Browse Definitions :
Definition

virtual presence

Virtual presence is the ability of a user to feel that they are actually in a virtual location such as a web site or an immersive simulation using technologies like virtual reality (VR) or augmented reality (AR). In VR, the perceptual illusion of presence is often dependent upon technologies that enable immersiveness.

Virtual presence focuses on placing users in simulated environments and making users who are simultaneously present in the same virtual environment aware of each other’s presence. Visitors using virtual presence sites are considered to be virtually present and are displayed for others.

The systems used for virtual presence consist of location collectors, presence computation and presence display along with synchronous communication between the host and its users. Location collectors gather information about locations browsed. Presence computation integrates the incoming data into presence lists and presence displays show those lists. The specifics about how these systems are implemented can vary greatly: location collection can happen on the device/client level, the server level or the network level.

In multiplayer gaming, VR chat and other 3D virtual spaces, virtual presence is referred to simply as presence, which can be confusing. Many also confuse virtual presence with TelePresence, which is used to make people virtually present in real world locations for purposes such as business meetings or conferences.

This was last updated in June 2018

Continue Reading About virtual presence

Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close