{"id":2118,"date":"2018-04-26T13:27:53","date_gmt":"2018-04-26T07:57:53","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=2118"},"modified":"2021-03-03T11:10:52","modified_gmt":"2021-03-03T05:40:52","slug":"quantum-computing-is-getting-ambitious","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/","title":{"rendered":"Quantum Computing is Getting Ambitious"},"content":{"rendered":"<p><em>There could come a time when we will all take a plunge innocently, into a world of digital transparency. Your naughty neighbour could be reading all your messages and having the last laugh. He could be snooping into your financial<\/em><em> figures. Now it\u2019s beginning to scare you right?\u00a0Quantum computing is the next generation digital baby that\u00a0works in a\u00a0totally\u00a0different way from the classical computer.\u00a0<\/em><\/p>\n<p><strong>Everything Has to Surpass Jet Speed Today<\/strong><\/p>\n<p>It is said that quantum bits or \u2018qbits\u2019 can occur in a state of both one and zero concurrently.\u00a0So, what does this mumbo jumbo mean? Basically, exponential growth and speed.<strong>\u00a0<\/strong><\/p>\n<p><strong>Hackers Playground<\/strong><\/p>\n<p>In an effort to\u00a0dish out quality deliverables, quantum computing is creating unshackled platforms that break potentially the toughest codes in mainstream encryption strategies to increase processor speeds.\u00a0These engineers, researchers, and scientists focus on core principles of business implementations using\u00a0state-of-the-art\u00a0web-based\u00a0applications\u00a0into every field\u00a0they can get their hands\u00a0on. But, \u2018Digital Gurus\u2019\u00a0are predicting that there will come a time,\u00a0where\u00a0bypassing critical encryption\u00a0code, systems could potentially put digital platforms in\u00a0grave danger of being compromised by hackers.<\/p>\n<p><strong>Radially Growing Digital World Work Space<\/strong><\/p>\n<p>E-Commerce is driving quantum computing system towards digital immortality. With robust products that provide multi-company support, imports from other apps and multi-user and groups platforms, it is\u00a0driving\u00a0innovative solutions to\u00a0leverage\u00a0vertical support.<\/p>\n<p><strong>Signature of Digital Presence in All Fields<\/strong><\/p>\n<p>Through resource alliance footprints and client testimonials they are\u00a0socializing\u00a0the concept to\u00a0maximize visibility.\u00a0Quantum computing\u00a0can\u00a0be applied\u00a0to\u00a0any platform using machines, mobile apps, high availability cluster servers and cloud networks. At the cost of speed, no hardware will\u00a0be spared. They are also inching in on\u00a0sectors of\u00a0reality, NGO, travel, hospitality\u00a0and other soft services.\u00a0A wide range of government and non-governmental uses have been taken into account by the network designers\u00a0with the awareness,\u00a0that internet will\u00a0be commercialized.\u00a0They have the potential to drive digital media to catapult business applications.<\/p>\n<p><strong>Why Should an Average Joe Worry?<\/strong><\/p>\n<p>Ethical issues budding from them\u00a0are important and\u00a0require immediate attention to\u00a0these design-based solutions.\u00a0The polygamy of quantum computing with myriad digital\u00a0platforms\u00a0does\u00a0not\u00a0mean cybersecurity is no threat and is ready to go mainstream. It is far from\u00a0a\u00a0secure comfort zone.\u00a0Inbuilt\u00a0codes hopping through thousands of digital hardware at lightning speeds, bypassing\u00a0encrypted\u00a0codes and loops,\u00a0are in a rush without meaningful cyber-security infrastructure in place.<\/p>\n<p>Can we do something about it? Of course, yes. Our security lies in our awareness.<\/p>\n<p>Diving into multiple technological landscapes to plan and code without the perspective of security\u00a0in the\u00a0technical design\u00a0is equivalent to digital suicide. It will become\u00a0an\u00a0open\u00a0gate\u00a0for hackers to hop\u00a0and loop through the algorithms.<\/p>\n<p><strong>Rocky Road Ahead<\/strong><\/p>\n<p>The\u00a0next generation\u00a0of\u00a0computing solutions will face thorny paths of security. And it will be our responsibility to groom them to create a secure digital world for tomorrow without\u00a0any fear of being\u00a0compromised.\u00a0Policies must be framed for designers to work on design discourses offering a conceptual foundation to address these ethical dilemmas. Network fairness and etiquettes guidelines must be defined and followed.<\/p>\n<p>Internet designers are aware that this model will become susceptible to naughty or diabolical players, however not enough focus is being stressed on social, private, legal and technical matters in this respect. If immediate remedial\u00a0measures\u00a0are\u00a0not factored\u00a0in, this giant could potentially\u00a0bring a day where\u00a0encryption stands\u00a0helpless, and\u00a0a free gate pass\u00a0is given\u00a0for hackers to run amuck.<\/p>\n<p>&nbsp;<\/p>\n<p><em>\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There could come a time when we will all take a plunge innocently, into a world of digital transparency. Your naughty neighbour could be reading all your messages and having the last laugh. He could be snooping into your financial figures. Now it\u2019s beginning to scare you right?