Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 23 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email Privacy Malware IT Services Network Security Hackers Internet Data Software Data Backup Productivity Outsourced IT Managed IT Services Computer Business Innovation IT Support Microsoft Mobile Devices Ransomware Data Recovery Hardware Tech Term Cloud Computing Google IT Support Efficiency Backup Business Continuity Small Business Internet of Things Managed Service Provider Upgrade Collaboration User Tips Business Management Communication Smartphone Android Paperless Office Disaster Recovery Remote Monitoring Phishing VoIP Smartphones Encryption Windows 10 Social Media Save Money Windows 10 Artificial Intelligence Windows Data Management Browser Workplace Tips Managed IT Services Managed IT Server Cybersecurity communications Risk Management Mobile Device BYOD Facebook Office 365 Holiday Saving Money Automation Quick Tips Mobile Device Management Passwords App Chrome Applications Vendor Management Laptops Password Bandwidth Government Recovery Document Management Unified Threat Management Analytics Virtualization Employer-Employee Relationship Apps Firewall Wi-Fi Gmail Managed Service BDR Business Technology Compliance Robot Network Bring Your Own Device Going Green IT Management Wireless Microsoft Office Tip of the week Hosted Solution Scam Healthcare Project Management Website Antivirus Infrastructure Help Desk Content Filtering Vulnerability Training Blockchain Information Miscellaneous Money SaaS Big Data File Sharing Data storage Telephone Systems Processor Regulations Tablet Office IT Service Unified Communications Users Files Operating System Printing Computers Downtime Storage Two-factor Authentication Politics Router Remote Computing Settings VPN Work/Life Balance Customer Relationship Management Apple Customer Service Data loss Social Data Security Virtual Reality Computing Company Culture End of Support Health Budget RMM Monitors Spam Bitcoin Information Technology Word Redundancy Alert YouTube Electronic Medical Records WiFi Mouse Private Cloud Outlook Proactive Software as a Service Tech Support The Internet of Things Google Drive How To Samsung Administration Management LiFi Smart Technology Digital Payment Remote Monitoring and Management Education Maintenance Patch Management Chromebook Websites Identity Theft Networking Flexibility Net Neutrality Business Growth IT solutions Licensing Remote Workers Avoiding Downtime Virtual Private Network Mobile Computing Network Management Internet Exlporer Hacker Sports HIPAA Assessment Upgrades IoT Wireless Technology Legal How To Twitter Current Events Server Management Access Control Cooperation Machine Learning Mobility Gadgets Mobile Security Display Windows 7 Employees Consultation Uninterrupted Power Supply Staff Conferencing Address Processors Wireless Internet Break Fix Social Networking Asset Tracking Statistics Professional Services SharePoint Recycling Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Hacks MSP Disaster Resistance Office Tips Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Typing Update Transportation Mirgation Tracking Development Zero-Day Threat Superfish Unsupported Software Virus Fraud Screen Reader G Suite History Best Practice Utility Computing Consulting Search Downloads Augmented Reality Taxes Managing Stress Instant Messaging Employer/Employee Relationships Dark Web Motherboard Google Maps OneNote Bluetooth Virtual Assistant eWaste Read Only Spyware Course Social Engineering USB Hard Disk Drives Cyber Monday technology services provider IT Budget Tech Terms Proactive IT Remote Worker User Error Language Shortcut Migration Windows 8 Save Time Cables Backup and Disaster Recovery Mobile Data Projects Smart Tech Cabling Managed Services Provider Operations Identities Enterprise Content Management Finance Firefox Proactive Maintenance Data Warehousing Employee-Employer Relationship Wasting Time Safety Solid State Drives Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting Dark Data Personal Information ROI Computing Infrastructure Point of Sale WannaCry Teamwork Technology Tips Chatbots Wires Human Error Time Management Virtual Desktop Return on Investment Cybercrime Google Wallet Cost Management E-Commerce Database Multi-Factor Security Wearable Technology Telephony Hard Drives Google Docs Vulnerabilities Authentication Notifications Database Management Microsoft Excel Modem Sync Connectivity Hacking Enterprise Resource Planning Bookmarks Black Market Options Distributed Denial of Service Annual Convention Public Cloud Humor WPA3 Financial Servers Data Breach Notes Printer Alerts Law Enforcement Features Writing Emoji Shared resources Comparison Identity Botnet Backups Permission Travel Drones Hard Drive Voice over Internet Protocol Google Calendar Solid State Drive Geography Authorization GDPR Cookies Mobile Device Managment Software Tips Deep Learning Disaster Trending Network Congestion Gadget Mobile Favorites Mail Merge 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Computer Repair Marketing PowerPoint Cache Electronic Health Records VoIP Sponsor Retail Cortana Buisness OneDrive Specifications Test Touchscreen Techology Physical Security Alt Codes Legislation IT Technicians GPS Cryptocurrency High-Speed Internet Lenovo 3D Printing Permissions Nanotechnology Star Wars Monitoring CCTV Administrator Relocation Webcam Students Hard Disk Drive IT Consultant Printers Error Emergency Web Server CrashOverride Cameras Regulation Motion Sickness