Browse Definitions :
Definition

first-person view (FPV)

First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.

In areas including photography, film, video games, telepresence and virtual reality, first-person views allow the user to experience an environment in a way that they might not have been able to otherwise.

First-person view is common in video games, allowing for immersive play as a character. FPV became common in first-person shooter games after ID Software’s popular Wolfenstein 3D, which put players in the shoes of an agent escaping a Nazi camp to ultimately kill Hitler.

Drone photography uses the flight and mobility of unmanned aerial vehicles (UAV) to enable a first-person view in spots that might otherwise be inaccessible and offers a more affordable “near-there” option for amateur flight enthusiasts. This same technology enables remotely viewing targets for drone surveillance.

First-person views factor into many technologies. Here are a few examples:

  • In architecture, first-person walk-throughs of 3D-rendered CAD (computer-aided design) building plans are common.
  • Many cars provide a first-person view from a camera in the bumper to assist with backing up.
  • FPV in telemedicine allows doctors to confer with distant colleagues, examine remote patients and control surgical robots.
  • Telepresence robots combine a first-person view with a physical representative to simulate physical presence.

 

This was last updated in August 2015

Continue Reading About first-person view (FPV)

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • whaling attack (whaling phishing)

    A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets...

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close