-57.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-19T01:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/18/understanding-oltp-databases-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-56.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-19T01:24:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/18/understanding-heisenbugs-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-55.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-18T22:14:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/17/state-management-in-software-engineering/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-54.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-18T02:13:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/17/what-is-a-modular-monolith/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-53.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-18T01:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/17/command-query-responsibility-segregation-cqrs-explained/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-52.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-17T23:25:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/17/understanding-model-view-viewmodel-mvvm/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-51.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-50.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-17T22:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/17/minimum-viable-product-mvp-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-49.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-17T21:18:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/16/separation-of-concerns-soc-in-software-engineering/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-48.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-17T02:25:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/16/code-review-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-47.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-17T01:59:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/16/string-vs-stringbuilder-vs-stringbuffer-in-java/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-46.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-16T23:52:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/16/understanding-mvc-frameworks-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-45.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-44.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-16T23:30:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/16/understanding-the-waterfall-model-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-43.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-42.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-16T22:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/understanding-truth-tables-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-41.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-40.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-16T02:29:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/understanding-queues-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-39.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-38.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-16T02:14:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/code-refactoring-a-complete-guide-for-software-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-37.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T23:13:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/code-katas-a-practical-guide-for-your-everyday-engineering-practice/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-36.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T22:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/pair-programming-working-together-for-better-code/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-35.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T22:19:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/15/test-driven-development-tdd-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-34.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T22:13:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/14/understanding-ci-cd-pipelines-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-32.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-31.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-30.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T02:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/14/understanding-the-testing-pyramid-in-software-development/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-29.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-28.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T02:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/14/extreme-programming-xp-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-33.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-15T02:09:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/08/big-o-notation-a-friendly-practical-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/bigonotationimage.png</image:loc><image:title>BigONotationImage</image:title></image:image><lastmod>2025-09-14T01:45:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/13/binary-search-trees-bst-a-practical-guide-for-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-27.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-26.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-14T00:50:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/13/standard-operating-procedure-sop-for-software-teams-complete-guide-template/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-25.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-13T13:28:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/13/restful-apis-a-practical-guide-for-modern-web-services/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-24.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-13T12:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/13/understanding-the-common-vulnerabilities-and-exposures-cve-system/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-23.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-13T11:44:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/12/optionalint-vs-optional-in-java-when-to-use-which-and-why/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-22.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-13T03:50:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/12/int-vs-integer-in-java-what-they-are-why-both-exist-and-how-to-choose/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-21.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-12T21:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/about/</loc><lastmod>2025-09-12T01:01:54+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://swenotes.com/2025/09/11/avl-trees-a-practical-guide-for-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-20.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-12T00:13:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/11/binary-trees-a-practical-guide-for-developers/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-19.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-18.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-11T22:45:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/11/understanding-central-authentication-service-cas-a-complete-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-17.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-16.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-11T21:00:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/10/understanding-hash-tables-a-key-data-structure-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-15.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-14.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-11T01:28:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/10/understanding-lookup-tables-in-computer-science/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-13.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-12.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-11T01:10:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/10/understanding-stacks-in-data-structures/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-11.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-10T23:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/09/understanding-arraylists-in-programming/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-10.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-9.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-10T00:36:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/09/understanding-linked-lists-a-beginners-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-8.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-7.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-10T00:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/09/understanding-arrays-a-complete-beginners-guide/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-6.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-5.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-09T23:53:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/09/understanding-theta-%ce%b8-notation-in-algorithms/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/omega_bigo_theta_graph.png</image:loc><image:title>Omega_BigO_Theta_graph</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-4.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-09T00:25:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2025/09/09/%cf%89-omega-notation-the-asymptotic-lower-bound/</loc><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://swenotes.com/wp-content/uploads/2025/09/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-09-08T23:48:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2016/08/23/windows-cheatsheet/</loc><lastmod>2019-09-13T14:00:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2016/08/24/mirth-connect-parsing-hl7/</loc><lastmod>2019-09-13T02:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com/2016/08/24/mirth-connect-using-java-code/</loc><lastmod>2019-09-13T02:50:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://swenotes.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-02-11T02:52:31+00:00</lastmod></url></urlset>
