{"id":10525,"date":"2018-12-31T23:10:15","date_gmt":"2019-01-01T04:10:15","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=10525"},"modified":"2025-12-08T01:44:15","modified_gmt":"2025-12-08T06:44:15","slug":"using-biometrics-in-home-security-systems","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/","title":{"rendered":"Using Biometrics in Home Security Systems"},"content":{"rendered":"<p><em><strong>The following guest post on the use of biometrics in home security systems was submitted by\u00a0Chris Ward.<\/strong><\/em><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Home security systems have evolved beyond what we once thought wasn\u2019t even possible. Long gone are the days of a deadbolt being the only line of defense against a potential intruder. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Electronic locks, voice-controlled systems and motion detection have integrated technology into the home defense programs to increase safety, security and efficiency. But like with any industry, there\u2019s always room to get better. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometrics were once a thing of star trek and science fiction novels. Top level security clearance agents gaining access to buildings and rooms with iris scans and fingerprints filled our minds with luster and disbelief. But now, its real, and it\u2019s coming to your home.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10526\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys-500x278.jpg\" alt=\"Using-Biometrics-in-Home-Security-Systems-m2sys\" width=\"831\" height=\"462\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys-500x278.jpg 500w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys-768x427.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys-800x445.jpg 800w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys.jpg 1000w\" sizes=\"(max-width: 831px) 100vw, 831px\" \/><\/p>\n<h3 style=\"text-align: justify;\"><b>Unlocking the Future<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For decades people have lived under the adage \u201clocks are for honest people\u201d. This was simply because a lock on a door had become a mere inconvenience for a skilled invader. Keys were easily duplicated and who doesn\u2019t remember \u201chiding\u201d a key under the doormat or under the gnome in the flower bed? <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Locks were also far from tamper proof; a quick video can teach a twelve-year-old to pick a lock. With the advent of electronic locks, a few of those concerns were removed. These new locks didn\u2019t require keys and were far more difficult to pick, but they still had flaws. A simple pair of binoculars and some patience could allow a potential invader to learn the code. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The goal of biometric security is to make things so personalized that no matter how much effort a thief puts forward, they won\u2019t gain access. A <\/span><a href=\"https:\/\/www.m2sys.com\/easyscan-pro-fingerprint-device\/\"><span style=\"font-weight: 400;\">fingerprint scanner<\/span><\/a><span style=\"font-weight: 400;\"> allows the controller to limit access to a select few. The software rejects latent prints and counterfeits, ensuring that only those with the right credentials can unlock a given door. \u00a0<\/span><\/p>\n<h3 style=\"text-align: justify;\"><b>Seeing the Benefits<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the modern day and age, work isn\u2019t confined to an office building. More and more people are bringing their work home with them and for some, that work needs to be secured. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Before biometrics, that meant locking laptops in desk drawers and keeping your home office secured 24 hours a day. The pain of it all is that it is still your home. Home offices are also where the family finances are handled, kids do their homework and the dog naps. Keeping these rooms locked up and off limits was inconvenient. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Upgrading your home security with products such as an <\/span><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/\"><span style=\"font-weight: 400;\">iris scanner<\/span><\/a><span style=\"font-weight: 400;\"> can limit access to confidential or sensitive information while still keeping your home a home, not a locked down separate office. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Iris scanners can be used to access rooms, computers, and other locking mechanisms. Modern scanners are hygienic, discreet, and dependable while providing the security you need in your home office. <\/span><\/p>\n<h3 style=\"text-align: justify;\"><b>A Touch of Safety<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It\u2019s no secret that the world we live in is a dangerous place. Violent crime, home invasions and muggings still occur on a daily basis, even in the most affluent areas. For many, being a victim is not on their list of goals and they\u2019ve chosen to take the steps to defend themselves and their families. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Although locks, lights, dogs and security systems dissuade a majority of home invasions, sometimes they\u2019re still not enough and someone gets in. In those cases, some choose to turn to offensive measures of defense such as a firearm. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In the United States, that is your right, but it does come with a responsibility to not only be properly trained to use a firearm, but to safely store that firearm. Everyone is all too familiar with the tragic cases of youngsters who found an unsecured firearm and accidentally injured or killed themselves or a friend. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">One of the most common reasons a firearm is not secured is the length of time that common gun safes took to open. When an intruder is making his way towards your or your children\u2019s bedrooms, few people were fast enough to retrieve the case, find the key, fumble with the lock, open the case and get their firearm. That was if they could even find the key or remember the four-digit code of a combination lock. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Modern gun cases are now commonly available with biometric locks that secure the firearm in the most comprehensive way possible while still allowing unmatched speed in unlocking the case. