key

Former Hawkeye defensive lineman Jeff Koeppel tackled COVID-19 and prevailed

Jeff Koeppel, a North Liberty businessman who played on Iowa’s football team from 1986 to 1989 — was a second-team All-Big Ten defensive lineman for two years — caught COVID-19...




key

The Key Difference Between Centralization and Decentralization

One of the more compelling insights to come from the Joe Rogan interview with Elon Musk is this idea that humanity is actively creating “giant cybernetic collectives.” Through our participation in social media platforms and on the internet in general, we are assimilating knowledge and building connections at a rate that vastly exceeds everything that […]



  • Centralization vs. Decentralization
  • Videos

key

Branding Is Key: What Makes a Good Logo?

When it comes down to creating your brand you want something that is original but stands out. Here is what makes a good logo so you can stand out. More





key

Book Review: The Cheese Monkeys

The Cheese Monkeys is the coming of age story of a teen boy (who we only know by his nickname, “Happy”.) As he enters a midwest state school to study art in the late 50’s. First off, I’ll admit that I’m a fan of coming of age stories. All the good ones usually follow a protagonist who […]




key

How to Add Native Keyword Aliases to Babel

Those of you who follow this blog know that not every blog post is an endorsement of a technique but simply a tutorial how to accomplish something. Sometimes the technique described is probably not something you should do. This is one of those blog posts. The Babel parser is an essential tool in the web […]

The post How to Add Native Keyword Aliases to Babel appeared first on David Walsh Blog.




key

Track Your Keyword Placement with Ranktrackify (Sponsored)

I don’t need to tell you how important search engine placement is. You either earn it with quality content, loads of SEO work, paying for placement, or all of the above. And even we you achieve best placement, you need to be wary of your content becoming stale or someone else coming along with a […]

The post Track Your Keyword Placement with Ranktrackify (Sponsored) appeared first on David Walsh Blog.




key

Easy CSS Animation Using @keyframes

CSS Transitions and transforms work beautifully for creating visual interactions based on single state changes. To have more control over what happens and when, you can use the CSS animation property to create easy CSS animation using @keyframes. This technique has a wide range of design application and can be used to build dazzling pre-loaders, […]


The post Easy CSS Animation Using @keyframes appeared first on Web Designer Wall.




key

Giant Icebergs Play Key Role in Removing CO2 From the Atmosphere

By The University of Sheffield Giant icebergs leave trail of carbon sequestration in their wake – a month after they have passed Geographers analysed 175 satellite images of ocean colour which is an indicator of phytoplankton productivity at the ocean’s … Continue reading




key

Is Zero UI The Key Factor For The Future Of Interfaces?

Zero UI is about removing everything that comes between users and their devices, about making the interaction easier, seamless, more direct. Does it sound to you like a concept from a science-fiction...






key

A set of key visuals for Nike Shanghai

A set of key visuals for Nike Shanghai

AoiroStudioMay 06, 2020

I think this is going to break our visual pattern but this is totally worth it. This is the work from How Wei Zhong who art directed this massive campaign for Nike Shanghai in collaboration with the folks from ILoveDust. It's quite refreshing since first of all it's collaborative participation and obviously the end-result that is just purely vibrant and amazing. To share a little bit of background on this project (in their words). “Qiang Diao” is Chinese for confidence, swagger and game.

And in a city as image and style conscious as Shanghai, Qiang Diao is something many people want for themselves. Nike wanted Shanghai athletes to know that sports can offer you more than fitness. We created OOH celebrating Shanghainese athletes well-known for their strong personalities and, of course, having Qiang Diao.

