Get Started Today!  (415) 295-4898

croom new

415 IT Blog

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, May 26 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Backup Data IT Support Network Security Privacy Hosted Solutions Cloud Data Recovery Software IT Services Efficiency Internet Email Managed IT Services Outsourced IT Malware Innovation Business Tech Term Hackers Upgrade Small Business Cloud Computing Windows 10 Computer Microsoft Cybersecurity Collaboration Business Management User Tips Hardware Phishing Business Continuity Mobile Devices Google Communication Workplace Tips Ransomware VoIp Managed Service Smartphones Managed Service Provider Android Backup Paperless Office Quick Tips Office 365 Communications Server Encryption Remote Monitoring Disaster Recovery Data Management Managed IT Mobile Device Artificial Intelligence Internet of Things Healthcare Passwords Business Technology Vulnerability Holiday Windows 7 BDR Network Wi-Fi Saving Money Browser Applications Save Money Miscellaneous Smartphone Help Desk Laptops Managed IT services Compliance Document Management Government Social Media Facebook Remote Work Blockchain Project Management Tip of the week Employer-Employee Relationship Two-factor Authentication Redundancy Scam Vendor Management Avoiding Downtime Users Antivirus Bandwidth Virtualization Information Microsoft Office Automation Health Processor Data Security Meetings Infrastructure Machine Learning Software as a Service Mobility Data Loss Website Maintenance Company Culture Chrome VPN IT Management OneDrive Analytics Customer Relationship Management IoT Access Control RMM Virtual Private Network BYOD Windows Router Proactive Storage Monitoring Bring Your Own Device Gmail Word HIPAA Utility Computing The Internet of Things Cooperation Risk Management Patch Management Financial Unified Threat Management File Management Remote Monitoring and Management Operating System Net Neutrality Office Payment Cards Tablet Alert Electronic Health Records Employees Recycling Consulting Downtime Server Management Dark Web Augmented Reality Internet Exlporer Smart Technology Employee-Employer Relationship Gadgets Computing Professional Services Training Managed Services Managed Services Provider Networking Assessment Social Network Remote Workers Regulations Search Apps Management Network Management Covid-19 Files File Sharing Flexibility Hard Drive Consultation Mobile Security Unified Communications Password Co-Managed IT Time Management User Error Electronic Medical Records Social Networking Heating/Cooling Managed IT Service Outsourcing Windows Server Superfish Employer/Employee Relationships Apple Mail Merge Identity Black Friday IT Database Remote Worker Screen Reader Trending Hard Disk Drives Sensors Data Breach OneNote Permission Language Optimization Notes Downloads Features Modem High-Speed Internet Statistics Money Laptop Authorization Remote Computing Mouse Address WiFi G Suite Servers Break Fix Video Conferencing User Management Politics Tech Support Proactive Maintenance Solid State Drive Mobile Cyber Monday Staff Business Telephone Voice over Internet Protocol Projects Private Cloud Smart Tech Permissions Solid State Drives How To Test Recovery Computing Infrastructure Virtual Machines PowerPoint Display Procurement Development Bluetooth Microsoft Excel Remote Working Value of Managed Services Techology WPA3 Motherboard Chromebook Biometric Teamwork Information Technology Instant Messaging IT Technicians Cost Management Cybercrime Cyber security IT Assessment Return on Investment Bookmarks ROI Connectivity Google Calendar Fraud Options Telephone Technology Laws Alerts Credit Cards Emergency Multi-Factor Security Cyberattacks Social Cookies Cables Budget Outlook Disaster Resistance Fleet Tracking Zero-Day Threat Migration eWaste Printer Mobile Device Management Vulnerabilities Websites Virtual Reality Gamification Shared resources Going Green Customer Service Travel Database Management Wireless Managing Stress Firewall Digitize Settings Personal Information Favorites 5G Mobile VoIP Unified Threat Management Comparison Licensing Computers Virtual Assistant Bitcoin Read Only Security Cameras Nanotechnology Wires Manufacturing Vendor Shortcut Proactive IT Asset Tracking Backup and Disaster Recovery Chatbots GDPR Point of Sale Tech Terms Mobile Computing SaaS Data Warehousing Mobile Office Batteries MSP Finance Mirgation Technology Tips Windows Server 2008 Spam Enterprise Content Management Distributed Denial of Service Shadow IT Transportation Active Directory Lenovo Conferencing Wearable Technology Star Wars Legislation Wireless Internet Big Data Identity Theft Enterprise Resource Planning Specifications Holidays Wasting Time Current Events Samsung Printing App Touchscreen Hacking Smart Devices IT Consulting Human Error SharePoint E-Commerce Theft Geography Operations Outsource IT CIO applications Authentication Cache Digital Payment Hotspot Education CEO Students Daniel Stevens Regulation Marketing Twitter Printers

Latest Blog

This is a strange time for everyone. For business owners, it’s filled with uncertainty as many of their businesses have had to shut down in the face of the global COVID-19 pandemic. Others were forced into embracing remote operations. For these companies, their cloud platfor...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...