Browse Definitions :
Definition

first-person view (FPV)

First-person view (FPV), also known as first-person point of view (POV), is the ability of the user of some technology to see from a particular visual perspective other than one's actual location, such as the environment of a character in a video game, a drone, or a telemedicine client.

In areas including photography, film, video games, telepresence and virtual reality, first-person views allow the user to experience an environment in a way that they might not have been able to otherwise.

First-person view is common in video games, allowing for immersive play as a character. FPV became common in first-person shooter games after ID Software’s popular Wolfenstein 3D, which put players in the shoes of an agent escaping a Nazi camp to ultimately kill Hitler.

Drone photography uses the flight and mobility of unmanned aerial vehicles (UAV) to enable a first-person view in spots that might otherwise be inaccessible and offers a more affordable “near-there” option for amateur flight enthusiasts. This same technology enables remotely viewing targets for drone surveillance.

First-person views factor into many technologies. Here are a few examples:

  • In architecture, first-person walk-throughs of 3D-rendered CAD (computer-aided design) building plans are common.
  • Many cars provide a first-person view from a camera in the bumper to assist with backing up.
  • FPV in telemedicine allows doctors to confer with distant colleagues, examine remote patients and control surgical robots.
  • Telepresence robots combine a first-person view with a physical representative to simulate physical presence.

 

This was last updated in August 2015

Continue Reading About first-person view (FPV)

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • Secure Shell (SSH)

    SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system ...

  • NIST Cybersecurity Framework

    The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser.

  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

Close