About How Wei Zhong

How Wei Zhong is an art director at W+K Shanghai based in Kuala Lumpur, Malaysia. You should definitely check his work, it’s filled with incredible works for brands. Give him some love.




key

A Complete Guide To Mechanical Keyboards

About six years ago, a colleague I’ll call Tom, because that’s his name, forwarded me a link to the ‘WASD CODE’; a keyboard focused on the needs of programmers, designed with the help of Stack Overflow’s Jeff Atwood. I had no idea at the time that there were people actually dedicating themselves to creating keyboards beyond the stock fare shipping with computers. As I read and re-read the blurb, I was smitten.




key

Mutli-task Learning with Alignment Loss for Far-field Small-Footprint Keyword Spotting. (arXiv:2005.03633v1 [eess.AS])

In this paper, we focus on the task of small-footprint keyword spotting under the far-field scenario. Far-field environments are commonly encountered in real-life speech applications, and it causes serve degradation of performance due to room reverberation and various kinds of noises. Our baseline system is built on the convolutional neural network trained with pooled data of both far-field and close-talking speech. To cope with the distortions, we adopt the multi-task learning scheme with alignment loss to reduce the mismatch between the embedding features learned from different domains of data. Experimental results show that our proposed method maintains the performance on close-talking speech and achieves significant improvement on the far-field test set.




key

Lattice-based public key encryption with equality test in standard model, revisited. (arXiv:2005.03178v1 [cs.CR])

Public key encryption with equality test (PKEET) allows testing whether two ciphertexts are generated by the same message or not. PKEET is a potential candidate for many practical applications like efficient data management on encrypted databases. Potential applicability of PKEET leads to intensive research from its first instantiation by Yang et al. (CT-RSA 2010). Most of the followup constructions are secure in the random oracle model. Moreover, the security of all the concrete constructions is based on number-theoretic hardness assumptions which are vulnerable in the post-quantum era. Recently, Lee et al. (ePrint 2016) proposed a generic construction of PKEET schemes in the standard model and hence it is possible to yield the first instantiation of PKEET schemes based on lattices. Their method is to use a $2$-level hierarchical identity-based encryption (HIBE) scheme together with a one-time signature scheme. In this paper, we propose, for the first time, a direct construction of a PKEET scheme based on the hardness assumption of lattices in the standard model. More specifically, the security of the proposed scheme is reduces to the hardness of the Learning With Errors problem.




key

Key Missteps at the CDC Have Set Back Its Ability to Detect the Potential Spread of Coronavirus

The CDC designed a flawed test for COVID-19, then took weeks to figure out a fix so state and local labs could use it. New York still doesn’t trust the test’s accuracy By Caroline Chen, Marshall Allen, Lexi Churchill and Isaac Arnsdorf Propublica…



  • News/Nation & World

key

Data store capable of efficient storing of keys

Embodiments relate to a computer implemented information processing system, method and program product for data access. The information processing system includes a data store having a top tier store and at least another tier store with the top tier store including a counter for each entry of a symbol and another tier store including a representative frequency value defined for the another tier store. A sorter is also provided configured to sort the symbol in the top tier store and the another tier stores according to a value generated in the counter for the assessed symbol. The said sorter is also configured to restore entry of the symbol in the top tier store, in response to a symbol having moved from said top tier store to another tier store, by using the representative frequency value defined for said another store to which said symbol was moved.




key

Keyword assessment

Methods, systems, and techniques for keyword management are described. Some embodiments provide a keyword management system (“KMS”) configured to determine the effectiveness of multiple candidate keywords. In some embodiments, the KMS generates multiple candidate keywords based on an initial keyword. The KMS may then determine an effectiveness score for each of the candidate keywords, based on marketing information about those keywords. Next, the KMS may process the candidate keywords according to the determined effectiveness scores. In some embodiments, processing the candidate keywords includes applying rules that conditionally perform actions with respect to the candidate keywords, such as modifying advertising expenditures, modifying content, or the like.




key

System and method for applying a text prediction algorithm to a virtual keyboard

An electronic device for text prediction in a virtual keyboard. The device includes a memory including an input determination module for execution by the microprocessor, the input determination module being configured to: receive signals representing input at the virtual keyboard, the virtual keyboard being divided into a plurality of subregions, the plurality of subregions including at least one subregion being associated with two or more characters and/or symbols of the virtual keyboard; identify a subregion on the virtual keyboard corresponding to the input; determine any character or symbol associated with the identified subregion; and if there is at least one determined character or symbol, provide the at least one determined character or symbol to a text prediction algorithm.




