{"id":23737,"date":"2026-04-24T00:36:18","date_gmt":"2026-04-24T04:36:18","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=23737"},"modified":"2026-04-24T00:36:18","modified_gmt":"2026-04-24T04:36:18","slug":"the-future-of-identity-management-is-touchless-and-data-driven","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/","title":{"rendered":"The Future of Identity Management Is Touchless and Data-Driven"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Identity management is no longer restricted to passwords and physical credentials. It is transforming to a system characterized by information, action, and smooth interplay. With the scale of organizations and the growth of digital ecosystems, the necessity of identity verification that is secure and non-obtrusive is increasing. This change is not merely technological but it indicates a broader structural transformation in the definition and control of access.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">The Decline of Friction-Based Security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Conventional authentication systems are user-initiated. It requires entering passwords, scanning cards, and verification of devices. Although these measures offer some level of security, they also add friction to the daily operations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With time, this friction builds up and starts to influence productivity. Employees lose credentials, access slows down the workflow, and security measures progressively become a hindrance as opposed to a protection. Organizations in turn respond by loosening the ropes, making the system even more vulnerable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Touchless identity management decreases this reliance on repeated user input by swapping manual step-by-step verification with passive verification. Systems are able to authenticate users through presence, biometrics, or behavior patterns so access can be granted with minimum disturbance.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Identity as a Continuous Data Stream<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Modern identity systems no longer operate at a single checkpoint. Instead, they function as continuous processes where each interaction contributes to a broader identity profile.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This strategy changes identity from a fixed credential to an evolving dataset. The decisions of access are not determined by what a user knows or has anymore. They are informed based on a user&#8217;s interaction with systems, the area of access sought, and whether behavior aligns with expected patterns.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The model gets finer as time goes by. The more data is gathered, the more accurate it becomes and the risks are spotted earlier. Security ceases to be a reactive process to become a predictive one.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Operational Efficiency Through Integration<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Identity management does not operate in isolation. It intersects with:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Payroll<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Workforce management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Financial systems<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Any disconnect between these systems can easily introduce inefficiencies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Take time tracking as an example. It often relies on manual entries or outdated devices like a time clock. Such processes are prone to inaccuracy and manipulation. Records made are more credible and consistent when identification verification is incorporated in the attendance systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This integration has measurable operational impact. Proper identity information can boost payroll accuracy since the work hours recorded represent the actual activity. It also minimizes manual corrections, which are time-consuming and administrative effort intensive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Financial workflows benefit from the same alignment. Expense reporting, in particular, depends on clear attribution and verifiable data. Systems like <\/span><a href=\"https:\/\/www.data-basics.com\/solutions\/expense-reporting-software\"><span style=\"font-weight: 400;\">DATABASICS expense reporting solutions<\/span><\/a><span style=\"font-weight: 400;\"> operate more effectively when identity verification is embedded into the process, ensuring that submissions are tied to authenticated users and supported by consistent data inputs. This reinforces audit trails to minimize the differences between reporting cycles.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Biometrics and Behavioral Signals<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Touchless systems employ <\/span><a href=\"https:\/\/www.ibm.com\/think\/topics\/behavioral-biometrics\"><span style=\"font-weight: 400;\">biometrics and behavioral analytics<\/span><\/a><span style=\"font-weight: 400;\"> for verification. Facial recognition and fingerprint scanning offer real-time validation, whereas more powerful systems also use behavioral cues.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Typing patterns, navigation habits, and device usage contribute additional layers of validation. These signals are hard to copy and offer constant verification during a session instead of just one entrance point. This layered design minimizes dependence on a single authentication factor. If one of the elements is breached, the system can use other data points to ensure integrity.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Security Without Interruption<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A key advantage of touchless identity systems is their ability to operate without disrupting workflows. Security checks are carried out in the background so users can work without any disturbance.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This directly relates to productivity. Employees spend less time on authentication procedures and more on meaningful tasks. Access becomes immediate while still remaining controlled and traceable.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Meanwhile, administrators gain improved visibility into system activity. Anomalies can be detected in real time and automated responses can be employed to lessen the use of manual intervention.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Data Responsibility and System Design<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With the growing data-driven nature of identity systems, the need to manage such data increases as well. Organizations should make sure that information is stored, processed and safeguarded against abuse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This necessitates structured approach to system design:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data must be encrypted<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access must be tightly controlled<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance requirements should be adhered to\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Transparency is also a key aspect. Users should know how their data is gathered and processed. A well-designed system can balance both security and privacy. It uses data to maximize protection without going beyond what is necessary.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Moving Beyond Legacy Constraints<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Legacy systems are often built around outdated assumptions. They prioritize control over usability and treat identity as a fixed attribute rather than a dynamic construct.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The shift towards modern identity management cannot be accomplished through incremental changes. It entails reconsidering the interaction and flow of data between systems. Companies need to assess if their current infrastructure can accommodate this change or a more comprehensive change is required.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Endnote\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The transition is already underway. Organizations that recognize the limitations of traditional systems are beginning to adopt models that prioritize accuracy, integration, and seamless interaction. Those that continue relying on \u201cgood enough\u201d approaches may find themselves constrained by systems that no longer reflect how work actually happens.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity management is no longer restricted to passwords and physical credentials. It is transforming to a system characterized by information,<\/p>\n","protected":false},"author":383,"featured_media":23738,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-23737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":"","_faq_content":"","_structured_meta_data":"","_tl_dr_content":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Identity management is no longer restricted to passwords and physical credentials. It is transforming to a system characterized by information,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-24T04:36:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2026\/04\/The-Future-of-Identity-Management-Is-Touchless-and-Data-Driven.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/12d831d606e4af6f17fe642c2837232e\"},\"headline\":\"The Future of Identity Management Is Touchless and Data-Driven\",\"datePublished\":\"2026-04-24T04:36:18+00:00\",\"dateModified\":\"2026-04-24T04:36:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\"},\"wordCount\":863,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\",\"name\":\"The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2026-04-24T04:36:18+00:00\",\"dateModified\":\"2026-04-24T04:36:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Future of Identity Management Is Touchless and Data-Driven\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/12d831d606e4af6f17fe642c2837232e\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/","og_locale":"en_US","og_type":"article","og_title":"The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services","og_description":"Identity management is no longer restricted to passwords and physical credentials. It is transforming to a system characterized by information,","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2026-04-24T04:36:18+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2026\/04\/The-Future-of-Identity-Management-Is-Touchless-and-Data-Driven.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/12d831d606e4af6f17fe642c2837232e"},"headline":"The Future of Identity Management Is Touchless and Data-Driven","datePublished":"2026-04-24T04:36:18+00:00","dateModified":"2026-04-24T04:36:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/"},"wordCount":863,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/","name":"The Future of Identity Management Is Touchless and Data-Driven - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2026-04-24T04:36:18+00:00","dateModified":"2026-04-24T04:36:18+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/the-future-of-identity-management-is-touchless-and-data-driven\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Future of Identity Management Is Touchless and Data-Driven"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/12d831d606e4af6f17fe642c2837232e","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/23737"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=23737"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/23737\/revisions"}],"predecessor-version":[{"id":23739,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/23737\/revisions\/23739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/23738"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=23737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=23737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=23737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}