Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, June 06 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Efficiency IT Support Outsourced IT Microsoft Business Innovation Mobile Devices Productivity Data Recovery Computer Managed IT Services Hardware Small Business Google Upgrade Business Continuity IT Support Cloud Computing Ransomware Cybersecurity Backup Collaboration Tech Term Phishing User Tips Communication Managed IT Services Workplace Tips Managed Service Provider Windows 10 Disaster Recovery Business Management VoIP Smartphones Internet of Things Smartphone Android Data Management Remote Monitoring Paperless Office Social Media Mobile Device communications Facebook Encryption Managed Service Managed IT Quick Tips Windows 10 Windows Server Network Browser Office 365 Artificial Intelligence Save Money Miscellaneous BDR Virtualization Saving Money BYOD Passwords Holiday Risk Management Help Desk Wi-Fi Apps Compliance Healthcare Health App Vendor Management Business Technology Password Automation Windows 7 Mobile Device Management Government Document Management Robot Gmail Employer-Employee Relationship Bring Your Own Device Remote Work Going Green Applications Training Microsoft Office Big Data Users Chrome Recovery Analytics Bandwidth Firewall Avoiding Downtime Laptops Unified Threat Management Scam Blockchain Project Management Antivirus Content Filtering Money Computing Telephone Systems Data storage SaaS Infrastructure Office Data Security Data loss Vulnerability Wireless Computers Mobility Storage File Sharing Two-factor Authentication Processor Information IT Management Hosted Solution Redundancy Website Apple Tip of the week Politics RMM Virtual Reality Access Control Work/Life Balance VPN Proactive Customer Relationship Management Regulations Virtual Private Network IT Service Budget Information Technology Gadgets Operating System Printing Machine Learning Software as a Service Unified Communications OneDrive Router Tablet Remote Computing Settings Maintenance Meetings IoT Downtime Files Flexibility Customer Service Company Culture Social Recycling Upgrades Solid State Drive Remote Worker HIPAA Utility Computing Consulting Twitter Wireless Technology Legal Digital Payment Cooperation IT solutions Current Events Websites Identity Theft Mobile Security Time Management Networking Licensing Patch Management Display Managed Services Provider Social Network End of Support Covid-19 Sports Employee-Employer Relationship Management Network Management Bitcoin Remote Monitoring and Management File Management Monitors Assessment Alert Dark Web Electronic Medical Records Augmented Reality Payment Cards How To Mouse Server Management Mobile Office Outlook Remote Workers The Internet of Things Hard Drive Co-Managed IT Consultation How To Samsung Google Drive Uninterrupted Power Supply Spam Smart Technology YouTube WiFi Business Growth Net Neutrality Professional Services Managed Services Chromebook Electronic Health Records Word Search Monitoring Private Cloud Employees Administration Mobile Computing LiFi Hacker Tech Support Internet Exlporer Education Deep Learning Cyberattacks Hard Disk Drives Virtual Machines Cookies Virtual Desktop MSP Batteries Shortcut Network Congestion Google Calendar Cyber security Firefox Managed IT Service San Diego Development Zero-Day Threat Projects Gamification Computer Repair Remote Working Point of Sale Retail Cortana Specifications Alt Codes Managing Stress Instant Messaging Proactive Maintenance Digitize Heating/Cooling IT Consulting Physical Security Cybercrime OneNote Wasting Time Smart Devices IT Technicians Telephony eWaste Read Only Solid State Drives Credit Cards 3D Printing Permissions Nanotechnology Cryptocurrency Sync Tech Terms ROI WannaCry Legislation Teamwork Processors Break Fix Social Networking Public Cloud Cables Backup and Disaster Recovery Return on Investment Hacking SharePoint Staff Law Enforcement Black Friday Roanoke — Central Technology Solutions Typing Botnet Enterprise Content Management Finance Database Management Shadow IT Servers Office Tips Data Breach Unified Threat Management Hotspot Marketing Hacks Travel Database Sensors Mirgation Buisness Best Practice Options Holidays Unsupported Software Virus Fraud Screen Reader Mobile Device Managment Software Tips Theft Notes Update Gadget Cost Management E-Commerce Shared resources Windows Server 2008 Motherboard Automobile Computer Care Wires Human Error Active Directory Disaster Trending Downloads Mail Merge Social Engineering USB Cyber Monday technology services provider Vulnerabilities Authentication GDPR Outsourcing Technology Laws User Error Language Connectivity Voice over Internet Protocol Migration GPS Enterprise Resource Planning Bookmarks 5G IT Touchscreen Techology Mobile Data Smart Tech Windows 8 Save Time WPA3 Financial PowerPoint Value of Managed Services VoIP Sponsor Features Lenovo Data Warehousing Identities Permission Windows Server Operations Telephone Address Safety Technology Assurance Group ’s 18 Supercomputer Geography Authorization Video Conferencing Statistics Dark Data Personal Information Outsource IT Computing Infrastructure Crowdsourcing Technology Tips Chatbots Google Wallet Tracking Mobile Favorites Wireless Internet Business Telephone Disaster Resistance G Suite History Fleet Tracking Procurement Digital Obstacle Taxes Cache Manufacturing Optimization Superfish Notifications Microsoft Excel Modem Hard Drives Google Docs Google Maps Test Security Cameras User Management Multi-Factor Security Wearable Technology Transportation Mobile VoIP Black Market Distributed Denial of Service Annual Convention IT Budget High-Speed Internet Biometric Bluetooth Laptop Printer Alerts Humor Star Wars Emoji Comparison Identity Drones Conferencing Employer/Employee Relationships IT Assessment Proactive IT Backups Cabling Asset Tracking Virtual Assistant Vendor Spyware Course Writing IT Consultant Hard Disk Drive Students Error Web Server Emergency CrashOverride Printers Cameras Peripheral Motion Sickness CCTV Administrator Relocation Regulation Webcam