Computerware

VR and AR Made a Scene at CES 2018

VR and AR Made a Scene at CES 2018

The International Consumer Electronics Show (CES) is designed to showcase new technology and products to the world, with a focus on industry professionals and companies that want to showcase their latest projects. The show, which was held in Las Vegas in January, saw the introduction of many consumer products, but the ones that showed off new virtual and augmented reality capabilities made a considerable impact on attendees.

Hype has been building over VR and AR for years now; hype which has failed to meet the considerable expectations placed on the technologies. It turns out that these innovators are coming up with valuable new ways in which to leverage these rather complex technologies.

Virtual Reality
Even now, virtual reality is a huge deal. Manufacturers are still finding ways to develop both hardware and software for it specific use. However, the problem that developers are finding is that VR has taken too central of a role in the entertainment industry compared to its more practical or business-oriented purposes. In the future, manufacturers are hoping to create valuable applications for the technology to keep the demand high.

In an article for Forbes, Charlie Fink showcases that VR will most certainly show a profit, but the market is still only at around $2 billion per annum. Judging from previous trends set by color TV, VCR, PC, cell phones, and the Internet, it’s not beyond the realm of possibility that the standard consumer will see VR as a worthwhile investment before too long. However, Fink points out that “...before VR companies can understand how consumers want to spend, they need to cater to how consumers want to consume.”

Even though it’s not as profitable as other technologies at the moment, VR had a huge presence at CES. New technologies in VR ranged from novelty to necessity, including the HTC Vive Pro and an analytical tool called Looxid. Looxid allows for marketers and analysts to track eye movement and brain activity during use, providing information that should improve the way businesses understand consumers. For a more practical tool, the Meshroom VR headset can turn CAD drawings into legitimate 3D prototypes that can be effective for the use of architecture or engineering.

Regardless, even though VR has been around for quite some time, it is still a developing and volatile technology. It’s clear that it will be worth the investment in the near future--particularly when more useful applications are developed that can take advantage of it.

Augmented Reality
Compared to virtual reality, augmented reality is a bit more tame and less of an attention-grabber. Instead of transporting the user to a virtual world, augmented reality adds virtual elements to your surroundings. The easiest example to help explain this technology is to add a top-down overlay interface to your field of vision, allowing for the viewing of information or analytics at a glance. Yet, AR has found plenty of use in the real world already, from statcasts in the sports world to smartphone games like Pokémon Go. Some developers, like Google and Apple, have invested considerably in the creation of augmented reality applications, and it’s only going to improve in popularity as more companies create effective ways of leveraging AR.

At CES 2018, AR was a prominent force. Manufacturers are finding new and improved ways to take advantage of displays. Some of the more notable products include Vuzix Smart Glasses with Alexa--much like Google Glass, but with Amazon’s Alexa built into it. WinRay’s AR windshield is another device you should keep your eye on. This windshield can display directions, roadside information, and even basic car functions. Even Apple’s iOS 11 comes with built-in AR.

What are some ways that you can think of to take advantage of AR and VR? Let us know in the comments, and be sure to subscribe to our blog.

