312-253-4321    Get SUPPORT

Alchetec Blog

By accepting you will be accessing a service provided by a third-party external to https://www.alchetec.com/

What Could Replace the Keyboard and Mouse?

What Could Replace the Keyboard and Mouse?

We hope we aren’t dating ourselves too much by mentioning computer punch cards, but they were once the means of inputting data into a computing device… at least, until the now-ubiquitous mouse and keyboard came into the scene. This variety of interfacing with our devices now seems to be one of the few ways to practically use them. However, other interfaces have emerged - do any of them stand a chance of unseating the keyboard and mouse?

Honestly, it really all depends on how (and if) the interfaces that are being developed are practically adopted. Here, we’ll go over how these interfaces are likely to be developed and how technology may be influenced in the future.

Today’s Familiar User Interfaces

As you’re reading this blog right now, there’s a pretty fair chance that you accessed it using a keyboard and mouse. Despite other interfaces, like touch gestures and voice responsiveness, being popular on many new devices, there are still plenty of devices that leverage the mouse and keyboard combination. However, this is not to say that there aren’t other upcoming interfaces that we are already seeing more and more. Take augmented and virtual reality, for example. These two interfaces are being seen more and more commonly, making it more likely that they will be leveraged for practical work purposes sooner than later. The same can be said of digital assistants and their capabilities to streamline many of the day-to-day operations that would otherwise take up your employees’ time.

The User Interfaces of Tomorrow

The whole point behind a user interface is to make it easier for a user to, for lack of a better term, pick up and play with whatever solution they happen to be leveraging. It was precisely this phenomenon that made the smartphone such a successful technology, as the highly hands-on UI made the devices remarkably intuitive to use. However, we may not even need to touch our devices at all in the near future. One of Google’s many ventures, Project Soli, is dedicated to creating a touch-free manual interface that uses radar to “read” the gestures of a user.

This kind of user interface could likely lead to a more three-dimensional version, similar to what can be seen in films like Minority Report. In fact, the researcher who assisted in creating the movie, John Underkoffer, has made strides towards the practical creation of such an interface.

Another potential route for UI to take in the future, haptic holograms, can be seen in the Iron Man franchise. Instead of the “typical” holograms, which function as little more than projections of light, haptic holograms can be manipulated by the user - allowing them to be edited, reorganized, and reexamined. As seen in the movies, these holograms could even mimic physical computing components, like keyboards. This suggests that the need for these physical components may not be quite as much of a need as it would be a preference in the relatively near future. Putting it simply, we find this idea pretty darn cool - and this is just the tip of the UI iceberg.

Using Your Brain to Talk to Computers

Yes, you read that right… the future of UI will likely allow us to use computers with only our minds. Advancements in bioelectronics and what is known as Brain-Computer Interface (BCI) technology have enabled us to scan a user’s brain waves and have a computer translate these waves into actionable commands.

Tests are already in progress to apply this technology to robotic limbs, motorized wheelchairs, and other accessibility tools. There is also research being pursued to enable us to use BCI technology to control the many devices and household utilities in our lives.

BCI has also been heavily featured in solutions to help restore a person’s capacity to communicate, or simply to augment it. There are implants that now allow a user to use their mind to type, while others are in development to directly convert brain waves into text. Astoundingly, there have been experiments conducted that have pretty much granted human beings the gift of telepathy. A subject in India was instructed to think the word “hello.” This thought was then converted into binary code and emailed to France, where it was reformatted into brainwaves and received by a second subject.

BCI has even been used to record dreams. Admittedly, these recordings aren’t of the highest quality, but the fact of the matter is that we have recorded dreams.

OF course, it should go without saying that practically using BCI for computing is a long way off, so you don’t have to give up your mouse and keyboard just yet. However, it is also a little fun to imagine how these advanced interfaces could potentially be used to improve the human experience sooner than later. We’ll just have to wait and see.

But, what do you think? Are any of these applications of advanced user interfaces of particular interest to you? Discuss it with us in the comments!

4 Decisions You’ll Make About Your IT
How to Plan Your Data Storage Needs
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 14 2020

