{"id":2002,"date":"2018-04-03T13:02:19","date_gmt":"2018-04-03T07:32:19","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=2002"},"modified":"2021-06-09T16:01:14","modified_gmt":"2021-06-09T10:31:14","slug":"will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/","title":{"rendered":"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck?"},"content":{"rendered":"<p><i><span style=\"font-weight: 400;\">Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a totally different way from a classical computer. Quantum bits or \u2018qbits\u2019 can exist in a state of both zero and one simultaneously. So, the amount of information stored in N qubits is two to the power of N classical bits. Imagine the speed at which it can process data. Exponential!<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">In an effort to dish out quality deliverables, quantum computing is creating unshackled platforms that break potentially the toughest codes in mainstream encryption strategies to increase processor speeds. These engineers, researchers and scientists focus on core principles of business implementations using state-of-the-art web-based applications to permeate into every field they can get their hands on. But, \u2018Digital Gurus\u2019 are predicting that there will come a time, where bypassing critical encryption code systems could potentially put digital platforms in grave danger of being compromised by hackers. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">E-Commerce is driving quantum computing system towards digital immortality. With robust products that provide multi-company support, imports from other apps and multi-user and groups platforms, it is harnessing innovative solutions to leverage vertical support.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Through resource alliance footprints and client testimonials they are socializing the concept to maximize visibility. Quantum computing can be applied to any platform using machines, mobile apps, high availability cluster servers and cloud networks. At the cost of speed, no hardware will be spared. They are also inching in on sectors of realty, NGO, travel, hospitality and other soft services. A wide range of government and non-governmental uses have been taken into account by the network designers with the awareness, that internet will be commercialized. They have the potential to harness digital media to catapult business applications.<\/span><\/p>\n<p><b>Potential Security Threat<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ethical issues emanating from them are important and require immediate attention to these design-based solutions. The alliance of quantum computing with myriad digital platforms does not mean cybersecurity is no threat and is ready to go mainstream. \u00a0It is far from a secure comfort zone. Inbuilt codes hopping through thousands of digital hardware at lightning speeds, bypassing encrypted codes and loops, are in a rush without meaningful cyber-security infrastructure in place. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">We must create a sense of awareness to this generation. Diving into multiple technological landscapes to plan and code without the perspective of security in the technical design is equivalent to digital suicide. It will become an open gate for hackers to hop and loop through the algorithms. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The next generation of computing solution will face thorny paths of security. And it will be our responsibility to groom them to create a digital world of tomorrow without any fear of being compromised. Policies must be framed for designers to work on design discourses offering a conceptual foundation to address these ethical dilemmas. Network fairness and etiquettes guidelines must be defined and followed. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internet designers are aware that this model will become susceptible to naughty or diabolical players, however not enough focus is being stressed on social, private, legal and technical matters in this respect. If immediate remedial measures are not factored in, this giant could potentially bring a day where encryption stands helpless,<\/span> <span style=\"font-weight: 400;\">and a free gate pass is given for hackers to run amuck. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a totally different way from a classical computer. Quantum bits or \u2018qbits\u2019 can exist in a state of both zero and one simultaneously. So, the amount of information stored in N qubits is two to the power of N classical bits. [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378],"tags":[],"class_list":["post-2002","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-03T07:32:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T10:31:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp\" \/>\n<meta name=\"author\" content=\"Vijith Sivadasan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck?\" \/>\n<meta name=\"twitter:description\" content=\"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vijith Sivadasan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\"},\"author\":{\"name\":\"Vijith Sivadasan\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2018-04-03T07:32:19+00:00\",\"dateModified\":\"2021-06-09T10:31:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\"},\"wordCount\":546,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/hacker-a.jpg\",\"articleSection\":[\"Cloud &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\",\"name\":\"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/hacker-a.jpg\",\"datePublished\":\"2018-04-03T07:32:19+00:00\",\"dateModified\":\"2021-06-09T10:31:14+00:00\",\"description\":\"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5\",\"name\":\"Vijith Sivadasan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg\",\"caption\":\"Vijith Sivadasan\"},\"description\":\"An enterprising visionary and a serial entrepreneur, Vijith is driven by instinct in his pursuit for creative excellence. Passionate about transformational marketing strategies, he enunciates the critical need of analytic skills to maximize business potential. To know more on how he can add value to your business, drop him a line at vijith@codelattice.com\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog","description":"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/","og_locale":"en_US","og_type":"article","og_title":"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog","og_description":"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.","og_url":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_published_time":"2018-04-03T07:32:19+00:00","article_modified_time":"2021-06-09T10:31:14+00:00","og_image":[{"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp","type":"","width":"","height":""}],"author":"Vijith Sivadasan","twitter_card":"summary_large_image","twitter_title":"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck?","twitter_description":"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp","twitter_creator":"@Codelattice","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Vijith Sivadasan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/"},"author":{"name":"Vijith Sivadasan","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5"},"headline":"Codelattice Blog","datePublished":"2018-04-03T07:32:19+00:00","dateModified":"2021-06-09T10:31:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/"},"wordCount":546,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/hacker-a.jpg","articleSection":["Cloud &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/","url":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/","name":"Will the Quantum Computing Leap Build a World Where Encryption Stands Helpless and Hacker Run Amuck? - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/hacker-a.jpg","datePublished":"2018-04-03T07:32:19+00:00","dateModified":"2021-06-09T10:31:14+00:00","description":"Quantum computing is getting ambitious. Everything has to surpass jet speed. It works in a completely one-of-a-kind manner from a classical computer.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-30.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/will-the-quantum-computing-leap-build-a-world-where-encryption-stands-helpless-and-hacker-run-amuck\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/a9537076a7a382d4161e1a86e43384d5","name":"Vijith Sivadasan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/03\/Vijith-Sivadasan-150x150.jpg","caption":"Vijith Sivadasan"},"description":"An enterprising visionary and a serial entrepreneur, Vijith is driven by instinct in his pursuit for creative excellence. Passionate about transformational marketing strategies, he enunciates the critical need of analytic skills to maximize business potential. To know more on how he can add value to your business, drop him a line at vijith@codelattice.com"}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2002","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=2002"}],"version-history":[{"count":5,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions"}],"predecessor-version":[{"id":3699,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2002\/revisions\/3699"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/2131"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=2002"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=2002"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=2002"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}