key

User interface with enlarged icon display of key function

To improve the consumer experience with portable electronic devices, a user interface combines the use of capacitive sensors with tactile sensors in an input device. When a user places a finger, stylus, or other input instrument near a given key button, a capacitive sensor causes the display to display temporarily an indication of the function of that key in an enlarged format. The user may then press the associated key button to activate the desired function. In one exemplary embodiment, the capacitive sensor fixes the functionality to the function indicated in the display. In this embodiment, a tactile input applied to any key, whether the correct key, multiple keys, or a single incorrect key, results in activating the function indicated in the display as a result of the capacitive input.




key

Tuning method and apparatus for keyboard musical instrument

A tuning apparatus for a keyboard musical instrument, having a load applicator for applying a load of a predetermined value to a string set up in place, a calculating device for calculating a deviation between a displacement value of the string produced when the load is applied to the string and a preset value of displacement predetermined to give a required frequency of vibration, and a rotating device for turning a tuning pin until the deviation calculated by the calculating device is reduced to zero.




key

Ivory-like key material and a method for producing the same

In production of a casein-type artificial key material for keyboard musical instruments, fine grains of an elastomer such as polyurethane elastomer are added to a mixture to be kneaded together so that, in the structure of the product, islanded elastomer is uniformly dispersed in the matrix of casein. Inbred brittleness of casein is much improved by inclusion of the elastomer and strong bond between casein and the elastomer well removes the danger of interface separation.




key

Keyboard with multiple indicia sets

The present invention discloses a method for displaying individually on a plurality of keys of a keyboard or keypad two or more indicia representing two or more functions performed by each key. The keys are characterized in that each of the two or more indicia is provided on the key in a plurality of separated portions. The portions being positioned in a spaced positioned relationship with one another, so as not to be physically closely juxtaposed. When viewed at a predetermined angle all parts of the indicia are optically juxtaposed to create the entire indicia.




key

Portable electronic musical keyboard instrument

A portable electronic musical device has a keyboard disposed in a housing connected to a strap and a support plate connected thereto for suspension of housing by strap on shoulders of a person while housing is simultaneously supported on waist of person to allow person to easily move from one geographical position to another while playing instrument. Housing is pivotally connected to support plate by at least one member defining an axis around which housing is rotatable to playing of instrument and to facilitate viewing of hands of person and keys of keyboard while user is playing instrument. To further facilitate playing of instrument and visibility of hands and keys housing is curved with keyboard generally aligned therewith.




key

Electric wind instrument and key detection structure thereof

Wind instrument includes a tubular body having a plurality of tone holes, and a plurality of keys capable of opening and closing the tone holes. Via a retaining member, detector units are provided within the tubular body in corresponding relation to the keys, and each of the detector units is generally opposed to the back surface of the corresponding key. Each of the detector units detects a relative distance to the back surface and outputs an electrical signal, on the basis of which an opening/closing state of the key can be detected. The retaining member, accommodated in the tubular body, positions and retains each of the detector units in such a manner that the keys and tubular body and the individual detector units are kept in non-contacting relation to each other.




key

Scrolling virtual music keyboard

Disclosed are systems, methods, and non-transitory computer-readable storage media for scrolling a virtual keyboard on a touch screen device including a display. A first aspect allows detecting a user contact swipe motion in a predetermined direction along said keyboard, scrolling said keyboard across said display in accordance with said motion, and stopping said scrolling upon termination of user contact swipe motion. A second aspect allows scrolling of a virtual keyboard to snap to an intelligent position based on a song key or relative minor of the song key. A third aspect allows a note to be held when a user's finger remains in contact with the display even though the finger is no longer in contact with a key linked to the note on the keyboard as a result of scrolling. A fourth aspect displays a second musical instrument keyboard adjacent to a first musical instrument keyboard, wherein said second musical instrument keyboard is linked to said first musical instrument keyboard such that scrolling of one keyboard causes automatic scrolling of the other keyboard.




