{"id":19,"date":"2023-11-30T05:38:00","date_gmt":"2023-11-30T05:38:00","guid":{"rendered":""},"modified":"2024-10-15T08:20:05","modified_gmt":"2024-10-15T08:20:05","slug":"the-dead-end-in-the-security-industry","status":"publish","type":"post","link":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/","title":{"rendered":"The Dead End in the Security Industry"},"content":{"rendered":"<p>Attendees of this year&#8217;s largest security exhibition in China, CPSE, held in Shenzhen, expressed a common sentiment: a noticeable absence of groundbreaking technological innovations. This observation isn&#8217;t surprising.<\/p>\n<p>Presently, there is a burgeoning trend advocating for the integration of artificial intelligence (AI) into all products. Regrettably, the AI surge within the realm of security industry predominantly centers on visual or image processing technology. This surge had its zenith during the era of China&#8217;s AI Four Little Dragons: SenseTime, Megvii, Yitu, and CloudWalk. However, developments in image processing for CCTV monitoring, license plate recognition, fingerprints, and facial recognition have reached a maturity stage, with subsequent innovations being incremental.<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"clear: left; float: left; margin-bottom: 1em; margin-right: 1em;\" href=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/image01.png\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/image01.png\" width=\"120\" height=\"120\" border=\"0\" data-original-height=\"120\" data-original-width=\"120\" \/><\/a><\/div>\n<p>The upcoming AI trend is pivoting towards text-based technologies, exemplified by systems like ChatGPT and large-scale language models (LLM). Yet, this transition encounters a hurdle in the security industry due to its reliance on big data, with the valuable data primarily derived from images rather than text. Scenarios demanding substantial amounts of text are rare in the security sector.<\/p>\n<p>Moreover, security products, despite their breadth, inherently possess limitations\u2014they operate at the periphery and cannot infiltrate a client&#8217;s core operations. For instance, surveillance, access control, smart lock and other security measures provide peripheral defense, ensuring safety but not delving into the client&#8217;s core business operations. The data generated by security systems is, therefore, not inherently valuable to the businesses they serve. Consequently, the next AI trend appears to be outside the purview of the security industry.<\/p>\n<p>Unless the security industry is willing to dismantle its barriers, draw lessons from tech giants, and transcend its traditional boundaries during the era of digital transformation, it will struggle to create significant development space. This is exemplified by the conspicuous absence of the world&#8217;s largest surveillance manufacturer, Hikvision, from the exhibition. Internal sources revealed that the security content was insufficient to cover its existing product portfolio.<\/p>\n<div style=\"clear: both; text-align: center;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/image2.jpg\"><img decoding=\"async\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/image2-300x203.jpg\" border=\"0\" data-original-height=\"678\" data-original-width=\"1000\" \/><\/a><\/div>\n<p>The digital age offers a unique opportunity for industries: the flow of data across various scenarios, activities, and fields. As <a href=\"https:\/\/www.fingertec.com\/\" target=\"_blank\" rel=\"noopener\">FingerTec<\/a>, our flagship product, initially emphasized security through irreplaceable fingerprints, we evolved in the <a href=\"https:\/\/www.timeteccloud.com\/\" target=\"_blank\" rel=\"noopener\">TimeTec<\/a> era into a comprehensive HR ecosystem. Similarly, FingerTec, initially focused on fingerprint-based access control systems replacing RFID cards, has transformed into a smart township ecosystem covering core aspects of property management. The extracted data is now invaluable to businesses, enabling them to analyze and enhance processes and services, thereby boosting productivity.<\/p>\n<p>As the security exhibition progresses, mirroring the industry&#8217;s trajectory, it is poised to enter a contraction stage. Only by capitalizing on the opportunities presented by digitization can industry players break through the deadlock and usher in the next era of brilliance.