Get Started Today!  (415) 295-4898

croom new

415 IT Blog

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Data Backup Hosted Solutions Privacy Cloud Network Security Data Recovery Email Data Malware Tech Term IT Support Outsourced IT Software Business IT Services Internet Innovation Hackers Managed IT Services Small Business Business Management Cloud Computing Ransomware Windows 10 Mobile Devices Android Paperless Office Efficiency Google User Tips Hardware Encryption Computer Upgrade Collaboration Business Continuity Vulnerability Server Managed Service Provider Microsoft VoIp Phishing Remote Monitoring Communication Business Technology Holiday Internet of Things Smartphones Managed IT services Passwords Workplace Tips Data Management Managed IT Communications Browser Applications Backup Artificial Intelligence Office 365 Compliance Mobile Device Disaster Recovery Scam Wi-Fi Government Document Management Tip of the week Bandwidth Managed Service Cybersecurity Antivirus Healthcare Smartphone Saving Money Project Management Employer-Employee Relationship Information Two-factor Authentication Chrome BDR VPN Analytics Vendor Management BYOD Automation IT Management Router Microsoft Office Customer Relationship Management Save Money Quick Tips Blockchain Data Security Infrastructure Social Media Website Internet Exlporer Company Culture Data Loss Proactive Alert Smart Technology Unified Threat Management Help Desk Redundancy Maintenance IoT Regulations Remote Monitoring and Management Management Networking File Sharing Mobile Security Server Management Employees Unified Communications Access Control Storage Files HIPAA Bring Your Own Device Virtual Private Network Assessment The Internet of Things Windows Gmail Network Risk Management Remote Workers Machine Learning Cooperation Network Management Word Software as a Service Net Neutrality Patch Management Facebook Tablet Connectivity E-Commerce Heating/Cooling Theft PowerPoint Dark Web Augmented Reality Authentication Google Calendar Fraud Monitoring Electronic Medical Records Migration eWaste Techology Meetings Trending Cookies Cables Teamwork OneNote Permission Options Computing Alerts Statistics Remote Worker Vulnerabilities Windows 7 OneDrive Travel Features Servers Financial Managing Stress Professional Services Technology Laws Virtual Reality Authorization Emergency Multi-Factor Security Operating System Chatbots Outlook Disaster Resistance Firewall Politics Mobility Nanotechnology Wires Shared resources How To Recovery Test Mirgation Hard Drive Comparison Licensing Office Bluetooth Private Cloud Mobile Computing Settings Printer Wearable Technology Star Wars Manufacturing Search Technology Tips Electronic Health Records Procurement Spam Enterprise Content Management Virtual Assistant Unified Threat Management Data Warehousing Flexibility WPA3 Legislation Consulting Downtime Identity Theft Enterprise Resource Planning Shortcut Proactive IT Distributed Denial of Service Instant Messaging App Virtualization Gadgets Employee-Employer Relationship Cache Specifications Bookmarks ROI Geography Transportation Utility Computing Password Lenovo Digital Payment Hotspot Avoiding Downtime Cyberattacks Websites Social Social Networking Wasting Time Operations Fleet Tracking Zero-Day Threat Samsung Managed Services Provider Mobile Device Management Identity IT Consulting Managed IT Service Customer Service Screen Reader CIO applications SharePoint Users Wireless Remote Computing Black Friday Favorites Apps Modem High-Speed Internet Tech Support Hard Disk Drives Superfish Mouse Language Read Only SaaS Security Cameras G Suite Database Mail Merge User Error Money Asset Tracking Consultation Backup and Disaster Recovery Point of Sale Tech Terms Mobile Notes Data Breach Break Fix MSP Finance Smart Tech Downloads Permissions RMM Recycling Cyber Monday Staff Touchscreen Conferencing Hacking Development Human Error IT Technicians Cost Management Solid State Drives Computing Infrastructure Time Management Printing Motherboard Chromebook Voice over Internet Protocol Address WiFi Microsoft Excel Daniel Stevens Twitter 5G Marketing Regulation Wireless Internet Education CEO Students Printers

Latest Blog

Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...