Computerware

VR and AR Made a Scene at CES 2018

VR and AR Made a Scene at CES 2018

The International Consumer Electronics Show (CES) is designed to showcase new technology and products to the world, with a focus on industry professionals and companies that want to showcase their latest projects. The show, which was held in Las Vegas in January, saw the introduction of many consumer products, but the ones that showed off new virtual and augmented reality capabilities made a considerable impact on attendees.

Hype has been building over VR and AR for years now; hype which has failed to meet the considerable expectations placed on the technologies. It turns out that these innovators are coming up with valuable new ways in which to leverage these rather complex technologies.

Virtual Reality
Even now, virtual reality is a huge deal. Manufacturers are still finding ways to develop both hardware and software for it specific use. However, the problem that developers are finding is that VR has taken too central of a role in the entertainment industry compared to its more practical or business-oriented purposes. In the future, manufacturers are hoping to create valuable applications for the technology to keep the demand high.

In an article for Forbes, Charlie Fink showcases that VR will most certainly show a profit, but the market is still only at around $2 billion per annum. Judging from previous trends set by color TV, VCR, PC, cell phones, and the Internet, it’s not beyond the realm of possibility that the standard consumer will see VR as a worthwhile investment before too long. However, Fink points out that “...before VR companies can understand how consumers want to spend, they need to cater to how consumers want to consume.”

Even though it’s not as profitable as other technologies at the moment, VR had a huge presence at CES. New technologies in VR ranged from novelty to necessity, including the HTC Vive Pro and an analytical tool called Looxid. Looxid allows for marketers and analysts to track eye movement and brain activity during use, providing information that should improve the way businesses understand consumers. For a more practical tool, the Meshroom VR headset can turn CAD drawings into legitimate 3D prototypes that can be effective for the use of architecture or engineering.

Regardless, even though VR has been around for quite some time, it is still a developing and volatile technology. It’s clear that it will be worth the investment in the near future--particularly when more useful applications are developed that can take advantage of it.

Augmented Reality
Compared to virtual reality, augmented reality is a bit more tame and less of an attention-grabber. Instead of transporting the user to a virtual world, augmented reality adds virtual elements to your surroundings. The easiest example to help explain this technology is to add a top-down overlay interface to your field of vision, allowing for the viewing of information or analytics at a glance. Yet, AR has found plenty of use in the real world already, from statcasts in the sports world to smartphone games like Pokémon Go. Some developers, like Google and Apple, have invested considerably in the creation of augmented reality applications, and it’s only going to improve in popularity as more companies create effective ways of leveraging AR.

At CES 2018, AR was a prominent force. Manufacturers are finding new and improved ways to take advantage of displays. Some of the more notable products include Vuzix Smart Glasses with Alexa--much like Google Glass, but with Amazon’s Alexa built into it. WinRay’s AR windshield is another device you should keep your eye on. This windshield can display directions, roadside information, and even basic car functions. Even Apple’s iOS 11 comes with built-in AR.

What are some ways that you can think of to take advantage of AR and VR? Let us know in the comments, and be sure to subscribe to our blog.