<\/p>\n<div style=\"text-align: left;\">\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">\u00a0<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">\u00a0<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">About Author:<br \/>\n<\/span><\/span><\/div>\n<div style=\"clear: both; text-align: center;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><a style=\"margin-left: 1em; margin-right: 1em;\" href=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/01\/image2.jpg\"><img decoding=\"async\" src=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/01\/image2-300x101.jpg\" border=\"0\" data-original-height=\"215\" data-original-width=\"640\" \/><\/a><\/span><\/span><\/div>\n<p><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">Teh<br \/>\nHon Seng, Group CEO of TimeTec Group of Companies. Prior to forming<br \/>\nTimeTec, Teh led PUC Founder (MSC) Bhd to be listed on MESDAQ (ACE)<br \/>\nmarket of Bursa Malaysia in 2002. Teh initiated the R&amp;D in<br \/>\nfingerprint technology in 2000, which later developed into a renowned<br \/>\nglobal brand for commercial fingerprint product known as FingerTec. In<br \/>\n2008, he foresaw the trend of cloud computing and mobile technology, and<br \/>\nover the years, he had strategically diversified and transformed its<br \/>\nbiometric-focused products into a suite of cloud solutions that aimed at<br \/>\nworkforce management and security industries including smart<br \/>\ncommunities and digital building system that centered around the cloud<br \/>\necosystem. Teh has more than 20 patents to his name, and he is also a<br \/>\ncolumnist in a local newspaper and a writer of several books.<\/span><\/span><\/p>\n<p><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\"><br \/>\n<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><b><span style=\"color: #3d85c6; font-size: x-large;\">About TimeTec<\/span><\/b><span style=\"font-size: medium;\">\u00a0<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">TimeTec Group was established in 2000. Over 20 years, the Group had developed three homegrown globally recognized IT brands, <a href=\"https:\/\/www.fingertec.com\/\" target=\"_blank\" rel=\"noopener\">FingerTec<\/a>, <a href=\"https:\/\/www.timeteccloud.com\/\" target=\"_blank\" rel=\"noopener\">TimeTec <\/a>and <a href=\"https:\/\/www.i-neighbour.com\/\" target=\"_blank\" rel=\"noopener\">iNeighbour<\/a>,<br \/>\nfor workforce management, security, smart office, smart residential and<br \/>\nsmart township solutions unleashing the power of biometrics, cloud<br \/>\n&amp; edge computing, IoT and AI technologies. All these solutions<br \/>\nconnect and change the landscape of work life and home life in a larger<br \/>\necosystem. Through a vast network, TimeTec Group distributes its<br \/>\nbiometric hardware products and 16 cloud applications, including IoT<br \/>\ndevices, to more than 150 countries worldwide. Visit our company<br \/>\nwebsites: <a href=\"https:\/\/www.timeteccloud.com\/\" target=\"_blank\" rel=\"noopener\">TimeTec Cloud<\/a>, <a href=\"https:\/\/www.timeteccloud.com\/building\/\" target=\"_blank\" rel=\"noopener\">TimeTec Building<\/a>, <a href=\"https:\/\/www.timeteccloud.com\/parking\/\" target=\"_blank\" rel=\"noopener\">TimeTec Parking<\/a>.<\/span><br \/>\n<\/span><\/p>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">\u00a0<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">Various<br \/>\nrenowned clients have subscribed to TimeTec various solutions,<br \/>\nincluding Technology Park Malaysia, IOI Properties, Putrajaya Holdings,<br \/>\nIbraco, Binastra, Thriven, Hock Seng Lee, QSR Brands, Central Sugars<br \/>\nRefinery CSR, Sunway Constructions, Mamee, Yakult, Nano Malaysia Berhad,<br \/>\nand many more. The versatility and feasibility of TimeTec products also<br \/>\nattract various international customers from all over the world,<br \/>\nincluding Hong Kong, Dubai, Australia, Qatar, South Africa etc.<br \/>\n<\/span><\/span><\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">\u00a0<\/span><\/span><\/div>\n<div style=\"text-align: center;\"><span style=\"font-family: Roboto;\"><span style=\"font-size: medium;\">03-8070 9933\u00a0 \u00a0 \u00a0|\u00a0 \u00a0 \u00a0<a href=\"mailto:info@timeteccloud.com\">Email<\/a>\u00a0 \u00a0 \u00a0|\u00a0 \u00a0 \u00a0<a href=\"https:\/\/www.timeteccloud.com\/\" target=\"_blank\" rel=\"noopener\">www.timeteccloud.com<\/a>\u00a0 \u00a0 \u00a0|\u00a0 \u00a0 \u00a0<a href=\"https:\/\/www.timeteccloud.com\/interest_form\" target=\"_blank\" rel=\"noopener\">Interest Form<\/a><\/span><\/span><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Attendees of this year&#8217;s largest security exhibition in China, CPSE, held in Shenzhen, expressed a common sentiment: a noticeable absence of groundbreaking technological innovations. This [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[475],"tags":[288,289,291,286,290,231],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Dead End in the Security Industry<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Dead End in the Security Industry\" \/>\n<meta property=\"og:description\" content=\"Attendees of this year&#8217;s largest security exhibition in China, CPSE, held in Shenzhen, expressed a common sentiment: a noticeable absence of groundbreaking technological innovations. This [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-30T05:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-15T08:20:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TimeTec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TimeTec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\"},\"author\":{\"name\":\"TimeTec\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5\"},\"headline\":\"The Dead End in the