Solved

How to create/program a new keyboard?

Posted on 2006-10-21
3
168 Views
Last Modified: 2010-04-25
I would like to create a new keyboard.  One that fits a particular need.  I do not know how to build one, what parts to use, or how to program a driver for it.  Basically, I really have no idea what I'm talking about.  So here is my question:  What do I need to learn to make this happen?  In other words, what do I need to know, where do I need to go to educate myself on how to make this happen?  Are there websites about this?  Is there a particular college path I should consider?  Are there any books that could help guide me in the right direction?
0
Comment
Question by:Clock72
  • 2
3 Comments
 
LVL 23

Accepted Solution

by:
Danny Child earned 125 total points
ID: 17787748
Here's some info.  All a keyboard is is a set of microswitches connected to a small processor to interpret the Scan Codes generated, which then sends them to the PC.  There, they are stored in the keyboard buffer, and executed by the cpu accordingly

the most useful:
http://www.beyondlogic.org/keyboard/keybrd.htm

bit hardcore:
http://www.cs.cmu.edu/afs/cs/usr/jmcm/www/info/key2.txt

http://webster.cs.ucr.edu/AoA/DOS/ch20/CH20-1.html
and
http://webster.cs.ucr.edu/Page_win32/IczelionTuts/tut6.html

but basically, depending on your needs, knowledge of microelectronics, and assembler are going to be pretty core skills.  But, if you have as you say a particular need in mind, I'd see whether a nearby manufacturer could help you out.  just google for Custom Keyboards and there's everything out there - Point of Sale terminals, ones for Disabled users, Kids, specialist needs, the works...

hth, Danny
0
 

Author Comment

by:Clock72
ID: 17792530
Thanks Danny

That was exactly the start I was looking for.  
0
 
LVL 23

Expert Comment

by:Danny Child
ID: 17801670
glad to be of service.  Ta for the points and grade.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Computer running slow? Taking forever to open a folder, documents, or any programs that you didn't have an issue with before? Here are a few steps to help speed it up. The programs mentioned below ALL have free versions, you can buy them if you w…
Skype is a P2P (Peer to Peer) instant messaging and VOIP (Voice over IP) service – as well as a whole lot more.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

947 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now