{"id":9751,"date":"2018-08-26T06:55:55","date_gmt":"2018-08-26T10:55:55","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=9751"},"modified":"2021-07-26T01:59:15","modified_gmt":"2021-07-26T05:59:15","slug":"what-is-biometric-verification-identification-authentication-system","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/","title":{"rendered":"What is biometric verification system?"},"content":{"rendered":"<figure id=\"attachment_9756\" aria-describedby=\"caption-attachment-9756\" style=\"width: 350px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9756\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/08\/what-is-biometric-verification-identification-authentication-system-500x278.png\" alt=\"what-is-biometric-verification-identification-authentication-system\" width=\"350\" height=\"195\"><figcaption id=\"caption-attachment-9756\" class=\"wp-caption-text\"><a href=\"https:\/\/pixabay.com\/en\/fingerprint-daktylogramm-papillary-255900\/\" rel=\"nofollow\">Source<\/a><\/figcaption><\/figure>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified, and it is called biometric verification. To put it, biometric verification or authentication answers the question \u201cwho are you\u201d in both physical or digital scenarios and the system used for it is called a biometric verification system.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">An individual can have different unique identifiers such as fingerprints, finger vein, iris, retina, voice recognition, DNA, hand geometry, earlobe geometry, and signatures. These unique identifiers are impossible to duplicate, forge or steal. Which is why large corporations, small organizations, government or law enforcement agencies are quickly adopting biometric verification technology for safety and security.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">One of the oldest forms of biometric verification is the fingerprint. In ancient China, historians have found out examples of thumbprints being used as a way of individual identification on clay seals. Today\u2019s world with advanced technology in its grasps is the main reason why the biometric verification system has evolved and advanced considerably. With the digitization of analog data &amp; advent of computerized databases, it is now possible for instantaneous individual identification hence providing complete security where needed.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Biometric technology can be operated using vast numbers of applications nowadays and every day more is being constantly invented. This technology is replacing password and PIN-based system at a rapid speed as it provides better security for your online accounts or your devices. Already financial organizations like banks are using iris and retina biometric verification system in ATMs for their users to collect money. Government across the world are adopting biometric technology to prepare and manage the national database. In 2014, Yemen deployed M2SYS technology one of the most exceptional innovation, <\/span><a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis-voter-registration\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=truevoter\"><b>TrueVoter\u2122<\/b><\/a><span style=\"font-weight: 400\"> biometric voting platform for their constitutional referendum and national elections. Biometrics help law and enforcement agencies to fight with crimes and making sensitive places like airport more secure and convenient.<\/span><\/p>\n<p><span style=\"font-weight: 400\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web Api For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>Simply connect to our Biometric API to perform fast 1:N Fingerprint\/Finger-Vein\/Iris Recognition<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=What+is+biometric+verification+system%3F&amp;utm_medium=CloudABIS&amp;utm_medium=CloudABIS%E2%84%A2&amp;utm_campaign=blog+displayAds&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Hospitals and other healthcare facilities are another industry who are quickly integrating biometric technology into their system to help doctors and nurses keep track of patient health records. In the United States, Archbold Memorial Hospital has deployed M2SYS Technology invented <\/span><a href=\"https:\/\/www.rightpatient.com\/\"><b>RightPatient\u00ae<\/b><\/a><span style=\"font-weight: 400\"> patient safety and data integrity solution for the improvement of patient safety and data integrity. The hospital wants to adopt a next-gen biometric patient identification solution that supported the instantaneous search of the patient\u2019s medical record after a first biometric search and also endorsed hospital inspection control. Additionally, educational institutions are deploying biometric verification for the sake of campus security. One of the schools in New Mexico, Sante Fe has implemented a cloud-based biometric visitor management solution, <\/span><a href=\"https:\/\/www.m2sys.com\/visitor-track-biometric-visitor-management-solution\/?utm_source=blog&amp;utm_medium=visitortrack%20landing%20page&amp;utm_campaign=visitortrack\"><b>VisitorTrack\u2122<\/b><\/a><span style=\"font-weight: 400\">, to reduce the stress of traditional visitor management solutions. It is a modern, affordable world-class system that supports fingerprint, finger vein, face and iris recognition. Signature verification is not as much reliable as other biometric verification techniques, but it gives you an extra layer of verification when used in conjunction with one or more methods.