{"id":9762,"date":"2018-08-30T06:55:35","date_gmt":"2018-08-30T10:55:35","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=9762"},"modified":"2021-07-30T04:36:43","modified_gmt":"2021-07-30T08:36:43","slug":"what-are-the-different-types-of-biometric-technology","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/","title":{"rendered":"What are the different types of biometric technology?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the past, most of the government organizations, public and private companies were using paper-based sign-in\/sign-out system to identify employees, contractors, visitors, etc. The paper-based system is obsolete now and replaced with biometric system. Introduction of different types of biometric technology within organizations brings about a highly responsible security system and attendance maintenance solution without significantly increasing the budget. People from various verticals welcomed different types of biometric technology with open arms because of its high level of accuracy and efficiency in preventing identity theft and maintaining employees and visitors attendance records.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Since IDs and passports can be forged, different types of biometric technology not only meets the expectation but also it has exceeded it. Biometric technology is more sophisticated, cleverer, super sensitive and put in place to help protect companies and individuals. Most importantly it is impossible to steal or duplicate as the name suggests biometrics works on biological characteristics of an individual. An individual has two types of biological traits: behavioral and physical.<\/span><\/p>\n<p><strong>Behavioral Biometrics: <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Behavioral biometrics is mostly used for verifying an individual. It can be divided into two types: keystroke recognition and speaker identification.<\/span><\/p>\n<p><strong>Keystroke Recognition: <\/strong><\/p>\n<p><span style=\"font-weight: 400;\">It is highly useful for reducing fraudulent activities like inappropriate email and unethical typing. Because keystroke recognition as the name suggests measures the person\u2019s typing patterns. Computers using keystroke recognition software can identify the improper activities and pushes the message to the right people for them to take proper action.<\/span><\/p>\n<style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/cloudABIS-m2sys-blog-ad.jpg\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>CloudABIS\u2122<\/span><\/h2>\r\n\t\t\t<h3>Web Api For Biometric Authentication<\/h3>\r\n\t\t\t<div class=\"ad-area-head\">Simply connect to our Biometric API to perform fast 1:N Fingerprint\/Finger-Vein\/Iris Recognition<\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=How+Biometrics+on+Smartphones+is+Changing+our+Lives&amp;utm_source=What+are+the+different+types+of+biometric+technology&amp;utm_medium=CloudABIS&amp;utm_campaign=blog+displayAds&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div>\n<p><strong>Voice Recognition:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This types of biometric technology measure an individual\u2019s voice patterns, speaking style, and pitch. It is helpful to find out unknown speaker\u2019s identity thus minimizing threats over phone calls, internet calls, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Physical Biometrics: Physical biometrics is used in identifying and verifying individuals. Physical traits of a human being are so distinct from another that it is impossible to commit crimes like identity theft. There different types of environmental biometric technology and they are briefly discussed below:<\/span><\/p>\n<p><strong>Fingerprint identification:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">One of the oldest forms of identification method is <\/span><a href=\"https:\/\/www.m2sys.com\/easyscan-pro-fingerprint-device\/?utm_source=Blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=M2-EasyScan%20Pro\"><b>fingerprint identification<\/b><\/a><span style=\"font-weight: 400;\">. Its use can be seen widely. From accessing offices to unlock a mobile device, fingerprint identification is the cheapest method and the safest. Fingerprints of different individuals are not the same. Reports suggest that one in a billion can be matched using prints. Like all the other biometrics technology, it identifies and verifies a person\u2019s fingerprint with data saved in it beforehand. Law enforcement agencies, hospitals, and clinics, schools and colleges, gym and fitness centers have adopted the technology to identify and verify individuals rightfully.<\/span><\/p>\n<p><strong>Finger Vein Identification:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">This identification method uses the underneath surface of an individual\u2019s finger. It is found out that every individual\u2019s vein pattern is unique and cannot be matched with others. <\/span><a href=\"https:\/\/www.m2sys.com\/m2-fuseid-multimodal-fingerprint-finger-vein-reader\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=fuseid\"><b>Finger vein identification<\/b><\/a><span style=\"font-weight: 400;\"> is a highly secure method as it is beneath the finger surfaces thus cannot be destroyed or modified.<\/span><\/p>\n<p><strong>Palm Vein Authentication:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Back in 2016, a Japanese Ogaki Kyoritsu Bank has adopted palm vein technology to authenticate all its customers due to its highly responsible security and supersensitivity. It is similar to fingerprint analysis. A camera takes the photo and studies palm prints and other physical traits to uniquely identify a person\u2019s palm.<\/span><\/p>\n<p><strong>Iris Recognition:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">One of the most popular types of biometric technology is iris recognition. It is trending security means in banks and other financial sectors because of its narrow margin of error and fast speed. Iris, an organ can be found in human eyes, remains in a stable structure all throughout life. An <\/span><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=autotilt%20iris\"><b>iris recognition device<\/b><\/a><span style=\"font-weight: 400;\"> utilizes pattern recognition techniques based on high resolution and distortion-free images of the irises and stores the data for future errorless identification and verification.