Browse Definitions :
Definition

VR room (virtual reality room)

A VR room is a self-contained area that is customized with embedded or portable technologies that allow it to deliver or enhance a multimedia virtual reality experience. Unlike seated or stationary VR, a VR room allows the user to move around with a fair degree of freedom, which more closely replicates a real-world experience. VR rooms are often used for virtual reality gaming.

Virtual reality rooms were the original option for enabling a virtual environment. Prior to the miniaturization of display technologies that could support VR headsets, virtual reality rooms were necessary to deliver a 360° visual experience. VR combat flight training, developed decades ago for the United States military, used screens surrounding the pilot to simulate the view around a fighter jet cockpit. The same technique was used in rooms and displays with projectors. VR rooms based on projectors are sometimes called CAVEs (cave automatic virtual environment). Some VR rooms also include physical objects to correspond to virtual world objects as a form of passive haptics (tactile feedback).

The current trend in VR rooms is the use of a cleared space that need not be permanently dedicated for VR. That VR type is distinguished from more permanent VR environments by the term room-scale VR.

Explore Virginia Tech’s virtual reality room:

This was last updated in August 2016

Continue Reading About VR room (virtual reality room)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close