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Productivity Business Computing Cloud Network Security Data Data Backup IT Services Privacy Hosted Solutions IT Support Malware Software Hackers Internet Email Efficiency Outsourced IT Business Microsoft Innovation Data Recovery Computer Hardware Business Continuity Cloud Computing Small Business Productivity Managed IT Services Cybersecurity Mobile Devices Managed IT Services Collaboration User Tips Backup Upgrade Google Tech Term Ransomware Communication Phishing Windows 10 Business Management Workplace Tips VoIP Mobile Device IT Support Smartphone Managed Service Provider Smartphones Android Paperless Office Disaster Recovery Quick Tips Data Management Office 365 Remote Monitoring Managed Service Communications Browser Internet of Things Managed IT Server Save Money Business Technology Facebook Social Media Encryption Passwords Network Artificial Intelligence Miscellaneous Saving Money Wi-Fi BDR Virtualization Compliance Help Desk Holiday Microsoft Office Health Government Document Management Remote Work Training Healthcare BYOD Windows 10 Windows 7 Windows Users Office Data Security Applications Employer-Employee Relationship Automation Laptops Password Vendor Management Risk Management Analytics Project Management Chrome Infrastructure SaaS Tip of the week Data loss Storage Processor Avoiding Downtime Telephone Systems Bandwidth Unified Threat Management File Sharing Two-factor Authentication Mobility Antivirus Recovery Redundancy Going Green Blockchain Maintenance Vulnerability Apps IT Management Scam Information Regulations Covid-19 Politics VPN Gadgets Flexibility Customer Relationship Management Company Culture Machine Learning Big Data Access Control Virtual Reality Virtual Private Network IT Service Website Work/Life Balance Bring Your Own Device Hosted Solution Computers Robot Firewall Proactive Tablet Wireless Gmail Software as a Service Computing Mobile Device Management App Router Employee-Employer Relationship Meetings OneDrive RMM Files Hard Drive Money IoT Data Storage Word Twitter The Internet of Things Mobile Security Server Management Settings Networking Social Monitoring Solid State Drive Remote Computing Printing Recycling Downtime Utility Computing Data Breach Electronic Medical Records Electronic Health Records Digital Payment Dark Web Consulting Outlook Customer Service Identity Theft Mobile Office Upgrades Licensing Unified Communications Social Network Employees Managed Services Provider Display Smart Technology Assessment Alert File Management Data Storage Management Remote Monitoring and Management How To Net Neutrality Apple Time Management Professional Services Payment Cards HIPAA Patch Management How To Monitors Consultation Samsung Remote Workers Uninterrupted Power Supply Co-Managed IT Operating System Augmented Reality Internet Exlporer Search Network Management Information Technology Remote Worker Managed Services Cooperation Chromebook Network Congestion Hacker Optimization Social Networking Physical Security Fleet Tracking Tech Terms Content Filtering History User Management Cache Printer Sports Bookmarks Tracking Comparison Business Growth Human Error Current Events Biometric Permissions Star Wars Touchscreen IT Consulting Features Wasting Time Corporate Profile Humor Budget Mobile VoIP Mirgation High-Speed Internet Authentication IT Budget Database Management End of Support IT Assessment Break Fix Nanotechnology ROI Cortana Vendor Staff Trending Legislation Digital Solid State Drives Virtual Machines Education Black Friday Motherboard Asset Tracking Theft G Suite Cabling Batteries Peripheral Hotspot Websites Telephony Favorites Teamwork Development Specifications Automobile MSP Permission Projects Gamification Fraud Database Computer Care WannaCry Office Tips Cyber security Migration Authorization GDPR Digitize Screen Reader Google Drive Notes Taxes Hard Disk Drive Smart Devices Operations Managing Stress Emoji Spyware Options Credit Cards Cyber Monday Mobile Computing Firefox IT Solutions Processors OneNote Financial PCI DSS Language eWaste Statistics SharePoint Conferencing Shared resources Chatbots Cables Mail Merge USB Test Return on Investment Outsource IT Technology Laws Legal Law Enforcement Cyberattacks Voice over Internet Protocol Private Cloud Shadow IT Data Warehousing Smart Tech Techology Personal Information PowerPoint Spam Sensors Unsupported Software Wearable Technology Enterprise Content Management Shortcut Wireless Internet Holidays Lenovo Procurement Disaster 3D Printing Computing Infrastructure Bluetooth Downloads Update Identity Address Software Tips Active Directory Laptop Cost Management Heating/Cooling Unified Threat Management Gadget Read Only WiFi VoIP Dark Data Windows Server 2008 Wires Zero-Day Threat Social Engineering Outsourcing Microsoft Excel Connectivity Disaster Resistance Virus Point of Sale Mobile Data Vulnerabilities Technology Tips Employer/Employee Relationships IT Distributed Denial of Service Modem Superfish Security Cameras Cybercrime Value of Managed Services Alerts Enterprise Resource Planning Multi-Factor Security Instant Messaging Manufacturing Black Market WPA3 Windows Server Remote Working Servers User Error Transportation GPS YouTube Mouse Backup and Disaster Recovery Google Maps Wireless Technology Bitcoin 5G Video Conferencing Proactive IT Computer Repair Crowdsourcing E-Commerce Virtual Assistant Tech Support Telephone IT Technicians Geography Hard Disk Drives Supercomputer Proactive Maintenance Safety Business Telephone Managed IT Service Cookies Notifications Travel IBM Mobile Hacking Google Calendar Botnet Finance Marketing Students Regulation Cleaning Competition Hacks Motion Sickness IP Address Emergency Relocation Hiring/Firing Sync Domains Staffing Fun IT Consultant CrashOverride Mobile Device Managment Public Speaking Error Administrator Presentation Lithium-ion battery CRM Hard Drives Printers Public Cloud