  {"id":9673,"date":"2024-11-05T14:13:30","date_gmt":"2024-11-05T19:13:30","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9673"},"modified":"2024-11-05T17:20:52","modified_gmt":"2024-11-05T22:20:52","slug":"marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/","title":{"rendered":"Quantum Computing&#8217;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat"},"content":{"rendered":"\n<p>Last week, international scientists made headlines by successfully cracking a 50-bit RSA encryption integer using <strong>D-Wave\u2019s Advantage quantum computer<\/strong>. While it&#8217;s true that a 50-bit key is vastly smaller than the 2048-bit keys used in modern RSA encryption, the significance of this achievement lies in <strong>how<\/strong> it was done. Unlike traditional attacks based on Shor\u2019s algorithm and quantum gate computers, the researchers utilized a <strong>quantum annealing system<\/strong>, designed for optimization rather than direct factoring. This shift in approach raises important questions about the timeline for when quantum computers could crack <strong>full-scale RSA encryption<\/strong>, potentially accelerating the threat to current cryptographic standards far sooner than expected.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_Embedded-in-Blog.jpg\" alt=\"Marion Square Quantum Computing and Cybersecurity Blog Embedded Image 2024\" class=\"wp-image-9815\" style=\"width:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_Embedded-in-Blog.jpg 625w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_Embedded-in-Blog-300x300.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_Embedded-in-Blog-150x150.jpg 150w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><\/div>\n\n\n<p>For years, the vulnerability of public key encryption has been understood primarily as a <strong>factoring problem<\/strong>, since the security of encryption algorithms like RSA relies on the difficulty of factoring large composite numbers. <strong>Shor&#8217;s algorithm<\/strong>, widely regarded as the most probable path to breaking public key encryption, is designed specifically to factor these numbers exponentially faster than classical methods, posing a significant future threat to encryption systems. However, in a surprising turn, the international researchers in this recent attack used a <strong>quantum annealing computer<\/strong>, which is designed for <strong>optimization tasks, not factoring<\/strong>. This innovative approach represents a <strong>completely different method<\/strong> of breaking RSA encryption, highlighting that the threat from quantum computing may emerge from unexpected directions, advancing the risk timeline beyond what many experts anticipated.<\/p>\n\n\n\n<p>This breakthrough also underscores the growing versatility of <strong>quantum annealing<\/strong> in solving problems once thought exclusive to gate-based quantum computers. Traditionally, annealing systems have been seen as ideal for <strong>optimization problems<\/strong> in fields such as logistics, material science, and machine learning\u2014not for cryptographic attacks. However, the international researchers effectively re-framed RSA decryption as an optimization challenge, unlocking new potential in <strong>quantum annealing<\/strong>. While quantum annealing computers like D-Wave\u2019s systems were not originally designed for factorization tasks, this achievement raises important questions about their ability to scale to larger key sizes and tackle more complex encryption algorithms. If quantum annealing can be adapted for cryptography at higher levels, it could potentially<strong> shorten the timeline<\/strong> for when quantum computers might become a real-world threat to encryption standards. Though hurdles remain, this new approach widens the scope of quantum threats to cryptographic systems, showing that the race to <strong>quantum-safe encryption<\/strong> may need to accelerate.<\/p>\n\n\n\n<p>In conclusion, this breakthrough in quantum annealing highlights the increasing urgency for federal agencies to prioritize their post-quantum encryption (PQE) transition. The rapid evolution of quantum computing, coupled with the potential for new cryptographic vulnerabilities, underscores the need to meet the milestones set by NSM 10 and OMB 23-02. Agencies that have not yet initiated or fully engaged in this process risk falling behind as quantum advancements accelerate. The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories, and securing appropriate resources are critical first steps. Preparing today will ensure the resilience of federal systems in a quantum-enabled future.<\/p>\n\n\n\n<p><strong><em>To learn about the latest standards set forth by NIST and how Marion Square can support your Quantum Computing and compliance initiatives, view our webinar, <a href=\"https:\/\/vimeo.com\/1024757870\/cec328a683?share=copy\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Marion Square - Quantum Computing Blog - 2024 - Bottom CTA\">&#8220;Mastering NIST PQE Standards: A Guide for Federal Compliance.