Browse Definitions :
Definition

first-person view (FPV)

First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.

In areas including photography, film, video games, telepresence and virtual reality, first-person views allow the user to experience an environment in a way that they might not have been able to otherwise.

First-person view is common in video games, allowing for immersive play as a character. FPV became common in first-person shooter games after ID Software’s popular Wolfenstein 3D, which put players in the shoes of an agent escaping a Nazi camp to ultimately kill Hitler.

Drone photography uses the flight and mobility of unmanned aerial vehicles (UAV) to enable a first-person view in spots that might otherwise be inaccessible and offers a more affordable “near-there” option for amateur flight enthusiasts. This same technology enables remotely viewing targets for drone surveillance.

First-person views factor into many technologies. Here are a few examples:

  • In architecture, first-person walk-throughs of 3D-rendered CAD (computer-aided design) building plans are common.
  • Many cars provide a first-person view from a camera in the bumper to assist with backing up.
  • FPV in telemedicine allows doctors to confer with distant colleagues, examine remote patients and control surgical robots.
  • Telepresence robots combine a first-person view with a physical representative to simulate physical presence.

 

This was last updated in August 2015

Continue Reading About first-person view (FPV)

Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

  • Common Body of Knowledge (CBK)

    In security, the Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional...

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close