<\/span><\/p>\n<p style=\"text-align: justify\"><span style=\"font-weight: 400\">Once, biometric technology can only be seen in sci-fi movies, but now its usage is everywhere. Biometric technology is very much affordable today, and it can be easily integrated with existing systems. Get all the latest information regarding deployment of biometric verification system by visiting our M2SYS Blog biometric case study section.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified, and it<\/p>\n","protected":false},"author":399,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometric verification system","_yoast_wpseo_title":"What is Biometric Verification System?","_yoast_wpseo_metadesc":"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[566,291,904,905],"class_list":["post-9751","post","type-post","status-publish","format-standard","hentry","category-biometric-resources","tag-biometric-authentication","tag-biometric-identification","tag-biometric-verification","tag-biometric-verification-system"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Biometric Verification System?<\/title>\n<meta name=\"description\" content=\"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Biometric Verification System?\" \/>\n<meta property=\"og:description\" content=\"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-26T10:55:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-26T05:59:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/08\/what-is-biometric-verification-identification-authentication-system-500x278.png\" \/>\n<meta name=\"author\" content=\"Abir Ahmed\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abir Ahmed\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\"},\"author\":{\"name\":\"Abir Ahmed\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9abaf1c1499ae37d7dd476bd7479a42\"},\"headline\":\"What is biometric verification system?\",\"datePublished\":\"2018-08-26T10:55:55+00:00\",\"dateModified\":\"2021-07-26T05:59:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\"},\"wordCount\":633,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Biometric Authentication\",\"biometric identification\",\"biometric verification\",\"biometric verification system\"],\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\",\"name\":\"What is Biometric Verification System?\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-08-26T10:55:55+00:00\",\"dateModified\":\"2021-07-26T05:59:15+00:00\",\"description\":\"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"What is biometric verification system?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9abaf1c1499ae37d7dd476bd7479a42\",\"name\":\"Abir Ahmed\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g\",\"caption\":\"Abir Ahmed\"},\"description\":\"Abir Ahmed is a digital strategist who enjoys reading, writing and learning about new technologies, content generating, and the Internet. Also he is pretty good in AAA gaming!\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/abir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Biometric Verification System?","description":"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/","og_locale":"en_US","og_type":"article","og_title":"What is Biometric Verification System?","og_description":"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-08-26T10:55:55+00:00","article_modified_time":"2021-07-26T05:59:15+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/08\/what-is-biometric-verification-identification-authentication-system-500x278.png"}],"author":"Abir Ahmed","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Abir Ahmed","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/"},"author":{"name":"Abir Ahmed","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9abaf1c1499ae37d7dd476bd7479a42"},"headline":"What is biometric verification system?","datePublished":"2018-08-26T10:55:55+00:00","dateModified":"2021-07-26T05:59:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/"},"wordCount":633,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Biometric Authentication","biometric identification","biometric verification","biometric verification system"],"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/","name":"What is Biometric Verification System?","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-08-26T10:55:55+00:00","dateModified":"2021-07-26T05:59:15+00:00","description":"Every individual has one or more distinguishing biological traits. Evaluating these traits, an individual can be uniquely identified and it is called biometric verification.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/what-is-biometric-verification-identification-authentication-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"What is biometric verification system?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/c9abaf1c1499ae37d7dd476bd7479a42","name":"Abir Ahmed","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g","caption":"Abir Ahmed"},"description":"Abir Ahmed is a digital strategist who enjoys reading, writing and learning about new technologies, content generating, and the Internet. Also he is pretty good in AAA gaming!","url":"https:\/\/www.m2sys.com\/blog\/author\/abir\/"}]}},"modified_by":"Robert Brown","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9751"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/399"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=9751"}],"version-history":[{"count":6,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9751\/revisions"}],"predecessor-version":[{"id":15550,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9751\/revisions\/15550"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=9751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=9751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=9751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}