Updated: March 16, 2026Architecture, security models, and information technology ecosystem analysis.Digital SovereigntyMaturity levels in the CISQ security modelReliable Data Product DistributionDigital Sovereignty by DesignCISQ-Model of security qualitiesA case against the CIA triad (Substack)Structured service addressing. A new take on load balancing in IPv6 (Repository)Under construction Fiber semantics. Event sourcing for complex domains (Repository)Quality attributes (Repository)