facebook linkedin twitter

VR and AR Made a Scene at CES 2018

VR and AR Made a Scene at CES 2018

The International Consumer Electronics Show (CES) is designed to showcase new technology and products to the world, with a focus on industry professionals and companies that want to showcase their latest projects. The show, which was held in Las Vegas in January, saw the introduction of many consumer products, but the ones that showed off new virtual and augmented reality capabilities made a considerable impact on attendees.

Hype has been building over VR and AR for years now; hype which has failed to meet the considerable expectations placed on the technologies. It turns out that these innovators are coming up with valuable new ways in which to leverage these rather complex technologies.

Virtual Reality
Even now, virtual reality is a huge deal. Manufacturers are still finding ways to develop both hardware and software for it specific use. However, the problem that developers are finding is that VR has taken too central of a role in the entertainment industry compared to its more practical or business-oriented purposes. In the future, manufacturers are hoping to create valuable applications for the technology to keep the demand high.

In an article for Forbes, Charlie Fink showcases that VR will most certainly show a profit, but the market is still only at around $2 billion per annum. Judging from previous trends set by color TV, VCR, PC, cell phones, and the Internet, it’s not beyond the realm of possibility that the standard consumer will see VR as a worthwhile investment before too long. However, Fink points out that “...before VR companies can understand how consumers want to spend, they need to cater to how consumers want to consume.”

Even though it’s not as profitable as other technologies at the moment, VR had a huge presence at CES. New technologies in VR ranged from novelty to necessity, including the HTC Vive Pro and an analytical tool called Looxid. Looxid allows for marketers and analysts to track eye movement and brain activity during use, providing information that should improve the way businesses understand consumers. For a more practical tool, the Meshroom VR headset can turn CAD drawings into legitimate 3D prototypes that can be effective for the use of architecture or engineering.

Regardless, even though VR has been around for quite some time, it is still a developing and volatile technology. It’s clear that it will be worth the investment in the near future--particularly when more useful applications are developed that can take advantage of it.

Augmented Reality
Compared to virtual reality, augmented reality is a bit more tame and less of an attention-grabber. Instead of transporting the user to a virtual world, augmented reality adds virtual elements to your surroundings. The easiest example to help explain this technology is to add a top-down overlay interface to your field of vision, allowing for the viewing of information or analytics at a glance. Yet, AR has found plenty of use in the real world already, from statcasts in the sports world to smartphone games like Pokémon Go. Some developers, like Google and Apple, have invested considerably in the creation of augmented reality applications, and it’s only going to improve in popularity as more companies create effective ways of leveraging AR.

At CES 2018, AR was a prominent force. Manufacturers are finding new and improved ways to take advantage of displays. Some of the more notable products include Vuzix Smart Glasses with Alexa--much like Google Glass, but with Amazon’s Alexa built into it. WinRay’s AR windshield is another device you should keep your eye on. This windshield can display directions, roadside information, and even basic car functions. Even Apple’s iOS 11 comes with built-in AR.

What are some ways that you can think of to take advantage of AR and VR? Let us know in the comments, and be sure to subscribe to our blog.

