Browse Definitions :
Definition

auto 3-D (autostereoscopic imaging)

Auto 3-D, more formally known as autostereoscopic imaging, is a display technology that enables a 3-D (three dimensional) effect without requiring the viewer to wear special glasses.

Stereoscopy is defined as any technology that enables an illusion of depth in a display. Traditional 3-D TV (and movies as well) typically enable that effect by presenting two separate images – one for the right eye and one for the left – that are incorporated through the use of 3-D glasses. In an auto 3-D display, screen-based technologies allow a viewer sitting within a specified range to perceive depth in the display through the naked eye.

There are two classes of autostereoscopic displays. One type tracks the viewer’s head position to ensure that each eye is presented with a different view. The other type of display uses multiple perspectives of each frame presented simultaneously so that, within a given range, a viewer will see separate perspectives with each eye.

See a video demonstration of LG's Autostereoscopic TV:

See also: HDTV (high definition television), interactive TV, IPTV (Internet Protocol television), digital television (DTV), Fast Guide to DTV

 

Continue reading about Auto 3-D:

> Flat panel TV Guide

> The future of 3D TV: Autostereoscopic TV

> Autostereoscopy

> The science behind 3D gaming: Autostereoscopy

This was last updated in July 2011

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

Close