{"id":26349,"date":"2026-01-12T11:22:09","date_gmt":"2026-01-12T11:22:09","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=26349"},"modified":"2026-01-12T11:22:09","modified_gmt":"2026-01-12T11:22:09","slug":"three-fields-and-cybertrust-work-on-video-authenticity-solution","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/","title":{"rendered":"\u30b9\u30ea\u30fc\u30d5\u30a3\u30fc\u30eb\u30ba\u3068\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u304c\u30d3\u30c7\u30aa\u8a8d\u8a3c\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3067\u5354\u696d"},"content":{"rendered":"<p>\u30b9\u30ea\u30fc\u30d5\u30a3\u30fc\u30eb\u30ba\u682a\u5f0f\u4f1a\u793e\u3068\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u682a\u5f0f\u4f1a\u793e\u306f\u3001\u30d3\u30c7\u30aa\u30b3\u30f3\u30c6\u30f3\u30c4\u304c\u672c\u7269\u3067\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3059\u308b\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u958b\u767a\u3059\u308b\u305f\u3081\u306b\u63d0\u643a\u3059\u308b\u3068\u767a\u8868\u3057\u307e\u3057\u305f\u3002\u4e21\u793e\u306f\u3001AI\u304c\u751f\u6210\u3059\u308b\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u6025\u6210\u9577\u306b\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u3002\u30c7\u30b8\u30bf\u30eb\u30b3\u30f3\u30c6\u30f3\u30c4\u304c\u3069\u3053\u304b\u3089\u6765\u305f\u306e\u304b\u3001\u672c\u7269\u304b\u3069\u3046\u304b\u3092\u30c1\u30a7\u30c3\u30af\u3059\u308b\u305f\u3081\u306e\u56fd\u969b\u6a19\u6e96\u3067\u3042\u308bC2PA\u6280\u8853\u3092\u4f7f\u7528\u3059\u308b\u8a08\u753b\u3067\u3059\u3002.<\/p>\n<p>\u3053\u306e\u30a2\u30a4\u30c7\u30a2\u306f <a href=\"https:\/\/www.cybertrust.co.jp\/\">\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u306e<\/a> \u2018iTrust C2PA\u8a3c\u660e\u66f8\u300d\u3068\u30b9\u30ea\u30fc\u30d5\u30a3\u30fc\u30eb\u30ba\u306e\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u300cTStocker\u300d\u306e\u6620\u50cf\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u3044\u3064\u3001\u3069\u3053\u3067\u3001\u3069\u306e\u3088\u3046\u306b\u30d3\u30c7\u30aa\u304c\u64ae\u5f71\u3055\u308c\u3001\u7de8\u96c6\u3055\u308c\u305f\u304b\u3068\u3044\u3046\u60c5\u5831\u304c\u8a18\u9332\u3055\u308c\u307e\u3059\u3002\u305d\u306e\u60c5\u5831\u306f\u7b2c\u4e09\u8005\u304c\u30c1\u30a7\u30c3\u30af\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u305d\u306e\u76ee\u7684\u306f\u3001\u6d88\u8cbb\u8005\u3084\u4f01\u696d\u304c\u52d5\u753b\u304c\u672c\u7269\u304b\u3069\u3046\u304b\u3092\u78ba\u8a8d\u3067\u304d\u308b\u3088\u3046\u306b\u3059\u308b\u3053\u3068\u3067\u3059\u3002\u507d\u30b3\u30f3\u30c6\u30f3\u30c4\u306e\u30ea\u30b9\u30af\u3092\u6e1b\u3089\u3057\u3001\u7523\u696d\u7528\u9014\u306e\u30d3\u30c7\u30aa\u30c7\u30fc\u30bf\u306e\u4fe1\u983c\u6027\u3092\u9ad8\u3081\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n<p>TStocker\u306f\u69d8\u3005\u306a\u30ab\u30e1\u30e9\u30d6\u30e9\u30f3\u30c9\u3068\u5354\u529b\u3057\u3001\u5efa\u8a2d\u3001\u88fd\u9020\u3001\u30a4\u30f3\u30d5\u30e9\u3001\u5730\u65b9\u81ea\u6cbb\u4f53\u306a\u3069\u306e\u696d\u754c\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u5206\u91ce\u3067\u306f\u3001\u5b89\u5168\u3001\u696d\u52d9\u3001\u6cd5\u7684\u306a\u7406\u7531\u304b\u3089\u3001\u4fe1\u983c\u6027\u306e\u9ad8\u3044\u6620\u50cf\u304c\u5fc5\u8981\u3067\u3059\u3002\u3053\u306e\u30b7\u30b9\u30c6\u30e0\u306f\u3001\u7279\u8a31\u53d6\u5f97\u6e08\u307f\u306e\u6280\u8853\u3092\u4f7f\u7528\u3057\u3066\u3001\u51fa\u6240\u60c5\u5831\u3092\u8a18\u9332\u3057\u3001\u30d3\u30c7\u30aa\u3068\u30d7\u30ed\u30fc\u30d6\u30c7\u30fc\u30bf\u306b\u96fb\u5b50\u7f72\u540d\u3092\u8ffd\u52a0\u3057\u307e\u3059\u3002\u5c65\u6b74\u3092\u8ffd\u8de1\u3057\u3001\u6539\u3056\u3093\u3092\u691c\u51fa\u3057\u307e\u3059\u3002.<\/p>\n<h4><strong>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/tomtom-and-soundhound-try-to-fix-in-car-voice-navigation-for-real\/\" rel=\"bookmark\">TomTom\u3068SoundHound\u3001\u8eca\u8f09\u97f3\u58f0\u30ca\u30d3\u30b2\u30fc\u30b7\u30e7\u30f3\u3092\u672c\u683c\u7684\u306b\u4fee\u6b63\u3078<\/a><\/strong><\/h4>\n<p>\u30b5\u30a4\u30d0\u30fc\u30c8\u30e9\u30b9\u30c8\u306f\u3001\u30af\u30e9\u30a6\u30c9\u3092\u901a\u3058\u3066\u9001\u4fe1\u3055\u308c\u308b\u30d3\u30c7\u30aa\u304c\u672c\u7269\u3067\u3042\u308b\u3053\u3068\u3092\u78ba\u8a8d\u3059\u308b\u305f\u3081\u306e\u8a8d\u8a3c\u30c4\u30fc\u30eb\u3068\u8a3c\u660e\u66f8\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u30bf\u30a4\u30e0\u30b9\u30bf\u30f3\u30d7\u3068\u96fb\u5b50\u7f72\u540d\u3092\u4f7f\u7528\u3057\u3066\u3001\u30d3\u30c7\u30aa\u3092\u8a3c\u62e0\u3068\u3057\u3066\u8a8d\u3081\u3089\u308c\u308b\u3088\u3046\u306b\u3057\u307e\u3059\u3002.