{"version":"1.0","provider_name":"Centurion Systems French","provider_url":"https:\/\/www.centsys.com\/fr","author_name":"Charl Mijnhardt","author_url":"https:\/\/www.centsys.com\/fr\/author\/charl\/","title":"The Changing Face of Access Control - Centurion Systems French","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0oDDoFDYPk\"><a href=\"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/\">The Changing Face of Access Control<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.centsys.com\/fr\/the-changing-face-of-access-control-2\/embed\/#?secret=0oDDoFDYPk\" width=\"600\" height=\"338\" title=\"&#8220;The Changing Face of Access Control&#8221; &#8212; Centurion Systems French\" data-secret=\"0oDDoFDYPk\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.centsys.com\/fr\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"There\u2019s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.\u00a0 Like most things in this modern age, the trend in access control seems to lean towards the sleek and the compact, while still offering superior security, usability and functionality.\u00a0\u00a0 Modern access [&hellip;]"}