{"id":19464,"date":"2023-02-02T06:28:46","date_gmt":"2023-02-02T11:28:46","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=19464"},"modified":"2023-02-02T06:28:46","modified_gmt":"2023-02-02T11:28:46","slug":"facial-recognition-improving-security-measures","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/","title":{"rendered":"Facial Recognition Is Drastically Improving Security Measures"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Facial recognition technology dates back to the 1960s, when techniques relied on manually coding the facial features of each face in a database. The rise of massive databases, automation, complex analytical tools, and machine learning has dramatically expanded this technology&#8217;s capacity and reach.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Facial recognition is now used in various applications, including for unlocking a phone with the user&#8217;s face, diagnosing certain diseases, and tracking lost pets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best-known applications of facial recognition technology is in law enforcement, where it can help agencies find missing people, solve crimes, and monitor large crowds. Facial recognition is a more valid mode of proof for identity verification for social or commercial purposes.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The application of facial recognition<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Facial recognition software is now widely used for various purposes and is vital for security reasons. The following are some of the use cases of facial recognition technology.<\/span><\/p>\n<h3><b>Quick ID verification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using <a href=\"https:\/\/www.m2sys.com\/blog\/biometric-software\/types-of-biometric-software-for-government-projects\/\">face recognition software<\/a> is very important where identity verification is sensitive. These include helping law enforcement identify criminals to verify a person&#8217;s identity for financial transactions. Fast identity verification adds a significant value for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Making transactions<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accessing a secured area<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accessing restricted system<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Identity authentication becomes much more seamless and efficient using biometric data. The additional layer of security provided by <a href=\"https:\/\/en.wikipedia.org\/wiki\/Facial_recognition_system\">facial recognition<\/a> software makes it difficult for fraud to occur.<\/span><\/p>\n<h3><b>Stop buddy punching<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Face recognition will stop proxy attendance. The software can be used by employers to easily track employee attendance and ensure its accurate reporting through a biometric time clock.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, facial recognition can quickly determine which employees are absent. The system can generate virtual employee IDs that are integrated with their biometric facial data. As such, manual attendance tracking is no longer required.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Employers can have confidence in the accuracy of their employee attendance records thanks to face recognition software, which helps maintain operational efficiency.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/success-story-of-chedraui\/\"><span style=\"font-weight: 400;\">Read this case study of how our solution help this Mexican company<\/span><\/a><\/p>\n<h3><b>Enhance public safety<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It also assists law enforcement in quickly identifying suspects and determining whether or not they have a criminal history. Technology can also help speed up and improve the accuracy of criminal investigations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is accomplished by providing law enforcement with detailed individuals\u2019 facial images. In this way, it will not be challenging to identify suspects.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, face recognition software can help a company or organization quickly verify the identity of customers and employees, leading to increased public safety and security. It aids in ensuring that only authorized individuals have access to secure areas.<\/span><\/p>\n<h3><b>Banking securities<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Facial recognition software is rapidly becoming integral to modern banking security systems. This advanced technology adds an extra layer of security for financial institutions, customers, and employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The software ensures safe access to bank services. As a result, it provides an additional layer of security for customers. Any unauthorized or malicious activity is easily detectable. It then helps prevent fraudulent activity and data breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Customers benefit from additional peace of mind when using face recognition. They can be confident that their banking information will be secure.<\/span><\/p>\n<h3><b>Remote ID verification<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With technological advancements, facial ID verification is not dependent on the person&#8217;s geographical location. Employees or users can provide their facial data to verify their identity with a simple mobile application.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Facial recognition: The solution to the perfect crime<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">M2SYS understands the value of security. Hence, the company has been working for over a decade in this industry. Our facial recognition software has paved the way for easy, secure, and efficient resource access. Both <a href=\"https:\/\/gisuser.com\/2022\/07\/blog-title-how-egov-platform-automating-citizen-services\/\">businesses and governments<\/a> can improve their operations by leveraging our cutting-edge facial recognition technology and exploring a better and more secure future. Contact us now, and share your requirements. Our expert team will satisfy you!