{"id":3030,"date":"2014-05-28T09:00:19","date_gmt":"2014-05-28T13:00:19","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3030"},"modified":"2022-06-23T01:34:40","modified_gmt":"2022-06-23T05:34:40","slug":"free-podcast-progress-establishing-trusted-identities-cyberspace","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/","title":{"rendered":"Free Podcast &#8211; Progress on Establishing Trusted Identities in Cyberspace"},"content":{"rendered":"<figure id=\"attachment_3031\" aria-describedby=\"caption-attachment-3031\" style=\"width: 128px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/05\/NSTIC-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-3031\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/05\/NSTIC-logo.jpg\" alt=\"NSTIC free podcast on establishing a trusted identity in cyberspace.\" width=\"128\" height=\"128\" \/><\/a><figcaption id=\"caption-attachment-3031\" class=\"wp-caption-text\">Our most recent podcast is an interview with The National Institute for Trusted Identities in Cyberspace (NSTIC) to discuss their work on establishing a &#8220;trusted identity in cyberspace.&#8221;<\/figcaption><\/figure>\n<p>The digitization of our lives has raised demand to establish safer and more secure ways for us to provide accurate identification for online transactions. The need to establish a ubiquitous &#8220;trusted identity&#8221; has set in motion new government initiatives to bring together stakeholders for open discussions on what identification strategies are the most effective and support protection of civil liberties and privacy while promoting interoperability.<\/p>\n<p>Recently, we had the pleasure of interviewing Jim Shiere from the National Institute for Trusted Identities in Cyberspace (NSTIC) to talk about the agency&#8217;s mission and objectives, the work they are doing to foster the creation of that trusted identity, and how they are actively funding several pilot projects that rely on cooperation from otherwise disparate entities to establish more standards-based, secure ways to identify ourselves.<\/p>\n<p>Please take a moment to visit our <strong><a title=\"Link to M2SYS Technology Podcast Web Page\" href=\"https:\/\/www.m2sys.com\/healthcare\/healthcare-biometrics-podcasts\/\" target=\"_blank\" rel=\"noopener noreferrer\">podcast page\u00a0<\/a><\/strong>and download a copy of the<strong> <a title=\"Link to Free Podcast with NSTIC\" href=\"https:\/\/www.m2sys.com\/healthcare\/free-podcast-establishing-trusted-identity-cyberspace\/\" target=\"_blank\" rel=\"noopener noreferrer\">NSTIC podcast<\/a>.\u00a0<\/strong>The podcast covers the following topics:<\/p>\n<ol style=\"color: #5c5b5b;\">\n<li>A background on who NSTIC is, their mission and objectives, and details on the goal of creating an \u201cIdentity Ecosystem.\u201d<\/li>\n<li>What processes and structure are needed to meet the goals of NSTIC?<\/li>\n<li>Why is now the right time to establish a national strategy for trusted identities in cyberspace?<\/li>\n<li>How easy has it become for criminals to steal online identities? Is there a shared, societal cost of identity theft?<\/li>\n<li>How delicate is the balance between creating trusted online identities and the right to privacy and what safeguards are in place to protect it?<\/li>\n<li>The benefits and value of a standards-based trusted identity for patients in healthcare.<\/li>\n<li>How NSTIC is working with the ONC and private entities to advance the initiative of establishing a trusted identity for patients in healthcare.<\/li>\n<li>NIST has interoperable standards for iris, face, and fingerprint biometrics but other forms of biometrics don\u2019t yet have a standard. Would NSTIC ever recommend for an organization that wants to implement an identity credentialing program to select a technology that does not have an interoperable standard? How could a non-standardized identity credential hinder an organization in the future?<\/li>\n<li>As the healthcare industry moves towards a more patient centric model and opens data access to patients through online portals and other tools, what impact could a trusted online identity have on reducing medical identity theft?<\/li>\n<li>What NSTIC is doing at Inova in their AAMVA pilot in terms of \u201cwhat\u2019s next\u201d for patient security and privacy.<\/li>\n<\/ol>\n<p>Understanding more about the steps our federal government is taking to advance the trusted identity in cyberspace initiative is important in order to grasp the challenges faced and the enormity of the task.<\/p>\n<p>Have an idea for a podcast? Email us at: marketing (at) m2sys.com with your ideas!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The digitization of our lives has raised demand to establish safer and more secure ways for us to provide accurate<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"trusted identities in cyberspace","_yoast_wpseo_title":"Establishing Trusted Identities in Cyberspace","_yoast_wpseo_metadesc":"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC's initiatives.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[6,308,455,457,456],"class_list":["post-3030","post","type-post","status-publish","format-standard","hentry","category-biometric-resources","tag-biometrics","tag-interoperability","tag-nstic","tag-trusted-identities-in-cyberspace","tag-trusted-identity"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Establishing Trusted Identities in Cyberspace<\/title>\n<meta name=\"description\" content=\"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC&#039;s initiatives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Establishing Trusted Identities in Cyberspace\" \/>\n<meta property=\"og:description\" content=\"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC&#039;s initiatives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-28T13:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-23T05:34:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/05\/NSTIC-logo.jpg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\"},\"headline\":\"Free Podcast &#8211; Progress on Establishing Trusted Identities in Cyberspace\",\"datePublished\":\"2014-05-28T13:00:19+00:00\",\"dateModified\":\"2022-06-23T05:34:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometrics\",\"interoperability\",\"NSTIC\",\"trusted identities in cyberspace\",\"trusted identity\"],\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\",\"name\":\"Establishing Trusted Identities in Cyberspace\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-05-28T13:00:19+00:00\",\"dateModified\":\"2022-06-23T05:34:40+00:00\",\"description\":\"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC's initiatives.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Free Podcast &#8211; Progress on Establishing Trusted Identities in Cyberspace\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Establishing Trusted Identities in Cyberspace","description":"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC's initiatives.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/","og_locale":"en_US","og_type":"article","og_title":"Establishing Trusted Identities in Cyberspace","og_description":"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC's initiatives.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2014-05-28T13:00:19+00:00","article_modified_time":"2022-06-23T05:34:40+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/05\/NSTIC-logo.jpg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0"},"headline":"Free Podcast &#8211; Progress on Establishing Trusted Identities in Cyberspace","datePublished":"2014-05-28T13:00:19+00:00","dateModified":"2022-06-23T05:34:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometrics","interoperability","NSTIC","trusted identities in cyberspace","trusted identity"],"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/","name":"Establishing Trusted Identities in Cyberspace","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-05-28T13:00:19+00:00","dateModified":"2022-06-23T05:34:40+00:00","description":"The digitization of our lives demands stronger, safer, and more secure ways to establish trusted identities in cyberspace. Learn more about NSTIC's initiatives.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/free-podcast-progress-establishing-trusted-identities-cyberspace\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Free Podcast &#8211; Progress on Establishing Trusted Identities in Cyberspace"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/4cc8f2c4dc917cf314ec00c1d10246d0","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3030"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3030"}],"version-history":[{"count":4,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3030\/revisions"}],"predecessor-version":[{"id":16973,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3030\/revisions\/16973"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}