Skip to main content

The latest HoloLens video clarifies its limited field-of-view

Coming out of E3, and when we sat down and got a hands on with the Microsoft HoloLens, one thing were abundantly clear: the technology on offer is as cool as the field of view is small. Now, Microsoft has released a video that provides would-be users with a better look at the FOV limitation,  so those who can’t go hands on with the device itself can actually see what they’ll be working with.

During its press briefing at E3 2015, Microsoft showed off a demo of the HoloLens with a special camera that let us see the world of Minecraft playing out on a table in 3D. Even for the most cynical folks on the Internet, it was hard not to be impressed. Sure, the demo-er looked ridiculous pulling and twisting at his table when the non-HoloLens view was shown, but when we could see what he was seeing, it was awesome.

Recommended Videos

But we weren’t actually seeing what he was seeing, because for those viewing at home, our entire screen was filled with the HoloLens projection. However, in reality the projection only appears in a fairly small box directly in front of the user’s eyes. As our own Matt Smith puts it from his time with the device–

The biggest disappointment is the field of view. What’s not obvious in Microsoft’s demos is that holograms only appear in a box directly before you. Its size is difficult to describe, but it seemed to consume about two-thirds my field of view.

Understanding this limitation is difficult with imagination alone, but when you see the video it starts to make a bit more sense. Shots showing a simulated version of the FOV are fairly few in this new clip, which shows how HoloLens technology is being used at Case Western Reserve University for medical students, but you’ll find them at 0:49, 0:58, 1:23, 1:37, and 1:42 in the video.

Dave LeClair
Former Digital Trends Contributor
Dave LeClair has been writing about tech and gaming since 2007. He's covered events, hosted podcasts, created videos, and…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more