\u00a0Quantum computing is the next generation digital baby [&hellip;]<\/p>\n","protected":false},"author":18,"featured_media":2119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378],"tags":[],"class_list":["post-2118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum Computing is Getting Ambitious - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"There could come a time when we will all take a plunge innocently, into a world of digital transparency.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Computing is Getting Ambitious - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"There could come a time when we will all take a plunge innocently, into a world of digital transparency.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:published_time\" content=\"2018-04-26T07:57:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-03T05:40:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n<meta name=\"author\" content=\"Adheena Prakash\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Quantum Computing is Getting Ambitious\" \/>\n<meta name=\"twitter:description\" content=\"There could come a time when we will all take a plunge innocently, into a world of digital transparency.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adheena Prakash\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\"},\"author\":{\"name\":\"Adheena Prakash\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2018-04-26T07:57:53+00:00\",\"dateModified\":\"2021-03-03T05:40:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\"},\"wordCount\":602,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/qt.jpg\",\"articleSection\":[\"Cloud &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\",\"name\":\"Quantum Computing is Getting Ambitious - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/qt.jpg\",\"datePublished\":\"2018-04-26T07:57:53+00:00\",\"dateModified\":\"2021-03-03T05:40:52+00:00\",\"description\":\"There could come a time when we will all take a plunge innocently, into a world of digital transparency.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1\",\"name\":\"Adheena Prakash\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g\",\"caption\":\"Adheena Prakash\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Computing is Getting Ambitious - Codelattice Blog","description":"There could come a time when we will all take a plunge innocently, into a world of digital transparency.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Computing is Getting Ambitious - Codelattice Blog","og_description":"There could come a time when we will all take a plunge innocently, into a world of digital transparency.","og_url":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_published_time":"2018-04-26T07:57:53+00:00","article_modified_time":"2021-03-03T05:40:52+00:00","og_image":[{"width":600,"height":344,"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp","type":""}],"author":"Adheena Prakash","twitter_card":"summary_large_image","twitter_title":"Quantum Computing is Getting Ambitious","twitter_description":"There could come a time when we will all take a plunge innocently, into a world of digital transparency.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp","twitter_creator":"@Codelattice","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Adheena Prakash","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/"},"author":{"name":"Adheena Prakash","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1"},"headline":"Codelattice Blog","datePublished":"2018-04-26T07:57:53+00:00","dateModified":"2021-03-03T05:40:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/"},"wordCount":602,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/qt.jpg","articleSection":["Cloud &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/","url":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/","name":"Quantum Computing is Getting Ambitious - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/qt.jpg","datePublished":"2018-04-26T07:57:53+00:00","dateModified":"2021-03-03T05:40:52+00:00","description":"There could come a time when we will all take a plunge innocently, into a world of digital transparency.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/04\/ezgif.com-gif-maker-34.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/quantum-computing-is-getting-ambitious\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/9821fc5150b711596427926091f591c1","name":"Adheena Prakash","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/739b42074dd5778fc292e06acdf2ce3cf4bfb87b72ab58b7dad57673baca061c?s=96&d=mm&r=g","caption":"Adheena Prakash"}}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=2118"}],"version-history":[{"count":3,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2118\/revisions"}],"predecessor-version":[{"id":3315,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2118\/revisions\/3315"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/2119"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=2118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=2118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=2118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}