&#8221;<\/a><\/em><\/strong><\/p>\n<head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\"><\/head>","protected":false},"excerpt":{"rendered":"<p>Last week, international scientists made headlines by successfully cracking a 50-bit RSA encryption integer using D-Wave\u2019s Advantage quantum computer. While it&#8217;s true that a 50-bit key is vastly smaller than the 2048-bit keys used in modern RSA encryption, the significance &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1423],"tags":[946,1486,182],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum Computing&#039;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频<\/title>\n<meta name=\"description\" content=\"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum Computing&#039;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频\" \/>\n<meta property=\"og:description\" content=\"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-05T19:13:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-05T22:20:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1823\" \/>\n\t<meta property=\"og:image:height\" content=\"1323\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The 探花视频 Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The 探花视频 Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\"},\"author\":{\"name\":\"The 探花视频 Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Quantum Computing&#8217;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat\",\"datePublished\":\"2024-11-05T19:13:30+00:00\",\"dateModified\":\"2024-11-05T22:20:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\"},\"wordCount\":535,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg\",\"keywords\":[\"Marion Square\",\"Quantum Computing\",\"RSA\"],\"articleSection\":[\"Cybersecurity\",\"Quantum Computing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\",\"name\":\"Quantum Computing's Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg\",\"datePublished\":\"2024-11-05T19:13:30+00:00\",\"dateModified\":\"2024-11-05T22:20:52+00:00\",\"description\":\"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg\",\"width\":1823,\"height\":1323,\"caption\":\"Marion Square Quantum Computing and Cybersecurity Blog Preview Image 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum Computing&#8217;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The 探花视频 Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The 探花视频 Team\"},\"description\":\"The Digital Media team at 探花视频.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum Computing's Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频","description":"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/","og_locale":"en_US","og_type":"article","og_title":"Quantum Computing's Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频","og_description":"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/","og_site_name":"| 探花视频","article_published_time":"2024-11-05T19:13:30+00:00","article_modified_time":"2024-11-05T22:20:52+00:00","og_image":[{"width":1823,"height":1323,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg","type":"image\/jpeg"}],"author":"The 探花视频 Team","twitter_misc":{"Written by":"The 探花视频 Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/"},"author":{"name":"The 探花视频 Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Quantum Computing&#8217;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat","datePublished":"2024-11-05T19:13:30+00:00","dateModified":"2024-11-05T22:20:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/"},"wordCount":535,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg","keywords":["Marion Square","Quantum Computing","RSA"],"articleSection":["Cybersecurity","Quantum Computing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/","url":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/","name":"Quantum Computing's Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg","datePublished":"2024-11-05T19:13:30+00:00","dateModified":"2024-11-05T22:20:52+00:00","description":"The time to act is now\u2014establishing cryptographic leadership, conducting comprehensive inventories and securing appropriate resources are critical first steps for Quantum literacy.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/10\/Marion-Square-Blog-Quantum-Computing-and-Cybersecurity_875x635.jpg","width":1823,"height":1323,"caption":"Marion Square Quantum Computing and Cybersecurity Blog Preview Image 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/marion-square-quantum-computing-why-government-encryption-standards-face-threats-blog-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Quantum Computing&#8217;s Latest Breakthrough: Why Government Encryption Standards Face a New, Unexpected Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The 探花视频 Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The 探花视频 Team"},"description":"The Digital Media team at 探花视频.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9673"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=9673"}],"version-history":[{"count":5,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9673\/revisions"}],"predecessor-version":[{"id":9816,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9673\/revisions\/9816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9814"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=9673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=9673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=9673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}