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Finger and palm print scanners only allow a select few to access the firearm. Even with generic lock boxes, the risk remained that a child might find the key or catch a glimpse of the code being punched in. Biometrics eliminate that risk while improving the time that it takes for those who are granted access to open the box. <\/span><\/p>\n<h3 style=\"text-align: justify;\"><b>Ultimate Security<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Even with fingerprint scanners unlocking doors, iris scanners controlling access and firearms to defend your home, sometimes that is not enough.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For those who face constant threats from outside forces or feel that they need an extra level of safeguarding, security guard services such as <\/span> First Security <span style=\"font-weight: 400;\"> can be helpful<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">This private security service offers a multitude of options to further protect your home and life. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">They offer services including:<\/span><\/p>\n<ul style=\"text-align: justify;\">\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Private Security Guards<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Vehicle Patrols<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Alarm Response<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Residential Security<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Body Guards<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">And a variety of other safety and security solutions. <\/span><\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It may seem like an overkill, but if you feel that your safety and security are threatened beyond a scope of what you can handle alone, contacting them could be the key to sleeping peacefully at night. <\/span><\/p>\n<h3 style=\"text-align: justify;\"><b>The World at Your Fingertips<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">For decades, biometric security devices were an expensive luxury afforded to government agencies and wealthy corporations, but now that technology is at the fingertips of the average person. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Integrating biometrics into your home not only keeps you safe but streamlines your personal security. These devices improve efficiency through quick responses and scrutinous software that keeps access to an absolute minimum while providing an ease of use not matched by any other technology on the market. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Investing in biometric products is one of the best choices you can make for yourself and your family. Whether its locking the front door, opening the garage, securing your work files or keeping dangerous weapons out of the hands of those who aren\u2019t permitted to use them, these devices fit anywhere in your life. <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">We believe in never settling and always trying to improve what\u2019s in front of us and we think that adding a layer of bio to your home security would do just that.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following guest post on the use of biometrics in home security systems was submitted by\u00a0Chris Ward. Home security systems<\/p>\n","protected":false},"author":398,"featured_media":10526,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"%%title%% | M2SYS Blog","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[654],"class_list":["post-10525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-home-security"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Using Biometrics in Home Security Systems | M2SYS Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using Biometrics in Home Security Systems | M2SYS Blog\" \/>\n<meta property=\"og:description\" content=\"The following guest post on the use of biometrics in home security systems was submitted by\u00a0Chris Ward. Home security systems\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-01T04:10:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-08T06:44:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"556\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\"},\"headline\":\"Using Biometrics in Home Security Systems\",\"datePublished\":\"2019-01-01T04:10:15+00:00\",\"dateModified\":\"2025-12-08T06:44:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\"},\"wordCount\":1096,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"home security\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\",\"name\":\"Using Biometrics in Home Security Systems | M2SYS Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-01-01T04:10:15+00:00\",\"dateModified\":\"2025-12-08T06:44:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Using Biometrics in Home Security Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using Biometrics in Home Security Systems | M2SYS Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/","og_locale":"en_US","og_type":"article","og_title":"Using Biometrics in Home Security Systems | M2SYS Blog","og_description":"The following guest post on the use of biometrics in home security systems was submitted by\u00a0Chris Ward. Home security systems","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-01-01T04:10:15+00:00","article_modified_time":"2025-12-08T06:44:15+00:00","og_image":[{"width":1000,"height":556,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/Using-Biometrics-in-Home-Security-Systems-m2sys.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0"},"headline":"Using Biometrics in Home Security Systems","datePublished":"2019-01-01T04:10:15+00:00","dateModified":"2025-12-08T06:44:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/"},"wordCount":1096,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["home security"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/","name":"Using Biometrics in Home Security Systems | M2SYS Blog","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-01-01T04:10:15+00:00","dateModified":"2025-12-08T06:44:15+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/using-biometrics-in-home-security-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Using Biometrics in Home Security Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/3ba5457baaa8ae1faa7e086cfbe4acf0","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/10525"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=10525"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/10525\/revisions"}],"predecessor-version":[{"id":13245,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/10525\/revisions\/13245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/10526"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=10525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=10525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=10525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}