Browse Definitions :
Definition

first-person view (FPV)

First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.

In areas including photography, film, video games, telepresence and virtual reality, first-person views allow the user to experience an environment in a way that they might not have been able to otherwise.

First-person view is common in video games, allowing for immersive play as a character. FPV became common in first-person shooter games after ID Software’s popular Wolfenstein 3D, which put players in the shoes of an agent escaping a Nazi camp to ultimately kill Hitler.

Drone photography uses the flight and mobility of unmanned aerial vehicles (UAV) to enable a first-person view in spots that might otherwise be inaccessible and offers a more affordable “near-there” option for amateur flight enthusiasts. This same technology enables remotely viewing targets for drone surveillance.

First-person views factor into many technologies. Here are a few examples:

  • In architecture, first-person walk-throughs of 3D-rendered CAD (computer-aided design) building plans are common.
  • Many cars provide a first-person view from a camera in the bumper to assist with backing up.
  • FPV in telemedicine allows doctors to confer with distant colleagues, examine remote patients and control surgical robots.
  • Telepresence robots combine a first-person view with a physical representative to simulate physical presence.

 

This was last updated in August 2015

Continue Reading About first-person view (FPV)

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close