Is Your Mobile Data Safe?
Tip of the Week: Protecting Your Mobile Device in ...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Hackers Business Computing Business Management Microsoft Data Workplace Tips Backup Managed Service Provider Productivity Hardware Business Saving Money Network Security Email Malware IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips User Tips Smartphones Mobile Devices Gadgets Innovation Business Continuity Disaster Recovery Android Social Media Microsoft Office VoIP Mobile Office Virtualization Network Data Backup Smartphone Mobile Device Management Collaboration Communication Server Data Recovery Miscellaneous Productivity Upgrade Tech Term Ransomware Windows 10 IT Support Unified Threat Management Windows Holiday Remote Monitoring Operating System Passwords communications Facebook Cybersecurity Mobile Computing BYOD Vendor Management Managed IT services Remote Computing Apps Users WiFi BDR Phishing Analytics Automation The Internet of Things Marketing Mobile Device Outsourced IT History Apple Firewall Alert Artificial Intelligence Internet of Things Browser Save Money Managed IT Services Data Management Big data IT Consultant Encryption App Maintenance Office Printer Bring Your Own Device Gmail Bandwidth Antivirus Health Spam Content Filtering Going Green Two-factor Authentication Help Desk Tech Support Wireless Technology Virus Search Cybercrime Managed IT Business Technology Hiring/Firing Cloud Computing Cost Management Hard Drives Lithium-ion Battery Best Practice Information Technology Windows 10 Office 365 Windows 8 Outlook Saving Time Budget Travel Training Update Access Control Recovery Employer-Employee Relationship Phone System Blockchain Money Hacking Document Management IBM Computers VPN Intranet Twitter Healthcare Customer Service SaaS Humor Education Law Enforcement Applications Website Administration Risk Management Government Compliance Hard Drive Managed Service It Management Data storage Save Time Mobility Proactive IT Networking Running Cable Legal Information Regulations Sports Machine Learning Augmented Reality Computing Telephone Systems Social PowerPoint Disaster End of Support Wireless Hosted Solution Robot DDoS Securty File Sharing Data Security Business Intelligence Solid State Drive Google Maps Digital Payment Word Avoiding Downtime Flexibility Router Downtime Black Market Patch Management Data Loss Password Cortana Current Events Cryptocurrency Social Engineering Value Laptop Scam Comparison Tablet iPhone Hacker Company Culture Business Growth Data Breach Computer Repair Social Networking Excel Project Management Digital Fax Server Customer Relationship Management Paperless Office Websites User Start Menu Tech Terms Specifications Safety Unified Communications Settings Microchip Taxes Virtual Desktop Gaming Console Mobile Technology Distributed Denial of Service Vendor Documents Streaming Media Software as a Service Uninterrupted Power Supply Public Cloud Entertainment Text Messaging Heating/Cooling Webcam Storage IT service Net Neutrality Identity Theft Bitcoin Chrome Data Protection Retail Bluetooth Conferencing Politics Virtual Reality eWaste Inbound Marketing Computer Accessories Automobile Emails Google Docs Co-managed IT Chromebook Monitoring User Error Pain Points Trending Computing Infrastructure Hack Experience Redundancy Mouse Monitors How To Processors Cleaning Office Tips Private Cloud Evernote Download USB Management Presentation Statistics Lifestyle Programming YouTube Network Congestion Telephony Vulnerabilities Micrsooft Device security Worker MSP Data Warehousing Bookmark Saving ZTime Best Practives Emergency Hard Drive Disposal Reading Desktop Samsung Finance Google Play Access Nanotechnology Social Network Drones Processor Harddrive Recycling Computer Care G Suite Startup Asset Tracking Debate Microserver Analytic Microsoft Excel Business Cards Digital Signature Employer Employee Relationship Service Level Agreement Licensing Username GPS Product Reviews Permissions Language Google Drive Windows Server 2008 Hacks Unified Threat Management Teamwork Physical Security Backup and Disaster Recovery Browsers Vulnerability Relocation Tablets Gamification Security Cameras Spyware Mobile Payment Banking Botnet Screen Reader Customer Resource management User Tip External Harddrive Get More Done Read Upload Navigation Printer Server switches Writing Electricity Printing Sync Smart Tech PDF Distribution Turn Key Music Piracy Trojan Device Management Upgrades HTML 3D Ebay Windows 7 Notifications Fiber-Optic Best Available CCTV Database Keyboard Data Analysis Thin CLient Reliable Computing Mobile Security Domains GDPR Organize Business Managemenet LiFi cache Television Business Metrics Computer Malfunction Telephone System Smart Phones Content Management Software License Trends Public Speaking Tech WannaCry Downloads In Internet of Things Multi-Factor Security Cost online Currency Deep Learning Corporate Profile Devices Adminstration Pirating Information Work/Life Balance Time Management Freedom of Information Fraud Tactics Shortcut Fileless Malware Leadership Scalability UTM Troubleshooting Content Modem Visible Light Communication Memory Assessment SharePoint Motion Sickness Entrepreneur Proxy Server Messenger IT Plan HIPAA Tracking Enterprise Resource Planning Term Webinar LinkedIn IT consulting Google Calendar Legislation Environment Error Electronic Medical Records Tip of the week VoIP Accountants Electronic Payment A.I. Touchscreen News Rental Service email scam Meetings Addiction Competition Directions Archive CIO Knowledge Multi-factor Authentication Business Owner Cabling SSID Skype Advertising Flash Consultation Web Server Dark Web Virtual Assistant Books Migration Workers Connected Devices IP Address Processing Upselling Windows XP Technology Tips Wi-Fi Administrator Wireless Headphones Telephone Health IT Staffing Google Wallet Managed IT Service Displays Audit Equifax Fleet Tracking Human Resources Video Surveillance Point of Contact Society Fake News Supercomputer Network Management Application Cooperation Productuvuty Medical IT Managing Stress Printers Regulation 3D Printing CrashOverride Capital

toner1