Browse Prior Art Database

Manipulation of Keyboards for Portable PCs

IP.com Disclosure Number: IPCOM000111652D
Original Publication Date: 1994-Mar-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 52K

Publishing Venue

IBM

Related People

Manthuruthil, GC: AUTHOR [+3]

Abstract

This article proposes a method for the greater role for the application and the users to specify the exact type, size and layout of the keyboard and, also, for the exploitation of touch-sensitive screens.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 58% of the total text.

Manipulation of Keyboards for Portable PCs

      This article proposes a method for the greater role for the
application and the users to specify the exact type, size and layout
of the keyboard and, also, for the exploitation of touch-sensitive
screens.

      The display and the keyboard are made smaller than usual in
portable PCs because of the size limitation.  This reduces the
usability of the machine and causes discomfort to the user.

      In touch-sensitive screens, the keyboard can be painted on the
screen while the rest of the screen is used for the display purpose.
Similar design is implemented in pen-computers.  However, the user
will typically use a variety of applications in his PC.  Each of
these applications may not use the complete keyboard: e.g., all the
function keys and the numeric keypad are not used by all the
applications or by the unsophisticated user of the applications.

      This article proposes a method to define or change the keyboard
painted on the touch-sensitive screen.  A daemon process can be
running always in the background and for each application keeps track
of the keyboard usage (or, more appropriately, lack of keyboard
usage).  The user then has a couple of options to reclaim the
'keyboard space':

o   He may, at his convenience, request all the unused keys to be
    erased off the screen.  The assumption is made that after a long-
    enough usage, the unused keys identified by the daemon process
   ...