Is Your Mobile Data Safe?
Tip of the Week: Protecting Your Mobile Device in ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Productivity Managed Service Provider Workplace Tips Data Hardware Business Saving Money Malware Email IT Services IT Support Hosted Solutions Network Security Google Efficiency Small Business Smartphones User Tips Gadgets Quick Tips Mobile Devices Business Continuity Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Innovation Android Server VoIP Social Media Mobile Device Management Smartphone Miscellaneous Upgrade Ransomware Windows 10 Windows Unified Threat Management Collaboration Communication Remote Monitoring Operating System Mobile Computing Data Backup Managed IT services Data Recovery BYOD Remote Computing Holiday Passwords Facebook Cybersecurity IT Support WiFi Vendor Management Tech Term Apps Marketing The Internet of Things communications Automation BDR Users Analytics History Firewall Apple Productivity Internet of Things Alert Data Management Outsourced IT Mobile Device Save Money Managed IT Services IT Consultant App Artificial Intelligence Phishing Content Filtering Big data Going Green Gmail Maintenance Bandwidth Spam Bring Your Own Device Health Office Outlook Budget Windows 8 Best Practice Information Technology Lithium-ion Battery Printer Managed IT Virus Hiring/Firing Tech Support Browser Cybercrime Hard Drives Wireless Technology Antivirus Encryption Search Cost Management Two-factor Authentication IBM Money Document Management Recovery Employer-Employee Relationship Help Desk Computers Hacking Phone System Travel Office 365 Update Risk Management Windows 10 SaaS Customer Service Save Time Training Law Enforcement Humor Website Government Compliance Hard Drive Data storage Access Control Running Cable Proactive IT Administration It Management Saving Time Business Technology VPN Cloud Computing Legal Networking Intranet Education Regulations User Data Breach Disaster Computing Fax Server Machine Learning Hosted Solution Business Intelligence Telephone Systems Excel Project Management End of Support Wireless Robot Digital Payment DDoS Securty Downtime Customer Relationship Management Augmented Reality Solid State Drive Comparison Tablet PowerPoint File Sharing Company Culture Black Market Computer Repair Word Flexibility Social Networking Mobility Password Cortana Laptop Social Engineering Data Security Business Growth Twitter Applications Patch Management Blockchain Current Events Hacker Avoiding Downtime Data Loss Paperless Office iPhone Sports Telephony Pain Points Unified Communications Settings Specifications Safety Taxes Virtual Desktop Net Neutrality Lifestyle Distributed Denial of Service Social Chrome Digital Monitoring Websites Documents Public Cloud Router Start Menu Tech Terms Heating/Cooling IT service Storage Management Mobile Technology Computer Accessories Identity Theft Software as a Service Gaming Console Vulnerabilities Uninterrupted Power Supply Trending Bluetooth Retail Healthcare Webcam Mouse Google Maps Text Messaging Cryptocurrency Virtual Reality eWaste Bitcoin Politics Automobile Google Docs Programming Emails Data Protection Value Statistics Experience Network Congestion Chromebook Cleaning Computing Infrastructure Hack Monitors User Error How To Inbound Marketing Processors Office Tips Co-managed IT Streaming Media Download USB Scam Private Cloud Redundancy YouTube Presentation Software License Touchscreen Trends News Human Resources Micrsooft Read Supercomputer VoIP Multi-Factor Security Application Cost Fraud Consultation Tactics Evernote Drones Microchip Devices Knowledge Worker UTM Content Virtual Assistant Device Management Reading Samsung Technology Tips Business Managemenet Best Practives G Suite IT Plan Enterprise Resource Planning Fake News Content Management Employer Employee Relationship Upselling Digital Signature Legislation Audit Error Permissions Language Licensing Video Surveillance email scam Entertainment Addiction Data Warehousing Hacks Physical Security Teamwork Accountants A.I. Access Music Banking Botnet Saving ZTime Multi-factor Authentication Emergency Information Hard Drive Disposal switches Writing online Currency Microserver Relocation Tablets Sync Migration PDF Connected Devices Microsoft Excel Upgrades Wireless Headphones Computer Care Get More Done Debate Google Drive Network Management Windows Server 2008 Notifications CCTV Harddrive Best Available Equifax Keyboard Fleet Tracking LiFi LinkedIn Spyware Mobile Payment Domains Printer Server Business Metrics Computer Malfunction Device security Vulnerability MSP Turn Key Reliable Computing GPS Work/Life Balance Skype Trojan In Internet of Things External Harddrive Desktop Finance Deep Learning Archive Electricity Nanotechnology Printing Public Speaking Business Cards Service Level Agreement Windows 7 Organize Startup Shortcut Asset Tracking Visible Light Communication Memory Unified Threat Management cache Troubleshooting Backup and Disaster Recovery Television Point of Contact Motion Sickness Thin CLient Entrepreneur Username IT consulting Scalability 3D Ebay Smart Phones Environment Gamification Messenger Tracking WannaCry HIPAA Screen Reader Downloads Piracy Time Management Electronic Payment Upload Freedom of Information CIO Rental Service Meetings Corporate Profile Smart Tech Competition Distribution Advertising Flash Pirating Information Fiber-Optic Assessment Business Owner Database SharePoint Staffing Google Wallet Analytic Webinar Web Server Leadership HTML Managed Service Windows XP Recycling Cabling Adminstration Society Product Reviews Wi-Fi Administrator Mobile Security Tip of the week Displays Books Workers Conferencing Google Calendar IP Address Regulation Capital Productuvuty 3D Printing Managing Stress CrashOverride

toner1.7