key

Scroll compressor with bearing grooves on both sides of key groove

In a scroll compressor of the present invention, a fixed scroll 11 and an orbiting scroll 12 are meshed with each other such that spiral laps of the fixed scroll 11 and the orbiting scroll 12 inwardly face each other, an Oldham ring 26 is provided between the main bearing member 19 and the orbiting scroll 12, and a key portion of the Oldham ring 26 is inserted into a key groove 19a of the main bearing member 19. Grooves 19b are formed in Oldham ring 26 sliding surfaces on both sides of the key groove 19a. According to this configuration, the Oldham ring 26 and the main bearing member 19 can be restrained from coming into contact with each other in the vicinity of the bearing key groove 19a, and restrained from vibrating, and it is possible to provide an inexpensive scroll compressor of low noise.




key

Method and device for actuating a key of a keyboard with a tracer finger of a robot

There is provided a method for actuating a first key of a keyboard with a tracer finger of a robot. An exemplary method comprises acquiring parameters of the keyboard and determining a position of the first key as a function of the acquired parameters using a model of the keyboard. The exemplary method also comprises guiding the tracer finger of the robot to the determined position of the first key. The exemplary method additionally comprises actuating the first key with the tracer finger of the robot.




key

Method and apparatus for extracting advertisement keywords in association with situations of video scenes

A method and apparatus for extracting advertisement keywords in association with situations of scenes of video include: establishing a knowledge database including a classification hierarchy for classifying situations of scenes of video and an advertisement keyword list, segmenting a video script corresponding to a received video in units of scenes, and determining a situation corresponding to each scene with reference to the knowledge database, and extracting an advertisement keyword corresponding to the situation of a scene of the received video with reference to the knowledge database.




key

System and method for remote reset of password and encryption key

Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a public key from the device. The remote location uses the public key and a stored private key to generate a further public key. The further public key is sent to the device. The device uses the further public key to generate a key encryption key, which is then used to decrypt the encrypted content protection key. A new content encryption key may then be created.




key

Network-based revocation, compliance and keying of copy protection systems

A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




key

Network communications using quantum key distribution

A method and apparatus for forming and distributing quantum encryption keys. A first quantum signal generated by a number generator in a communicator is transmitted through an aperture in the communicator to a receiving communicator. A second quantum signal is received through the aperture at the communicator from a transmitting communicator. The first quantum signal is isolated from the second quantum signal such that the first quantum signal is transmitted from the communicator in response to the first quantum signal passing through the aperture and such that the second quantum signal is received at a number detector in the communicator in response to the second quantum signal passing through the aperture.




key

Private key generation apparatus and method, and storage media storing programs for executing the methods

Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user.




key

System and method for obtaining certificate status of subkeys

Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.




key

System and method for protecting information and related encryption keys

A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory.




key

Method and system for providing a rotating key encrypted file system

A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis.




key

Key generation techniques

In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key generation module is to generate a key using the first key portion from the programmable memory and a second key portion received via a memory interface. The module is to encrypt or decrypt data using the key.




key

Apparatus and method for generating secret key using change in wireless channel on wireless communication network

A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random signal controller. The antenna receives a wireless signal from a counterpart terminal that performs wireless communication. The amplification/phase controllers control the amplification gain and phase of the wireless signal that is received via at least one antenna. The transceiver measures the status of a wireless channel using the wireless signal having the controlled amplification gain and phase, determines parameters based on results of the measurement, and generates a secret key based on results of the determination. The random signal controller controls the amplification/phase controllers so that the amplification gain and phase are adjusted whenever the transceiver generates a secret key.




key

Managing encryption keys in a computer system

A method and apparatus is disclosed for managing encryption keys in a computer system in which in response to the change of a system key the old key and new key are both maintained for subsequent use.




key

Method and apparatus for authenticating public key without authentication server

Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value.




key

Method and server for providing a mobility key

A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber.




key

Encryption keypad capable of preventing illegal disassembly

An enhanced encryption keypad (100) capable of preventing illegal disassembly for an automated teller machine comprises a key panel (101) and a main control board (102). A removal detection protection circuit is disposed inside a main chip of the main control board (102), and at least one pin of the removal detection protection circuit is guided out from a surface (1021) of a side of the main control board (102) near the key panel to form a removal detection point (1022). The removal detection point (1022) has two opened signal contact points. The two opened signal contact points are conducted by a conductive adhesive (103) to activate the removal detection protection circuit. A conductive protection ring (1023) isolated from the removal detection point is disposed at the periphery of the removal detection point. The conductive protection ring (1023) is connected to the removal detection protection circuit inside the main control chip. A protection circle (1024) is disposed at the periphery of the conductive protection ring and the corresponding conductive adhesive. The present application effectively protects the encryption keypad from illegal attacks on the removal detection point from the side.