Is Your Mobile Data Safe?
Tip of the Week: Protecting Your Mobile Device in ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Managed Service Provider Backup Productivity Workplace Tips Data Saving Money Hardware Business Malware Email IT Support Hosted Solutions IT Services Google Network Security Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices Business Continuity User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Server Android VoIP Social Media Mobile Device Management Smartphone Windows 10 Upgrade Innovation Miscellaneous Unified Threat Management Windows Ransomware Operating System Remote Monitoring Passwords Holiday Remote Computing Mobile Computing Communication Apps BYOD Collaboration WiFi Vendor Management Marketing Facebook Cybersecurity The Internet of Things Analytics Firewall History Users Apple Managed IT services Productivity Data Management communications Alert IT Support Save Money Data Recovery Phishing Outsourced IT App Internet of Things Automation IT Consultant Managed IT Services Data Backup Bring Your Own Device Office Big data Gmail Bandwidth Content Filtering Health Spam BDR Mobile Device Hard Drives Windows 8 Wireless Technology Outlook Antivirus Tech Term Search Maintenance Artificial Intelligence Printer Budget Tech Support Virus Information Technology Lithium-ion Battery Best Practice Going Green Managed IT Browser Hiring/Firing Cybercrime Encryption Help Desk Computers Hacking Cost Management Office 365 Update Money Recovery Phone System IBM Employer-Employee Relationship Running Cable Proactive IT Networking Legal Saving Time VPN Administration Travel Intranet It Management Education Training Humor SaaS Risk Management Customer Service Two-factor Authentication Hard Drive Law Enforcement Save Time Compliance Website Government Data storage Document Management Cloud Computing Company Culture Augmented Reality Word Laptop Computer Repair PowerPoint Access Control Password Cortana Business Growth Social Networking Hacker Fax Server Twitter Data Security Regulations Paperless Office Telephone Systems Blockchain Data Loss User Avoiding Downtime Disaster End of Support Hosted Solution Robot iPhone Business Intelligence Data Breach Wireless Securty DDoS Digital Payment Windows 10 Downtime Excel Mobility Solid State Drive Project Management Social Engineering Flexibility Current Events Black Market Comparison Tablet Vulnerabilities Co-managed IT Mobile Technology Retail Cryptocurrency Trending User Error Computing Infrastructure Hack Google Docs Mouse Gaming Console Software as a Service How To eWaste Uninterrupted Power Supply Value Private Cloud Experience Monitors Programming Webcam Cleaning Statistics Text Messaging Office Tips Network Congestion Telephony Lifestyle Bitcoin Data Protection Taxes Applications Processors USB YouTube Business Technology Distributed Denial of Service Sports Streaming Media Presentation Unified Communications Settings Patch Management Inbound Marketing Computing Public Cloud Virtual Desktop Specifications Safety Scam Net Neutrality Redundancy Identity Theft Social IT service Chrome Pain Points Documents Heating/Cooling Google Maps Router Digital Politics Storage Virtual Reality Emails Bluetooth Computer Accessories Websites Automobile Start Menu Tech Terms Chromebook Customer Relationship Management Deep Learning Saving ZTime Access Messenger Tracking Domains Equifax Work/Life Balance LinkedIn Emergency Hard Drive Disposal Webinar Computer Care Rental Service Meetings Public Speaking Device security Visible Light Communication Memory Microsoft Excel Healthcare Skype Debate Download Web Server Shortcut Desktop IT consulting Archive Harddrive Google Drive Windows Server 2008 Cabling Nanotechnology Entrepreneur Business Cards Spyware Mobile Payment Books Workers Troubleshooting Startup GPS Vulnerability Wi-Fi Administrator CIO Point of Contact External Harddrive Electricity Printing Supercomputer HIPAA Advertising Flash Environment Unified Threat Management Backup and Disaster Recovery Microchip Competition Windows XP Windows 7 Machine Learning Worker Electronic Payment Screen Reader Staffing Google Wallet Piracy Displays Thin CLient cache Television Reading Samsung Business Owner Smart Tech Society Best Practives 3D Ebay Database Micrsooft Analytic Smart Phones WannaCry Downloads Employer Employee Relationship IP Address HTML Recycling G Suite Fiber-Optic Product Reviews Corporate Profile Hacks Physical Security Application Mobile Security Microserver Time Management Freedom of Information Licensing Human Resources Conferencing Drones Botnet Software License Read Leadership Assessment SharePoint Relocation Tablets Multi-Factor Security Adminstration Pirating Information Banking Fraud Tactics Google Calendar File Sharing Devices Permissions Language Get More Done Tip of the week Sync Printer Server VoIP Notifications CCTV Digital Signature UTM Device Management Turn Key Touchscreen News Monitoring Knowledge Business Metrics Computer Malfunction Teamwork IT Plan switches Writing Content Management Consultation Evernote Reliable Computing Entertainment Legislation Music Business Managemenet Trojan email scam Addiction Upgrades Organize Technology Tips Accountants Virtual Assistant In Internet of Things Audit Multi-factor Authentication LiFi online Currency Upselling Fake News PDF Management Video Surveillance Motion Sickness Best Available Keyboard Migration Data Warehousing Scalability Wireless Headphones Productuvuty 3D Printing CrashOverride Capital

toner1.7