Difference between revisions of "Team:UNOTT/Description"

Line 285: Line 285:
 
<!--//Close Section Five -->
 
<!--//Close Section Five -->
 
 
+
 
<!--// Section Six -->
+
<!-- Section Six; -->
<section class="container section-three" id="spydevelopers">
+
<section class="container section-two" id="spydesingers">
 
<div class="row">
 
<div class="row">
<div class="col-md-6 css-img-wrapper hidden-xs hidden-sm">
+
<div class="col-md-6 to-match">
<div>
+
<h2 style="color:#4b524a;">What?</h2>
<img src="https://static.igem.org/mediawiki/2017/e/e4/T--UNOTT--ourkey.png" class="img-circle img-responsive img-developers"></div>
+
</div>
+
<div class="col-md-6">
+
<h2 style="color:#4b524a;">Our solution</h2>
+
 
<article>
 
<article>
<p>
+
<p><em>Key. coli</em> provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.
A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in <i>E. coli</i>. Our security system is called <i> Key. coli </i>.
+
 
</p>
 
</p>
 +
                    <p></p>
 +
 
<p>
 
<p>
 
</p>
 
</p>
<p>
+
<p
 
</p>
 
</p>
 
</article>
 
</article>
 
</div>
 
</div>
</div>
+
<div class="col-md-6 css-img-wrapper hidden-xs hidden-sm">
 +
<img src="https://static.igem.org/mediawiki/2017/archive/b/b0/20171026145318%21T--UNOTT--openlock.png" class="img-responsive img-circle img-designers">
 +
</div>
 
</section>
 
</section>
 
<!--//Close Section Six -->
 
<!--//Close Section Six -->
Line 332: Line 331:
 
</section>
 
</section>
 
<!--//Close Section Seven -->
 
<!--//Close Section Seven -->
 +
 +
 +
<!-- Section Eight; -->
 +
<section class="container section-two" id="spydesingers">
 +
<div class="row">
 +
<div class="col-md-6 to-match">
 +
<h2 style="color:#4b524a;">What?</h2>
 +
<article>
 +
<p><em>Key. coli</em> provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.
 +
</p>
 +
                    <p></p>
 +
 +
<p>
 +
</p>
 +
<p
 +
</p>
 +
</article>
 +
</div>
 +
<div class="col-md-6 css-img-wrapper hidden-xs hidden-sm">
 +
<img src="https://static.igem.org/mediawiki/2017/archive/b/b0/20171026145318%21T--UNOTT--openlock.png" class="img-responsive img-circle img-designers">
 +
</div>
 +
</section>
 +
<!--//Close Section Eight -->
  
 
 
<!--// Section Eight -->
+
<!--// Section Nine -->
 
<section class="container section-three" id="spydevelopers">
 
<section class="container section-three" id="spydevelopers">
 
<div class="row">
 
<div class="row">
Line 355: Line 377:
 
</div>
 
</div>
 
</section>
 
</section>
<!--//Close Section Eight -->
+
<!--//Close Section Nine -->
 +
 
 
<div class="contentmargin"
 
<div class="contentmargin"
 
<p></p>
 
<p></p>

Revision as of 22:01, 31 October 2017

 

 

 

PROJECT DESCRIPTION

 

What?

Key. coli provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.

Our solution

A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .

What?

Key. coli provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.

Our solution

A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .

What?

Key. coli provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.

Our solution

A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .

What?

Key. coli provides a new, more secure form of key for accessing content. It uses random ligations and large modular repertoires of possible components to generate unique combinations that could be the next thing in security.

Our solution

A randomly assorted biometric which utilises CRISPRi to synthesise a random fluorescent key in E. coli. Our security system is called Key. coli .