{"id":3842,"date":"2015-01-20T23:02:00","date_gmt":"2015-01-21T04:02:00","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3842"},"modified":"2022-11-16T02:38:19","modified_gmt":"2022-11-16T07:38:19","slug":"why-you-should-consider-adopting-biometric-technology-to-replace-passwords","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/","title":{"rendered":"Why you Should Consider Adopting Biometric Technology to Replace Passwords"},"content":{"rendered":"<p style=\"text-align: left;\">Apple released the iPhone 5s in mid-2013 and brought biometric technology into the mainstream through its Touch ID individual identification capabilities. This deployment made some researchers believe that our physical or behavioral traits such as a fingerprint, palm vein, iris, face, or voice print will at some point replace the overused and insecure passwords (e.g. \u2018abcdef\u2019 or \u2018123456\u2019). There are many who believe that as a result of Apple\u2019s Touch ID, individually identifiable physiological characteristics will be the future mode of human authentication.<\/p>\n<p style=\"text-align: left;\">Apple\u2019s entry into the biometrics identity management market could be the tipping point for consumerization of biometric technology leading to the beginning of the end of personal identification numbers (PINs) and passwords.<\/p>\n<h2 style=\"text-align: left;\">Will Biometrics Replace Passwords?<\/h2>\n<p style=\"text-align: left;\">For quite some time, passwords have been the default credential for human authentication. From our personal computers to e-mails, from application software to online banking, passwords are compulsory to authenticate ourselves. In short, passwords are part and parcel of our daily life. Although the use of passwords could be argued as the most commonly used authentication tactic, they have a lot of security and maintenance challenges.<\/p>\n<p style=\"text-align: left;\"><a title=\"Biometric Single Sign On\" href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=m2sys&amp;utm_medium=blog_post&amp;utm_campaign=biometric-replace-passwords\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Biometric authentication<\/strong><\/a> overcomes some of the major challenges we usually observe in a user ID and password based authentication system, but the use of it still raises questions. If your identity is stolen you can easily get a new user ID and password but you can&#8217;t get new fingerprints.<\/p>\n<p style=\"text-align: left;\">Security analysts say user IDs and passwords became out of date and obsolete because they can be easily compromised by freely available online tools, also true for locks and keys of our home. In some cases, a lock and key are adequate for our home security, just as the combination of a user ID and password is adequate protection for our personal computers.<\/p>\n<p style=\"text-align: left;\">However, the answer on which identification method is the most effective lies in the level of risk associated with the theft of the information or data it protects. A thorough risk assessment should be conducted before implementing any authentication system to determine the business impact and costs of a data breach or malicious access. Some high-risk government organizations and large scale businesses are currently deploying biometric authentication systems, where the cost of the breach would be greater than the cost of the deployment. Thus, if a database exists with large amounts of customer information or high-value financial transactions, then biometric technology would be the most appropriate solution after conducting a risk assessment.<\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web API For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Key Features:<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/ Finger-Vein\/ Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=Why+you+Should+Consider+Adopting+Biometric+Technology+to+Replace+Passwords&amp;utm_medium=CloudABIS&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<h2 style=\"text-align: left;\">Pros and Cons of Biometrics<\/h2>\n<p style=\"text-align: left;\">In every aspect, biometric identification is stronger than traditional user ID and password based identification because it cannot be easily compromised by criminals using brute-force computing. It\u2019s nearly impossible for hackers to steal and reverse engineer fingerprint images (a practice routinely done with computer files containing millions of passwords) because all biometric temples stored in a database are protected through strong encryption technology.<\/p>\n<p style=\"text-align: left;\">However, although biometrics offer some advantages over passwords, the technology is not 100% ideal for all environments. For example, a fingerprint scanner can be useless for a person without hands or someone with poor skin integrity.<\/p>\n<p style=\"text-align: left;\">Social, local, or technical issues can also inhibit the mass use of biometric technology. <a title=\"Do Employees Have a Right to Refuse Enrollment in a Biometric System?\" href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=m2sys&amp;utm_medium=blog_post&amp;utm_campaign=biometric-replace-passwords\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Employees might refuse to use biometric identification technology<\/strong><\/a> for background checks or <a title=\"Biometric Time Clock\" href=\"https:\/\/www.m2sys.com\/biometric-single-sign-on-sso-solution\/?utm_source=m2sys&amp;utm_medium=blog_post&amp;utm_campaign=biometric-replace-passwords\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>for more accurate time and attendance<\/strong><\/a>. Sometimes local data security laws stand against the collection or storing biometric data. On the technical side, standards are still evolving, with a number\u2013including some proprietary ones\u2013vying to become the dominant approach to using biometrics for identification.<\/p>\n<h2 style=\"text-align: left;\">Conclusion<\/h2>\n<p style=\"text-align: left;\">Biometrics may slowly get a foothold as the default method of individual identification, but old-fashioned passwords aren&#8217;t fading away any time soon. While we are horrendous when it comes to password management, many companies are equally horrendous when it comes to protecting those passwords. Indeed, biometrics will not replace passwords by tomorrow or next week, but the best security blend of individual identification management is best decided after a thorough risk assessment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple released the iPhone 5s in mid-2013 and brought biometric technology into the mainstream through its Touch ID individual identification<\/p>\n","protected":false},"author":3,"featured_media":16010,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric technology","_yoast_wpseo_title":"Biometric Technology to Replace Passwords","_yoast_wpseo_metadesc":"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1834],"tags":[],"class_list":["post-3842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-workforce-management"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Technology to Replace Passwords<\/title>\n<meta name=\"description\" content=\"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Technology to Replace Passwords\" \/>\n<meta property=\"og:description\" content=\"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-21T04:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-16T07:38:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/01\/Why-you-Should-Consider-Adopting-Biometric-Technology-to-Replace-Passwords.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108\"},\"headline\":\"Why you Should Consider Adopting Biometric Technology to Replace Passwords\",\"datePublished\":\"2015-01-21T04:02:00+00:00\",\"dateModified\":\"2022-11-16T07:38:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\"},\"wordCount\":744,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Workforce Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\",\"name\":\"Biometric Technology to Replace Passwords\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-01-21T04:02:00+00:00\",\"dateModified\":\"2022-11-16T07:38:19+00:00\",\"description\":\"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Why you Should Consider Adopting Biometric Technology to Replace Passwords\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Technology to Replace Passwords","description":"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Technology to Replace Passwords","og_description":"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.","og_url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2015-01-21T04:02:00+00:00","article_modified_time":"2022-11-16T07:38:19+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/01\/Why-you-Should-Consider-Adopting-Biometric-Technology-to-Replace-Passwords.jpg","type":"image\/jpeg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108"},"headline":"Why you Should Consider Adopting Biometric Technology to Replace Passwords","datePublished":"2015-01-21T04:02:00+00:00","dateModified":"2022-11-16T07:38:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/"},"wordCount":744,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Workforce Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/","url":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/","name":"Biometric Technology to Replace Passwords","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-01-21T04:02:00+00:00","dateModified":"2022-11-16T07:38:19+00:00","description":"No longer a thing of the future, biometric technology is replacing passwords in high-security applications like consumer devices.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/workforce-management\/why-you-should-consider-adopting-biometric-technology-to-replace-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Why you Should Consider Adopting Biometric Technology to Replace Passwords"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/cae79e8e2186f64bd965bf91eb8d6108","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3842"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3842"}],"version-history":[{"count":13,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3842\/revisions"}],"predecessor-version":[{"id":15859,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3842\/revisions\/15859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16010"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}