Browse Definitions :
Definition

first-person view (FPV)

First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.

In areas including photography, film, video games, telepresence and virtual reality, first-person views allow the user to experience an environment in a way that they might not have been able to otherwise.

First-person view is common in video games, allowing for immersive play as a character. FPV became common in first-person shooter games after ID Software’s popular Wolfenstein 3D, which put players in the shoes of an agent escaping a Nazi camp to ultimately kill Hitler.

Drone photography uses the flight and mobility of unmanned aerial vehicles (UAV) to enable a first-person view in spots that might otherwise be inaccessible and offers a more affordable “near-there” option for amateur flight enthusiasts. This same technology enables remotely viewing targets for drone surveillance.

First-person views factor into many technologies. Here are a few examples:

  • In architecture, first-person walk-throughs of 3D-rendered CAD (computer-aided design) building plans are common.
  • Many cars provide a first-person view from a camera in the bumper to assist with backing up.
  • FPV in telemedicine allows doctors to confer with distant colleagues, examine remote patients and control surgical robots.
  • Telepresence robots combine a first-person view with a physical representative to simulate physical presence.

 

This was last updated in August 2015

Continue Reading About first-person view (FPV)

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close