Security Industry\",\"datePublished\":\"2023-11-30T05:38:00+00:00\",\"dateModified\":\"2024-10-15T08:20:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\"},\"wordCount\":746,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg\",\"keywords\":[\"AI\",\"Digital Age\",\"Ecosystem\",\"Security\",\"Smart Township\",\"TimeTec\"],\"articleSection\":[\"Others\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\",\"name\":\"The Dead End in the Security Industry\",\"isPartOf\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg\",\"datePublished\":\"2023-11-30T05:38:00+00:00\",\"dateModified\":\"2024-10-15T08:20:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.timeteccloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dead End in the Security Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#website\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"name\":\"TimeTec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#organization\",\"name\":\"TimeTec\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"contentUrl\":\"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png\",\"width\":1000,\"height\":313,\"caption\":\"TimeTec\"},\"image\":{\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5\",\"name\":\"TimeTec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"TimeTec\"},\"url\":\"https:\/\/www.timeteccloud.com\/blog\/author\/timetec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Dead End in the Security Industry","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/","og_locale":"en_US","og_type":"article","og_title":"The Dead End in the Security Industry","og_description":"Attendees of this year&#8217;s largest security exhibition in China, CPSE, held in Shenzhen, expressed a common sentiment: a noticeable absence of groundbreaking technological innovations. This [&hellip;]","og_url":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/","article_published_time":"2023-11-30T05:38:00+00:00","article_modified_time":"2024-10-15T08:20:05+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg","type":"image\/jpeg"}],"author":"TimeTec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"TimeTec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#article","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/"},"author":{"name":"TimeTec","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5"},"headline":"The Dead End in the Security Industry","datePublished":"2023-11-30T05:38:00+00:00","dateModified":"2024-10-15T08:20:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/"},"wordCount":746,"commentCount":0,"publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg","keywords":["AI","Digital Age","Ecosystem","Security","Smart Township","TimeTec"],"articleSection":["Others"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/","url":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/","name":"The Dead End in the Security Industry","isPartOf":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg","datePublished":"2023-11-30T05:38:00+00:00","dateModified":"2024-10-15T08:20:05+00:00","breadcrumb":{"@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#primaryimage","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2023\/11\/header.jpg","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.timeteccloud.com\/blog\/the-dead-end-in-the-security-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.timeteccloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Dead End in the Security Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.timeteccloud.com\/blog\/#website","url":"https:\/\/www.timeteccloud.com\/blog\/","name":"TimeTec","description":"","publisher":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.timeteccloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.timeteccloud.com\/blog\/#organization","name":"TimeTec","url":"https:\/\/www.timeteccloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","contentUrl":"https:\/\/www.timeteccloud.com\/blog\/wp-content\/uploads\/2024\/08\/sw-timetecweb-1000x.png","width":1000,"height":313,"caption":"TimeTec"},"image":{"@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/adaf3b42a2df0a10d3661ff6a2f778f5","name":"TimeTec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.timeteccloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"TimeTec"},"url":"https:\/\/www.timeteccloud.com\/blog\/author\/timetec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/19"}],"collection":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/comments?post=19"}],"version-history":[{"count":3,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/19\/revisions"}],"predecessor-version":[{"id":303,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/posts\/19\/revisions\/303"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media\/197"}],"wp:attachment":[{"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/media?parent=19"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/categories?post=19"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.timeteccloud.com\/blog\/wp-json\/wp\/v2\/tags?post=19"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}