key

System and methods for generating unclonable security keys in integrated circuits

A system and methods that generates a physical unclonable function (“PUF”) security key for an integrated circuit (“IC”) through use of equivalent resistance variations in the power distribution system (“PDS”) to mitigate the vulnerability of security keys to threats including cloning, misappropriation and unauthorized use.




key

Fully automatic self-service key duplicating kiosk

A self-service, fully-automatic kiosk for duplicating keys includes a kiosk housing having a customer interface for receiving payment from a customer for the purchase of at least one duplicate of the customer's key. A key-receiving entry in the housing receives at least a portion of the customer's key to be duplicated, and a key analysis system within the housing analyzes the blade of a key inserted in the key-receiving entry to determine whether the inserted key matches one of a group of preselected key types and, if so, which preselected key type is matched. A key blank magazine within the housing stores key blanks for each of the preselected key types. A key blank extraction system extracts from the magazine a key blank for the preselected key type matched by the blade of the key inserted in the key-receiving entry. Then a key duplicating system within the kiosk replicates the tooth pattern of the blade of the key inserted in the key-receiving entry, on the blade of the extracted key blank.




key

Key duplication machine

Apparatus, methods, and other embodiments associated with a key duplication machine are described. In one embodiment, an assembly for duplicating a master key includes an optical imaging device, a logic, a clamping assembly, and a cutting member. The optical imaging device is capable of capturing an optical image of at least a portion of the master key. The logic is capable of determining a key pattern of the master key from the optical image of the master key. The clamping assembly is capable of clamping a key blank and the cutting member is capable of cutting a key pattern into said key blank.




key

Multi-key duplication, identification and cutting machine with clamp

A key duplication system comprising a key duplication housing wherein at least one key receiving aperture on a first side of the housing sized to receive a key blade and at least one key clamp adjacent to the at least one key receiving aperture, the clamp comprising a first clamp arm with a surface topography corresponding to a first key blade surface topography and a second clamp arm with a surface topography corresponding to a second key blade different from the first key blade.




key

Stroke controller for a key duplicator

A stroke controller is mounted on a key duplicator and has a base, a drive shaft, a knob and a driven shaft. The base has a longitudinal shaft hole and a transverse shaft hole. The drive shaft is mounted rotatably through the transverse shaft hole. The knob is mounted on the drive shaft and has a drive gear. The driven shaft is mounted slidably through the longitudinal shaft hole and has a rack section engaging the drive shaft so that rotating the knob drives the driven shaft to slide relative to the base. The stroke controller precisely controls the movement of an original key and a key workpiece clamped on the key duplicator to manufacture a fine key duplicate.




key

Chip collection system for a key cutting machine

A chip and shaving collection system for a key cutting machine has a trough with a linear first trough drawer rail located on a trough first side and a linear second trough drawer rail located on a trough second side. The trough further has a linear first trough support rail having a general shape of a triangular prism located on a trough first side and a linear second trough support rail having a general shape of a triangular prism located on a trough second side. The system has a plurality of linear support beams located on the support rails. The system has a rigid planar grid member spanning the trough top located on the linear support beams. The system has a drawer that is fluidly sealed located in the trough. The system has a key cutting machine located on the grid member.




key

Method for adjusting soft keyboard layout and mobile terminal

Embodiments of the present invention disclose a method for adjusting soft keyboard layout. The method includes: displaying an option for adjusting a soft keyboard layout; receiving information that a user selects the option for adjusting the soft keyboard layout, and after receiving the information that the user selects the option for adjusting the soft keyboard layout, displaying a soft keyboard adjustment interface on a touch screen, and receiving an adjustment scheme input by the user; and modifying the soft keyboard layout according to the adjustment scheme. In this way, a requirement of a user for adjusting a keyboard according to personal preference is satisfied.