{"id":1449,"date":"2025-05-30T08:21:08","date_gmt":"2025-05-30T02:51:08","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1449"},"modified":"2025-10-22T14:50:32","modified_gmt":"2025-10-22T09:20:32","slug":"what-analytics-can-we-run-for-a-biometric-solution-and-its-associated-portal-part-1collated-with-help-of-ai","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2025\/05\/what-analytics-can-we-run-for-a-biometric-solution-and-its-associated-portal-part-1collated-with-help-of-ai\/","title":{"rendered":"What analytics can we run for a biometric solution and it&#8217;s associated portal? &#8211; Part 1(Collated with help of AI)"},"content":{"rendered":"\n<p>Running analytics for a <strong>biometric solution and its associated portal<\/strong> involves monitoring both <strong>technical performance<\/strong> and <strong>user interaction<\/strong>, along with <strong>security and compliance metrics<\/strong>. Below is a categorized list of analytics you can track:<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udd10 <strong>1. Biometric System Analytics<\/strong><\/h3>\n\n\n\n<p>These metrics assess how the biometric engine performs:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Enrollment Metrics<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Total biometric enrollments (face, fingerprint, iris, etc.)<\/li>\n\n\n\n<li>Enrollment failure rate<\/li>\n\n\n\n<li>Average time to enroll a user<\/li>\n\n\n\n<li>Device-specific enrollment issues<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Authentication Metrics<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Total authentication attempts<\/li>\n\n\n\n<li>Success vs failure rates<\/li>\n\n\n\n<li>False Acceptance Rate (FAR)<\/li>\n\n\n\n<li>False Rejection Rate (FRR)<\/li>\n\n\n\n<li>Equal Error Rate (EER)<\/li>\n\n\n\n<li>Average authentication time<\/li>\n\n\n\n<li>Spoof detection triggers<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Matching Metrics<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>1:1 vs 1:N match volumes<\/li>\n\n\n\n<li>Average match score<\/li>\n\n\n\n<li>Latency per match request<\/li>\n\n\n\n<li>Match attempt frequency per user\/session<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Sensor &amp; Device Health<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Device availability uptime\/downtime<\/li>\n\n\n\n<li>Hardware error rates (e.g., fingerprint reader failure)<\/li>\n\n\n\n<li>Sensor calibration statistics<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83c\udf10 <strong>2. Portal Usage Analytics<\/strong><\/h3>\n\n\n\n<p>These focus on user behavior and performance of the associated portal (typically web or mobile).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>User Activity<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Daily\/weekly\/monthly active users (DAU\/WAU\/MAU)<\/li>\n\n\n\n<li>Session duration &amp; frequency<\/li>\n\n\n\n<li>Drop-off points in workflows (e.g., login, KYC)<\/li>\n\n\n\n<li>Most\/least used features<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Traffic &amp; Load<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Peak load hours<\/li>\n\n\n\n<li>Device\/browser types<\/li>\n\n\n\n<li>Geo-location of users<\/li>\n\n\n\n<li>Load time per page\/function<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>User Journeys<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Path to successful biometric authentication<\/li>\n\n\n\n<li>Clickstream analysis<\/li>\n\n\n\n<li>Abandonment during biometric prompts<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udee1\ufe0f <strong>3. Security &amp; Compliance Analytics<\/strong><\/h3>\n\n\n\n<p>For regulatory and threat analysis:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Security Events<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anomalous login attempts<\/li>\n\n\n\n<li>Biometric spoofing detection rate<\/li>\n\n\n\n<li>MFA bypass attempts<\/li>\n\n\n\n<li>Failed logins with high match scores (possible fraud)<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Audit Trails<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Who accessed biometric templates or logs<\/li>\n\n\n\n<li>Time-stamped logs for enrollment, authentication, and data access<\/li>\n\n\n\n<li>Data retention and deletion compliance logs<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Compliance Monitoring<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>GDPR, DPDP (India), HIPAA (if healthcare), etc. adherence<\/li>\n\n\n\n<li>Consent capture analytics<\/li>\n\n\n\n<li>Data subject request trends (e.g., deletion requests)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udcca <strong>4. System Performance Analytics<\/strong><\/h3>\n\n\n\n<p>This helps DevOps and product teams:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>API response times (for biometric calls)<\/li>\n\n\n\n<li>Timeout and retry statistics<\/li>\n\n\n\n<li>Load balancing effectiveness<\/li>\n\n\n\n<li>Failover incidents<\/li>\n\n\n\n<li>Resource utilization (RAM, CPU, Disk)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udcc8 <strong>5. Business Intelligence Metrics<\/strong><\/h3>\n\n\n\n<p>Useful for decision-makers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cost per authentication event<\/li>\n\n\n\n<li>Cost savings from fraud prevention<\/li>\n\n\n\n<li>Enrollment-to-usage conversion rate<\/li>\n\n\n\n<li>Impact on customer onboarding time<\/li>\n\n\n\n<li>SLA adherence metrics (e.g., &lt;2s authentication time)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">\u2705 Tools You Can Use<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Portal analytics<\/strong>: Google Analytics, Matomo, Mixpanel<\/li>\n\n\n\n<li><strong>Biometric performance<\/strong>: Custom dashboards (Grafana, Kibana) integrated with biometric SDK logs<\/li>\n\n\n\n<li><strong>Security &amp; audit<\/strong>: SIEM tools (Splunk, ELK Stack, QRadar)<\/li>\n\n\n\n<li><strong>Compliance<\/strong>: TrustArc, OneTrust, or custom reporting<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\">Neil@HarwaniSytems.in<\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\">www.HarwaniSystems.in<\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\">www.TechAndTrain.com\/blog<\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\">Neil Harwani | LinkedIn<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Running analytics for a biometric solution and its associated portal involves monitoring both technical performance and user interaction, along with [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1450,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[437],"tags":[438,365],"class_list":["post-1449","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometrics","tag-biometrics","tag-portals"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/05\/Biometrics-1.jpg?fit=1280%2C768&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-nn","jetpack-related-posts":[{"id":1494,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/10\/cyber-security-notes-for-2025-part-4\/","url_meta":{"origin":1449,"position":0},"title":"Cyber Security notes for 2025 &#8211; Part 4","author":"Neil Harwani","date":"October 22, 2025","format":false,"excerpt":"Further to my four Cyber Security notes here: Information security tips while working with digital sources and internet | LinkedIn Security tips for Google Drive & Android | LinkedIn Facebook Privacy & Security tips | LinkedIn Post on patterns, anti-patterns & randomness in Cyber Security | LinkedIn Below I am\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1200%2C1200&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":551,"url":"https:\/\/www.techandtrain.com\/blog\/2020\/02\/three-waves-of-analytics-notes-on-articles-by-prof-davenport\/","url_meta":{"origin":1449,"position":1},"title":"Three waves of Analytics \u2013 Notes on articles by Prof. Davenport","author":"Neil Harwani","date":"February 13, 2020","format":false,"excerpt":"References: Analytics 3.0How Analytics Has Changed in the Last 10 Years (and How It\u2019s Stayed the Same) ANALYTICS 1.0 - Business Intelligence, RDBMS & Data Warehousing Vertical scalingBetter results and analysis meant higher processing power & memoryComplex systemsChances of singular failureBackup was compulsoryStorage in RDBMSTransformation in business dimensions and facts\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Analytics.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Analytics.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Analytics.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Analytics.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2020\/02\/Analytics.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":131,"url":"https:\/\/www.techandtrain.com\/blog\/2017\/11\/bpm-business-process-management-and-trends\/","url_meta":{"origin":1449,"position":2},"title":"BPM (Business Process Management) and trends","author":"Neil Harwani","date":"November 6, 2017","format":false,"excerpt":"Business process management from 1990s \/ 2000s in simplest terms is a set of activities (automated or manual) with breaks for events and interactions with external systems \/ human beings along with notifications \/ rules \/ filters \/ etc. Traditional BPM \/ Workflows included manual and automated tasks, integrations (mainly\u2026","rel":"","context":"In &quot;Enterprise Content Management&quot;","block_context":{"text":"Enterprise Content Management","link":"https:\/\/www.techandtrain.com\/blog\/category\/enterprise-content-management\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2017\/11\/BPM.jpg?fit=1080%2C720&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":336,"url":"https:\/\/www.techandtrain.com\/blog\/2018\/08\/universities-colleges-offering-courses-degrees-in-analytics-data-science-in-india-part-1\/","url_meta":{"origin":1449,"position":3},"title":"Universities &#038; Colleges offering courses &#038; degrees in Analytics \/ Data Science in India &#8211; Part 1","author":"Neil Harwani","date":"August 14, 2018","format":false,"excerpt":"BITS Pilani - Offering MSc in Analytics, MTech in Computer Science with specialization in Analytics IIM Calcutta, ISI Kolkata & IIT Kharagpur - PG Diploma in Business Analytics Great Lakes, Chennai - PGP in Analytics IIIT Bangalore - PGP in Analytics via UpGrad XLRI - Executive Program in Data Science\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/08\/Analytics-3.png?fit=1200%2C1047&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/08\/Analytics-3.png?fit=1200%2C1047&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/08\/Analytics-3.png?fit=1200%2C1047&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/08\/Analytics-3.png?fit=1200%2C1047&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2018\/08\/Analytics-3.png?fit=1200%2C1047&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1288,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/08\/learnings-from-emasters-data-science-for-decision-making-iit-gandhinagar-part-1\/","url_meta":{"origin":1449,"position":4},"title":"Learnings from eMasters Data Science for Decision Making &#8211; IIT Gandhinagar &#8211; Part 1","author":"Neil Harwani","date":"August 11, 2024","format":false,"excerpt":"Below are the learnings from eMasters Data Science for Decision Making - IIT Gandhinagar - Part 1. This needs to be an article in itself. You can find more details here about eDSDM here: e-Masters | IITGNX There is Mathematics for your AIML problem in feature engineering, preprocessing, evaluation metrics,\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/DataScience.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/DataScience.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/DataScience.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/DataScience.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/08\/DataScience.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":417,"url":"https:\/\/www.techandtrain.com\/blog\/2019\/02\/what-should-be-the-subjects-course-structure-for-teaching-data-analytics-data-science-in-mba\/","url_meta":{"origin":1449,"position":5},"title":"What should be the subjects &#038; course structure for teaching Data Analytics \/ Data Science in MBA?","author":"Neil Harwani","date":"February 12, 2019","format":false,"excerpt":"Data Science & Analytics including Operations \/ Decision Science are evolving fields which are in demand currently for various reasons. Most companies are experimenting and creating projects \/ products around analytics \/ data science. I am listing the subjects & courses that an MBA student should take to cover Data\u2026","rel":"","context":"In &quot;Analytics&quot;","block_context":{"text":"Analytics","link":"https:\/\/www.techandtrain.com\/blog\/category\/analytics\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/02\/Analytics2.jpg?fit=960%2C635&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/02\/Analytics2.jpg?fit=960%2C635&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/02\/Analytics2.jpg?fit=960%2C635&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2019\/02\/Analytics2.jpg?fit=960%2C635&ssl=1&resize=700%2C400 2x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1449"}],"version-history":[{"count":1,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1449\/revisions"}],"predecessor-version":[{"id":1451,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1449\/revisions\/1451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1450"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}