Get Started Today!  321-259-5500

croom new

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email IT Services Productivity Network Security Data Computer Productivity Backup Mobile Devices Microsoft Software Hardware Ransomware Google Workplace Tips User Tips Efficiency Managed Service Provider Windows 10 Tech Term Android Smartphone Innovation Business Continuity Server Disaster Recovery Small Business Cloud Computing Communication Business Management Smartphones Upgrade IT Support Data Management IT Support Social Media Encryption Browser Managed IT Services Data Backup Network App Phishing BYOD Outsourced IT Office 365 Data Recovery Facebook Paperless Office Windows Artificial Intelligence Windows 10 Big Data Passwords Employer-Employee Relationship Gmail Office Internet of Things Collaboration Apps Holiday Government Mobile Device Management Vendor Management VoIP Save Money Remote Monitoring Managed IT Services Microsoft Office Hosted Solution WiFi communications Virtualization Firewall Wireless Technology Spam Risk Management Alert Recovery Wireless Cybersecurity Vulnerability Wi-Fi Saving Money Robot Chrome Two-factor Authentication Office Tips Miscellaneous How To Password Tip of the week Word Managed Service Mobile Device IT solutions Budget Content Filtering Avoiding Downtime Bandwidth Scam Work/Life Balance Analytics Website Hacker Money Customer Service Automation Document Management IT Management VPN Business Technology Settings Social Quick Tips Antivirus Infrastructure Politics Tech Support SaaS Downtime The Internet of Things Information Maintenance Twitter Remote Computing Cybercrime Healthcare Blockchain Storage Customer Relationship Management Going Green Unified Threat Management Machine Learning Education Compliance Tablet Bring Your Own Device Applications IT service BDR Data storage Virtual Reality Hard Drives Computing Apple Legal File Sharing G Suite Router Outlook Health Point of Sale Presentation Cortana Safety Taxes Upgrades Websites Telephone Systems YouTube IBM Operating System Electronic Medical Records Augmented Reality Net Neutrality Physical Security Unified Communications Cost Management How To Botnet Virtual Desktop Automobile Chromebook Lithium-ion battery Server Management Google Drive Solid State Drive Gadgets Monitors User Error Network Management Hacking Patch Management LiFi Access Control HIPAA Business Owner Networking Sports Users Management Business Intelligence Competition Data loss Samsung Printing User Computers Computer Care Administration Best Practice Data Security Running Cable Regulations Mouse eWaste Mobile Security Search Identity Theft Virtual Private Network End of Support Training Private Cloud Heating/Cooling Cooperation Spyware Black Friday Managing Stress Permission Co-managed IT Save Time Google Maps Environment Lenovo Hotspot Features Laptop Alt Codes Refrigeration Hard Drive Authorization OneDrive Retail Crowdsourcing Information Technology Supercomputer Mail Merge Microsoft Excel Wasting Time Multi-Factor Security Mirgation Voice over Internet Protocol Network Congestion Trending Staffing VoIP Dark Web Security Cameras Travel Disaster Unified Threat Management Staff Connectivity Bookmarks Analyitcs Cyber Monday Enterprise Content Management Test Error Superfish Language Modem Humor Update Halloween Typing Cache Employees Manufacturing Social Engineering Google Wallet IT Budget Servers Address Monitoring Identities Web Server Corporate Profile iPhone Google Calendar Chatbots Windows 7 Display Processors CIO Current Events GPS Time Management Shortcut ROI Motion Sickness Uninterrupted Power Supply Printer Wearable Technology IoT Favorites IT Consultant Marketing Smart Technology Vulnerabilities RMM 3D Printing Troubleshooting Computing Infrastructure Cookies Electronic Health Records Scary Stories Cryptocurrency Legislation Identity Recycling Remote Monitoring and Management Hard Disk Drives Drones Digital Payment Permissions Consulting Managed IT Mobile Computing Application Fun Cameras WannaCry Tracking FCC OneNote Notes Knowledge Hard Disk Drive Star Wars Instant Messaging Bitcoin Cleaning Firefox Statistics Distributed Denial of Service Development Tech Terms Unsupported Software Administrator Alerts Nanotechnology Files Dark Data Emoji Comparison Zero-Day Threat Solid State Drives Law Enforcement Entrepreneur Fraud Managed Services Provider Google Docs Help Desk CCTV Finance Teamwork Touchscreen Title II Employee-Employer Relationship PowerPoint Backups Personal Information Experience Law Meetings SharePoint Assessment Windows 8 Undo Bluetooth Managed IT Service Cables Theft Mobile Data Relocation IP Address Cabling Licensing Screen Reader Read Only Specifications Social Networking Company Culture Human Error Gadget Motherboard E-Commerce Business Growth Digital Internet Exlporer Authentication Shared resources Writing Notifications Public Speaking Online Remote Workers Professional Services Computer Repair Deep Learning 5G Webcam Downloads IT Technicians Black Market Buisness Hacks Break Fix Wires Financial Hiring/Firing Mobile Office Techology Smart Tech Printers Database CrashOverride Regulation Students Emergency Domains USB Wireless Internet Flexibility

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login