{"id":12108,"date":"2019-10-27T22:53:44","date_gmt":"2019-10-28T02:53:44","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12108"},"modified":"2021-08-18T03:43:02","modified_gmt":"2021-08-18T07:43:02","slug":"biometric-identification-as-a-security-measure-for-the-coming-days","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/","title":{"rendered":"Biometric Identification as a Security Measure for the Coming Days"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">We are now living on the edge of the technological revolution. Especially in the last decade, we observed tremendous advancements in technology. For example, ten years ago, most people didn&#8217;t think that biometric identification would be one of the most common features of a smartphone. However, keeping in tune, criminal, and fraudulent activities are also getting new dimensions like identity theft, transaction fraud, cybercrime, or data breach. These threats lead the biometric identification as a security measure for the coming days. Though biometric identification is now a very familiar technology in the business world, the deployed scopes are not enough for the coming days.<\/span><\/p>\n<h2><b>Why Choose Biometric Identification as a Security Measure?<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric identification is recognized as the most secure and accurate method of identification since ancient age. Followings are the reasons behind choosing biometric identification as a security measure for the coming days:<\/span><\/p>\n<h3><b>Securing Identity<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric data is non-transferrable and too complex to forge. There is only one way to get biometric data of an individual, and it is by getting himself or herself. If you are thinking about biometric data spoofing, it&#8217;s too complicated and could be replicated your biometric successfully after several trial and errors. Moreover, liveness detection technology is on the horizon that identifies only live biometric data and denies any artificial objects.<\/span><\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/09\/cloudABIS-banner.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web API for Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Features:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/ Finger-Vein\/ Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Blog&amp;utm_medium=Biometric+Identification+as+a+Security+Measure+for+the+Coming+Days&amp;utm_campaign=Blog+Display+Ads\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<h3><b>Securing Transaction<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Recently synthetic identity fraud has exposed as a severe threat for banking and financial institutions. It&#8217;s a combination of real and fabricated information that doesn&#8217;t belong to anyone. Fraudsters use different personal information like social identification number, name, DOB, address, or of different individuals to create a synthetic I.D. that creates a new user and authenticates a transaction. Using behavioral biometrics for banking transactions can prevent synthetic identity fraud not only matching the credentials but also matching the input pattern.<\/span><\/p>\n<h3><b>Creating Audit Trail<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric identification keeps a record of each authentication with the details of a particular date, time, and terminal. The analytics associated with the biometric system can detect suspicious access easily and enables the authority to take precautions. For example, if an organization maintains a secure database or a particular record room where the access is restricted to the authorized persons only, and anyone access that in an unusual time the analytics will show the event.<\/span><\/p>\n<h3><b>Raising Accountability<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In a biometric identification system, no one is entertained with their access to the designated system or area or workstation without their biometric data. It raises accountability among the employees as they know that their existence is recorded and there is no way to bypass that. It helps an organization to move on establishing an ethical culture among the employees.<\/span><\/p>\n<h3><b>Easy to Deploy<\/b><\/h3>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Now a day implementation of biometric identification is quite affordable. Along with the on-premises system, many vendors are offering Biometrics-as-a-Service that eliminates the burden of managing dedicated I.T. infrastructure and investment in developing a new biometric identification system. Unlike other industry vendors, M2SYS technology offers the <a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Blog&amp;utm_medium=Biometric+Identification+as+a+Security+Measure+for+the+Coming+Days&amp;utm_campaign=Blog+Post\">Biometric API<\/a> that allows the user to integrate a biometric identification system with their web or mobile apps within a few hours.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The above factors indicate that it\u2019s high time to think about biometric identification as a security measure for the coming days and save millions of dollars from being lost due to lack of having an effective security measure.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are now living on the edge of the technological revolution. Especially in the last decade, we observed tremendous advancements<\/p>\n","protected":false},"author":403,"featured_media":16458,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1231],"tags":[],"class_list":["post-12108","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-identification"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"We are now living on the edge of the technological revolution. Especially in the last decade, we observed tremendous advancements\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-28T02:53:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-18T07:43:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/10\/blogbiometric-identification-biometric-identification-as-a-security-measure-for-the-coming-days.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leonardo Sam Waterson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leonardo Sam Waterson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\"},\"author\":{\"name\":\"Leonardo Sam Waterson\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f\"},\"headline\":\"Biometric Identification as a Security Measure for the Coming Days\",\"datePublished\":\"2019-10-28T02:53:44+00:00\",\"dateModified\":\"2021-08-18T07:43:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\"},\"wordCount\":637,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\",\"name\":\"Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2019-10-28T02:53:44+00:00\",\"dateModified\":\"2021-08-18T07:43:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Identification as a Security Measure for the Coming Days\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f\",\"name\":\"Leonardo Sam Waterson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g\",\"caption\":\"Leonardo Sam Waterson\"},\"description\":\"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services","og_description":"We are now living on the edge of the technological revolution. Especially in the last decade, we observed tremendous advancements","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2019-10-28T02:53:44+00:00","article_modified_time":"2021-08-18T07:43:02+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2019\/10\/blogbiometric-identification-biometric-identification-as-a-security-measure-for-the-coming-days.jpg","type":"image\/jpeg"}],"author":"Leonardo Sam Waterson","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Leonardo Sam Waterson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/"},"author":{"name":"Leonardo Sam Waterson","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f"},"headline":"Biometric Identification as a Security Measure for the Coming Days","datePublished":"2019-10-28T02:53:44+00:00","dateModified":"2021-08-18T07:43:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/"},"wordCount":637,"commentCount":3,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/","name":"Biometric Identification as a Security Measure for the Coming Days - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2019-10-28T02:53:44+00:00","dateModified":"2021-08-18T07:43:02+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/biometric-identification-as-a-security-measure-for-the-coming-days\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Identification as a Security Measure for the Coming Days"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/490dff4c8f7aeeff0f69e2935d92ea7f","name":"Leonardo Sam Waterson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/11a76afd5b03bbee17a970fb22316e9f?s=96&d=mm&r=g","caption":"Leonardo Sam Waterson"},"description":"Leonardo Sam Waterson Enthusiastic researcher and blogger working on the uses of latest technology in financial services, health care, govt. project & HRM View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/mahbub\/"}]}},"modified_by":"Linda J. Brannon","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12108"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/403"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12108"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12108\/revisions"}],"predecessor-version":[{"id":16459,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12108\/revisions\/16459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16458"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}