Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Mobile/Wireless Computing
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

Microsoft Research project tackles mobile touch-screen problems

Shift technology uses a finger rather than a stylus
 
Click here to find out more!

Sign up to receive Security Resource Alerts

May 16, 2007 (IDG News Service) -- SEATTLE -- A computer science student and a developer at Microsoft Research have created a technique designed to make it easier to select items on a mobile-phone screen with a finger rather than a pointed stylus.

The development comes just before Apple Inc.'s much-anticipated iPhone, with its touch screen, hits the market in June.

The Microsoft Research project, called Shift, automatically displays an image on the screen above where a users places his finger showing the area under the user's finger. The image is circular and includes a small "X." By toggling the tip of his finger, a user can move the X to place it on top of the item he wants to choose. Lifting the finger from the screen selects the item.

Daniel Vogel, a Ph.D. candidate at the University of Toronto, and Patrick Baudisch, a scientist at Microsoft Research, developed the technology to solve several problems with mobile-phone touch screens. Many such screens are designed to be used with a stylus, which can be cumbersome to use, particularly with just one hand. In addition, programs that are designed to be used with a stylus may feature small icons that are difficult to select with a fingertip, the researchers said.

Shift builds on technology already developed known as Offset Cursor. Offset Cursor displays a cursor just above the spot a user touches on the screen. That allows users to place their fingers below the items they want to choose so that they can see the items rather than hiding them with their fingers.

Vogel and Baudisch said Offset Cursor has drawbacks, particularly for users trying to choose an icon near the edge of the screen. Because Offset Cursor displays the cursor above the finger, it can't be used to choose icons at the bottom of the screen.

Shift only displays the image when necessary, so if a user touches a large item, Shift doesn't pop up the circular image.

Vogel and Baudisch published a paper (download PDF) about Shift at the Computer Human Interaction Conference earlier this month. They also created a short video (download file) with a demonstration of how Shift works.

Technologies developed at Microsoft Research don't necessarily become products that the company sells. The group, which has 700 researchers in five laboratories around the world and often collaborates with university researchers, works on a wide range of products. It may work with other groups at Microsoft to incorporate their developments into products, or it may sell technology to external organizations.


Reprinted with permission from


Story copyright 2006 International Data Group. All rights reserved.

Recommendations Recommendations: 5  —  Recommend this article

Print this Story Send Us Feedback E-mail this Story Digg! Digg this Story Slashdot this Story

Post a new comment

The content of this field is kept private and will not be shown publicly.
" I need a battery for my mobile phone and needless to say my first port of call was eBay. There..." Read more...
" I'm in the middle of writing some articles at the moment on a technology called VoiceXML. I've only..." Read more...
Read more Mobile/Wireless posts or See all Blogs
FCC: iPhone approved for sale
FAQ: The H-1B battle reaches the boiling point again
India warns visa issue could have wider impact
More top stories...
Report: Rogue Rx sales on the rise
TechGear: Did Engadget hurt Apple?
Q&A: Microsoft won't sue over Linux, for now
We fondly recall 21 overpromoted products and technologies that utterly failed to live up to their hype. You choose the biggest flop of all.
Cell phone calls are banned from flights because neither the airlines nor the government nor the wireless carriers want it. Here's why.
We put four of the leading external hard drives to the test and found remarkable differences between the models.
Just because an extension is popular doesn't mean it belongs in your Web browser.
Tech Dispenser is Computerworld's new human-powered technology blog network and news aggregator, with sites and links hand-selected by Computerworld's editors.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
Check out this Zone to learn more about Storage Consolidation.
All Zones
Customer Experience Management Zone
Open iSCSI SAN Zone
Server Management Zone
The SAS Zone
The SOA Zone
Software Zone
Storage Consolidation Zone

Ads by TechWords

See your link here
Intrusion Protection
Download this Executive Snapshot, compliments of Core Security, a $ 195 value, FREE!
(Source: Computerworld) Everyone is demanding that IT managers do a better job of securing critical data and systems. Meanwhile, hackers are doing a better and quicker job of exploiting vulnerabilities in corporate networks. Read this Computerworld report to learn about the capabilities of different types of firewall, IDS, and IPS tools, and best practices for deploying them. This report is available free (a $195 value) for a limited time.
Download this executive briefing download
ROI Case Study: Cognos and Avaya
Get this case study now
(Source: Cognos) This case study shows that by extending its Cognos deployment to its value chain operations, Avaya obtained visibility into global operations, protected itself from a supply disruption, and improved worker productivity.
Download this white paper go
Securing the Enterprise Infrastructure from Wireless Threats
Securing the Enterprise Infrastructure from Wireless Threats
Download this on demand webcast now!
Go to the webcast 
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Endpoint Data Protection Benchmark Report from Aberdeen Group
Addressing Storage Management Challenges With Scalable NAS
Security Beyond Today: Layered security for addressing fraud today...and adapting to tomorrow
View more whitepapers