Browse Definitions :
Definition

drone glasses (drone goggles)

Contributor(s): Ivy Wigmore

Drone glasses are eyewear that gives someone flying an unmanned aerial vehicle (UAV) a first-person view of where the drone flies. The heads-up display (HUD) gear may look fairly similar to regular glasses or may be goggles instead, in which case they may be called drone goggles.

Epson's Moverio BT-300FPV Smart Glasses are an augmented reality (AR) version that superimposes the drone video feed over the user's field of view without blocking everything. The FPV feed appears as a transparent screen that includes the environment around the drone along with flight statistics while the user's environment is also visible. That means that the user can keep an eye on the drone itself while watching the FPV feed. That is a useful feature because drone goggles that completely or almost completely obscure the user's field of vision can dramatically increase the risk of losing the drone.

Considerations for purchasing drone glasses or goggles include:

  • Weight: Lighter is better
  • Fit: Glasses that shift around due to improper fit can cause the same physical symptoms as simulator sickness.
  • Adjustable for interpupilary distance: IPD varies from one person to another and glasses should adjust to accommodate the user.
  • Glass optics rather than plastic: Glass provides greater clarity and image quality.
  • Resolution: Should be either SVGA (800 x 600 pixels) or FWVGA (854 x 480 pixels).
  • Digital head tracking: Allows the drone view to orient to the user's view, shifting in accordance with the user's head position.

Ed Ricker reviews Epson's Moviero BT-300FPV Smart Glasses:

This was last updated in December 2017

Continue Reading About drone glasses (drone goggles)

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close