<\/span><\/p>\n<p><strong>Face Recognition:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Once only security sectors are associated with this technology, but now other industries including retail, marketing, and health have adopted the technology with open arms as well. Last year Apple\u2019s iPhone X introduced Face ID which uses faceprint mapped by the phone\u2019s camera. Now a facial recognition device can plan an individual\u2019s facial features mathematically and store the data as a faceprint for future identity verification. For identification, a <\/span><a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system\/?utm_source=blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=cloudabis\"><b>facial recognition matching system<\/b><\/a><span style=\"font-weight: 400;\"> is used.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the past, most of the government organizations, public and private companies were using paper-based sign-in\/sign-out system to identify employees,<\/p>\n","protected":false},"author":399,"featured_media":15847,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"types of biometric technology","_yoast_wpseo_title":"What are the different types of biometric technology?","_yoast_wpseo_metadesc":"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[909,29,718,910,138,50,908],"class_list":["post-9762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-behavioral-biometrics","tag-biometric-technology","tag-face-recognition","tag-finger-vein-identification","tag-fingerprint-identification","tag-iris-recognition","tag-types-of-biometric-technology"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are the different types of biometric technology?<\/title>\n<meta name=\"description\" content=\"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the different types of biometric technology?\" \/>\n<meta property=\"og:description\" content=\"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-30T10:55:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-30T08:36:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/08\/what-are-the-different-types-of-biometric-technology.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Abir Ahmed\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Abir Ahmed\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\"},\"author\":{\"name\":\"Abir Ahmed\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/6dcc15617778036fc60a064402f5ee15\"},\"headline\":\"What are the different types of biometric technology?\",\"datePublished\":\"2018-08-30T10:55:35+00:00\",\"dateModified\":\"2021-07-30T08:36:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\"},\"wordCount\":784,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Behavioral Biometrics\",\"biometric technology\",\"face recognition\",\"Finger Vein Identification\",\"fingerprint identification\",\"Iris recognition\",\"Types of biometric technology\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\",\"name\":\"What are the different types of biometric technology?\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-08-30T10:55:35+00:00\",\"dateModified\":\"2021-07-30T08:36:43+00:00\",\"description\":\"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"What are the different types of biometric technology?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/6dcc15617778036fc60a064402f5ee15\",\"name\":\"Abir Ahmed\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g\",\"caption\":\"Abir Ahmed\"},\"description\":\"Abir Ahmed is a digital strategist who enjoys reading, writing and learning about new technologies, content generating, and the Internet. Also he is pretty good in AAA gaming!\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/abir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the different types of biometric technology?","description":"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/","og_locale":"en_US","og_type":"article","og_title":"What are the different types of biometric technology?","og_description":"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-08-30T10:55:35+00:00","article_modified_time":"2021-07-30T08:36:43+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/08\/what-are-the-different-types-of-biometric-technology.jpg","type":"image\/jpeg"}],"author":"Abir Ahmed","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Abir Ahmed","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/"},"author":{"name":"Abir Ahmed","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/6dcc15617778036fc60a064402f5ee15"},"headline":"What are the different types of biometric technology?","datePublished":"2018-08-30T10:55:35+00:00","dateModified":"2021-07-30T08:36:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/"},"wordCount":784,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Behavioral Biometrics","biometric technology","face recognition","Finger Vein Identification","fingerprint identification","Iris recognition","Types of biometric technology"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/","name":"What are the different types of biometric technology?","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-08-30T10:55:35+00:00","dateModified":"2021-07-30T08:36:43+00:00","description":"People from various verticals welcomed different types of biometric technology, because of its high level of accuracy and efficiency in human identification.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/what-are-the-different-types-of-biometric-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"What are the different types of biometric technology?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/6dcc15617778036fc60a064402f5ee15","name":"Abir Ahmed","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5760d110a9b7811e541bcae6f27372a8?s=96&d=mm&r=g","caption":"Abir Ahmed"},"description":"Abir Ahmed is a digital strategist who enjoys reading, writing and learning about new technologies, content generating, and the Internet. Also he is pretty good in AAA gaming!","url":"https:\/\/www.m2sys.com\/blog\/author\/abir\/"}]}},"modified_by":"Robert Brown","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9762"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/399"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=9762"}],"version-history":[{"count":3,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9762\/revisions"}],"predecessor-version":[{"id":14640,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/9762\/revisions\/14640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15847"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=9762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=9762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=9762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}