<\/p>\n<p>\u3053\u306e\u30d1\u30fc\u30c8\u30ca\u30fc\u30b7\u30c3\u30d7\u306f\u3001C2PA\u3092\u30d3\u30c7\u30aa\u30af\u30e9\u30a6\u30c9\u696d\u754c\u5168\u4f53\u306e\u6a19\u6e96\u306b\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002. <a href=\"https:\/\/www.3fls.jp\/\">3\u3064\u306e\u30d5\u30a3\u30fc\u30eb\u30c9<\/a> \u306f\u307e\u305a\u3001\u30d1\u30fc\u30c8\u30ca\u30fc\u4f01\u696d\u306e\u30d3\u30c7\u30aa\u3092\u30c6\u30b9\u30c8\u3057\u3001\u30c7\u30e2\u3092\u5b9f\u65bd\u3057\u3066\u30b7\u30b9\u30c6\u30e0\u3092\u691c\u8a3c\u3057\u307e\u3059\u3002\u305d\u306e\u7d50\u679c\u3092\u3082\u3068\u306b\u30b5\u30fc\u30d3\u30b9\u3092\u6539\u5584\u3057\u3001\u4fe1\u983c\u6027\u306e\u9ad8\u3044\u30d3\u30c7\u30aa\u30fb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u8fc5\u901f\u306b\u5e02\u5834\u306b\u6295\u5165\u3057\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Three Fields Corporation and Cybertrust Corporation said they are teaming up to develop a solution to make sure video content is authentic. They are responding to the fast growth of AI-generated content. The plan is to use C2PA technology, which is an international standard for checking where digital content comes from and whether it is real. The idea is to combine Cybertrust\u2019s \u2018iTrust C2PA Certificate\u2019 with video from Three Fields\u2019 cloud service called \u2018TStocker.\u2019 This will record information about when, where, and how a video was shot and edited. That information can be checked by third parties. The goal is to let consumers and companies verify that videos are real. [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":26346,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[186,208,211,237,206,85],"tags":[218,10802,1909,105,106,10801,10803,5399],"ppma_author":[572],"class_list":{"0":"post-26349","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ai","8":"category-apac","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-ai","14":"tag-c2pa-technology","15":"tag-cybertrust","16":"tag-itbusinesstoday","17":"tag-news","18":"tag-three-fields","19":"tag-video-authenticity-tool","20":"tag-video-content"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Fields and Cybertrust Develop Video Authenticity Tool<\/title>\n<meta name=\"description\" content=\"Three Fields and Cybertrust partner to develop C2PA-based technology to verify the authenticity of AI-generated video content.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Fields and Cybertrust Develop Video Authenticity Tool\" \/>\n<meta property=\"og:description\" content=\"Three Fields and Cybertrust partner to develop C2PA-based technology to verify the authenticity of AI-generated video content.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-12T11:22:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Fields and Cybertrust Develop Video Authenticity Tool","description":"Three Fields and Cybertrust partner to develop C2PA-based technology to verify the authenticity of AI-generated video content.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/","og_locale":"ja_JP","og_type":"article","og_title":"Three Fields and Cybertrust Develop Video Authenticity Tool","og_description":"Three Fields and Cybertrust partner to develop C2PA-based technology to verify the authenticity of AI-generated video content.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/","og_site_name":"itbusinesstoday","article_published_time":"2026-01-12T11:22:09+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Three Fields and Cybertrust Work on Video Authenticity Solution","datePublished":"2026-01-12T11:22:09+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/"},"wordCount":288,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp","keywords":["AI","C2PA technology","Cybertrust","itbusinesstoday","News","Three Fields","Video Authenticity Tool","video content"],"articleSection":["AI","APAC","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/","url":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/","name":"Three Fields and Cybertrust Develop Video Authenticity Tool","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp","datePublished":"2026-01-12T11:22:09+00:00","description":"Three Fields and Cybertrust partner to develop C2PA-based technology to verify the authenticity of AI-generated video content.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/01\/Three-Fields-and-Cybertrust-jointly-develop-a-solution-to-guarantee-the-authenticity-of-video-content.webp","width":1200,"height":800,"caption":"Three Fields and Cybertrust Work on Video Authenticity Solution"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/ai\/three-fields-and-cybertrust-work-on-video-authenticity-solution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Three Fields and Cybertrust Work on Video Authenticity Solution"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/26349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=26349"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/26349\/revisions"}],"predecessor-version":[{"id":26350,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/26349\/revisions\/26350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/26346"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=26349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=26349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=26349"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=26349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}