312-253-4321    Get SUPPORT

Alchetec Blog

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 16 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Productivity Network Security IT Services Malware Privacy Hosted Solutions Email Hackers Data Backup Data Outsourced IT Software Internet Innovation Business Productivity Managed IT Services Data Recovery Microsoft IT Support Ransomware Tech Term Hardware Computer Cloud Computing User Tips Backup Business Continuity Mobile Devices IT Support Small Business Google Business Management Collaboration Efficiency Android Managed IT Services Paperless Office Communication Remote Monitoring VoIP Windows 10 Upgrade Smartphones Phishing Smartphone Disaster Recovery Server Internet of Things Data Management Managed Service Provider Workplace Tips Office 365 Mobile Device Encryption Cybersecurity Managed IT Passwords Browser BYOD Social Media Windows 10 Holiday Save Money Artificial Intelligence Communications Applications Facebook Business Technology Employer-Employee Relationship Saving Money Compliance Wi-Fi Risk Management Government Quick Tips Document Management Managed Service Infrastructure SaaS Tip of the week Telephone Systems Unified Threat Management File Sharing Bandwidth Virtualization Automation Password BDR Network Healthcare Antivirus Vendor Management Recovery Help Desk Vulnerability IT Management Scam Analytics Project Management Microsoft Office Chrome Blockchain Information Windows Storage Data Security Firewall Website Gmail Training Data loss App Tablet Wireless Going Green Mobile Device Management Files Regulations Two-factor Authentication Data Storage Maintenance Money Router Word Politics VPN Apps Bring Your Own Device Hosted Solution Virtual Reality Office Work/Life Balance Customer Relationship Management Robot IT Service Mobile Security Big Data Digital Payment Identity Theft Users Miscellaneous Company Culture Customer Service Licensing How To Software as a Service Computing Assessment Alert Monitors Patch Management Unified Communications Uninterrupted Power Supply Mobility How To Proactive Consultation Samsung Employees Redundancy Network Management Management Smart Technology Net Neutrality Flexibility Chromebook Remote Monitoring and Management RMM Server Management HIPAA Settings Twitter Remote Workers Printing Health Internet Exlporer The Internet of Things Machine Learning Networking Social IoT Outlook Access Control Gadgets Remote Computing Upgrades Electronic Medical Records Cooperation Computers Virtual Private Network Downtime Cache Taxes Hard Disk Drive Bookmarks Emoji Social Networking Fleet Tracking Tech Terms Google Drive Permissions Star Wars Features Wasting Time Statistics Unsupported Software SharePoint Mirgation High-Speed Internet Spyware Human Error Firefox IT Solutions Processors Monitoring ROI 3D Printing Technology Laws Legal Law Enforcement Staff Authentication Display Mail Merge USB Break Fix Nanotechnology Techology Personal Information Hotspot Recycling Favorites Teamwork Dark Data Shortcut Private Cloud Solid State Drives Black Friday Motherboard Asset Tracking Theft Avoiding Downtime Fraud Utility Computing Disaster Electronic Health Records Database Bluetooth Mobile Data Downloads Update Migration Development MSP Permission Social Engineering Lenovo Consulting Notes Heating/Cooling Unified Threat Management Gadget Operations Managing Stress WiFi VoIP Spam Authorization Address Dark Web Screen Reader Software Tips Time Management Disaster Resistance Virus Language eWaste Conferencing Shared resources Technology Tips Options Cyber Monday Mobile Computing Apple OneNote Financial Cybercrime Cyberattacks Voice over Internet Protocol Multi-Factor Security Chatbots Cables Test Search Superfish Managed Services Provider PowerPoint Servers User Error Wearable Technology Enterprise Content Management GPS YouTube Black Market Data Warehousing Smart Tech Procurement Proactive IT Computer Repair Crowdsourcing Computing Infrastructure Meetings OneDrive Network Congestion Mouse Wireless Internet Google Maps Employee-Employer Relationship Cost Management Travel Augmented Reality Read Only Windows 7 Humor Hacking Google Calendar Botnet Identity Supercomputer Notifications Content Filtering History Wireless Technology 5G Point of Sale Professional Services Cortana Printer Sports Vulnerabilities Tracking Tech Support Wires Zero-Day Threat End of Support Physical Security Microsoft Excel Connectivity Security Cameras Touchscreen IT Consulting Alerts Enterprise Resource Planning Corporate Profile IBM Instant Messaging Manufacturing Education Comparison Business Growth Employer/Employee Relationships Distributed Denial of Service Modem Safety Hard Drive Solid State Drive Transportation Office Tips Trending Legislation IT Budget Hacker WPA3 Operating System G Suite Cabling E-Commerce Virtual Assistant Websites Telephony IT Technicians Geography Digital Backup and Disaster Recovery Remote Worker Data Breach Mobile Computer Care WannaCry Finance Hard Disk Drives Specifications Automobile Proactive Maintenance Managed IT Service Cookies Students Relocation IP Address Regulation Fun Staffing Database Management Sync IT Consultant Mobile Office Domains CrashOverride GDPR Mobile Device Managment Hard Drives Error Administrator Public Speaking Presentation Information Technology Public Cloud Lithium-ion battery Cleaning Hacks Motion Sickness Printers Marketing Budget Emergency Hiring/Firing Competition