Touched with Light: Scanned beams display or capture information at video rates

Subscribers:
344,000
Published on ● Video Link: https://www.youtube.com/watch?v=YyolCWMtoa0



Category:
Guide
Duration: 1:11:40
67 views
0


People like to look at images and interact with them. We will show how scanned beam technology can either display, or capture images, and that this makes it unique when compared to other display technologies such as LCD,PDP,OLED, or projection. Scanned beam is what is used in laser printers in one dimensional form. We have replaced the polygon by a MEMs device as small as a few millimeters in size that scans in two dimensions at video rates. This small size and simplicity enables a range of applications from personal head worn displays, image capture for and endoscope, or very light weight, power efficient direct view displays. Scanned beam is the most direct connection between images in memory, and the physical manifestation or source of that information.




Other Videos By Microsoft Research


2016-09-06Decision Procedures for Recursive Data Structures with Integer Arithmetic
2016-09-06Supporting Construction, Analysis, and Understanding of Software Models.
2016-09-06Program Verification via Three-Valued Logic Analysis
2016-09-06Efficient Data Dissemination in Bandwidth-Asymmetric P2P Networks
2016-09-06Tractable Learning of Structured Prediction Models
2016-09-06Future Hype: The Myths of Technology Change
2016-09-06Improving Packet Delivery Efficiency Using Multi-Radio Diversity in Wireless LANs
2016-09-06Algorithmic Foundations of P2P and Wireless Networks
2016-09-06Semi-unsupervised learning of taxonomic and non-taxonomic relationships from the web
2016-09-06The Weather Makers: How Man is Changing the Climate and What it Means for Life on Earth
2016-09-06Touched with Light: Scanned beams display or capture information at video rates
2016-09-06Internet Background Radiation
2016-09-06Understanding and Improving Wireless Networks
2016-09-06SAFECode: A Platform for Developing Reliable Software in Unsafe Languages
2016-09-06Enabling Internet Malware Investigation and Defense Using Virtualization
2016-09-06Cohomology in Grothendieck Topologies and Lower Bounds in Boolean Complexity
2016-09-06Approximate inference techniques for optimal design in self-assembly and automated programming
2016-09-06Machine Learning Methods for Structured and Collective Classification
2016-09-06Communication Technology: Interruption and Overload
2016-09-06ParaEval: Using Paraphrases to Improve Machine Translation and Summarization Evaluations
2016-09-06Rethinking Processor and System Architecture



Tags:
microsoft research