{"version":"1.0","provider_name":"","provider_url":"https:\/\/tecnoponto.com\/blog","author_name":"Lorena","author_url":"https:\/\/tecnoponto.com\/blog\/author\/lorena\/","title":"Tudo Que Voc\u00ea Precisa Saber Sobre Controle de Acesso -","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ktmoC02Qsd\"><a href=\"https:\/\/tecnoponto.com\/blog\/tudo-sobre-controle-de-acesso\/\">Tudo Que Voc\u00ea Precisa Saber Sobre Controle de Acesso<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/tecnoponto.com\/blog\/tudo-sobre-controle-de-acesso\/embed\/#?secret=ktmoC02Qsd\" width=\"600\" height=\"338\" title=\"&#8220;Tudo Que Voc\u00ea Precisa Saber Sobre Controle de Acesso&#8221; &#8212; \" data-secret=\"ktmoC02Qsd\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/tecnoponto.com\/blog\/wp-content\/uploads\/2019\/11\/post-blog-06.png","thumbnail_width":1024,"thumbnail_height":512,"description":"Um sistema efetivo de controle de acesso, aumenta consideravelmente a seguran\u00e7a e a organiza\u00e7\u00e3o do fluxo de pessoas. A tecnologia \u00e9 uma grande aliada nas quest\u00f5es de seguran\u00e7a, equipamentos com detec\u00e7\u00e3o de biometria ou reconhecimento facial, que h\u00e1 alguns anos pareciam t\u00e3o distantes da nossa realidade, hoje j\u00e1 s\u00e3o tang\u00edveis. \u00c9 poss\u00edvel inclui-los nos mais [&hellip;]"}