Browse Definitions :
Definition

virtual presence

Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR). In VR, the perceptual illusion of presence is often dependent upon technologies that enable immersiveness.

Virtual presence focuses on placing users in simulated environments and making users who are simultaneously present in the same virtual environment aware of each other’s presence. Visitors using virtual presence sites are considered to be virtually present and are displayed for others.

The systems used for virtual presence consist of location collectors, presence computation and presence display along with synchronous communication between the host and its users. Location collectors gather information about locations browsed. Presence computation integrates the incoming data into presence lists and presence displays show those lists. The specifics about how these systems are implemented can vary greatly: location collection can happen on the device/client level, the server level or the network level.

In multiplayer gaming, VR chat and other 3D virtual spaces, virtual presence is referred to simply as presence, which can be confusing. Many also confuse virtual presence with TelePresence, which is used to make people virtually present in real world locations for purposes such as business meetings or conferences.

This was last updated in June 2018

Continue Reading About virtual presence

Networking
  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

Security
  • cloud penetration testing

    Cloud penetration testing is a tactic an organization uses to assess its cloud security effectiveness by attempting to evade its ...

  • cloud workload protection platform (CWPP)

    A cloud workload protection platform (CWPP) is a security tool designed to protect workloads that run on premises, in the cloud ...

  • out-of-band authentication

    Out-of-band authentication is a type of two-factor authentication (2FA) that requires a secondary verification method through a ...

CIO
  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

HRSoftware
  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close