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facial recognition technology dates back to the 1960s, when techniques relied on manually coding the facial features of each face<\/p>\n","protected":false},"author":433,"featured_media":19465,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Facial Recognition","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[739,1172,29,1994,1995,1997,1956,1315,2002,1996,1999,1882,2000,1957,2001,1998,1926,2003,2004],"class_list":["post-19464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-artificial-intelligence","tag-biometric-data","tag-biometric-technology","tag-border-crossings","tag-eye-sockets","tag-face-detection","tag-face-id","tag-face-recognition-system","tag-face-recognition-technology","tag-faces-in-an-image","tag-facial-features","tag-facial-recognition-software","tag-facial-recognition-system","tag-facial-recognition-technology","tag-large-scale","tag-law-enforcement-agencies","tag-real-time","tag-recognition-database","tag-social-media"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-02T11:28:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Facial-recognition-is-drastically-improving-the-security-measures.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\"},\"author\":{\"name\":\"Rob Jones\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/9f4d691674e0fe67804de8f92fe4f2d7\"},\"headline\":\"Facial Recognition Is Drastically Improving Security Measures\",\"datePublished\":\"2023-02-02T11:28:46+00:00\",\"dateModified\":\"2023-02-02T11:28:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\"},\"wordCount\":622,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"artificial intelligence\",\"biometric data\",\"biometric technology\",\"border crossings\",\"eye sockets\",\"face detection\",\"face id\",\"Face Recognition System\",\"face recognition technology\",\"faces in an image\",\"facial features\",\"facial recognition software\",\"facial recognition system\",\"facial recognition technology\",\"large scale\",\"law enforcement agencies\",\"real time\",\"recognition database\",\"social media\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\",\"name\":\"Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2023-02-02T11:28:46+00:00\",\"dateModified\":\"2023-02-02T11:28:46+00:00\",\"description\":\"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Facial Recognition Is Drastically Improving Security Measures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/9f4d691674e0fe67804de8f92fe4f2d7\",\"name\":\"Rob Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/735b0fd2b081fa0fcdb8fabd0d6a4a0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/735b0fd2b081fa0fcdb8fabd0d6a4a0d?s=96&d=mm&r=g\",\"caption\":\"Rob Jones\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/rafid\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services","description":"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/","og_locale":"en_US","og_type":"article","og_title":"Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services","og_description":"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2023-02-02T11:28:46+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Facial-recognition-is-drastically-improving-the-security-measures.png","type":"image\/png"}],"author":"Rob Jones","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Rob Jones","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/"},"author":{"name":"Rob Jones","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/9f4d691674e0fe67804de8f92fe4f2d7"},"headline":"Facial Recognition Is Drastically Improving Security Measures","datePublished":"2023-02-02T11:28:46+00:00","dateModified":"2023-02-02T11:28:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/"},"wordCount":622,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["artificial intelligence","biometric data","biometric technology","border crossings","eye sockets","face detection","face id","Face Recognition System","face recognition technology","faces in an image","facial features","facial recognition software","facial recognition system","facial recognition technology","large scale","law enforcement agencies","real time","recognition database","social media"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/","name":"Facial Recognition Is Drastically Improving Security Measures - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2023-02-02T11:28:46+00:00","dateModified":"2023-02-02T11:28:46+00:00","description":"Discover how facial recognition technology revolutionizes security by enhancing accuracy and streamlining processes. Learn more!","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/facial-recognition-improving-security-measures\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Facial Recognition Is Drastically Improving Security Measures"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/9f4d691674e0fe67804de8f92fe4f2d7","name":"Rob Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/735b0fd2b081fa0fcdb8fabd0d6a4a0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/735b0fd2b081fa0fcdb8fabd0d6a4a0d?s=96&d=mm&r=g","caption":"Rob Jones"},"url":"https:\/\/www.m2sys.com\/blog\/author\/rafid\/"}]}},"modified_by":"Rob Jones","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19464"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=19464"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19464\/revisions"}],"predecessor-version":[{"id":19466,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19464\/revisions\/19466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/19465"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=19464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=19464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=19464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}