XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Noteworthy Technologies That Were Never Popular

3 Noteworthy Technologies That Were Never Popular

Sometimes technology just doesn’t take off. The industry might think that it’s a game changer, but the device or product itself may not live up to the hype surrounding it, forever leaving the product to compete with the impossible standards set by the hype. Today, we’re going to look at some of these particular concepts, as well as why we think they simply didn’t fit in with today’s innovation-filled environment.

3D Displays
Remember that craze with the 3D movies? Manufacturers have been trying to keep people excited about 3D technology for a long time, but it has met with little long-term success. Content creators simply can’t commit to a 3D capture or post production process. A significant lack of content, combined with consumers needing a silly pair of 3D glasses and the hardware required by the display, people just preferred to stick to what had been working in the past. High-definition displays can make 2D programming look astounding, and with such a small demand for 3D picture, the technology has been abandoned.

There have been talks about resurrecting the technology through what’s called Home3D. MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) has found a way to emulate the 3D experience without the embarrassing glasses, but without content made for 3D, you shouldn’t expect to see too much support for this technology anytime soon.

Smart Glasses
Smart glasses, like Google Glass, used to be a hot commodity, but they fell off everyone’s radar relatively quickly. While they initially were quite anticipated, there are very few smart glasses manufacturers left today. In 2012, Google Glass was being tested by several celebrities, but in today’s technology industry, there are maybe a handful of smart glasses manufacturers at the most. These companies still don’t have a clear idea of who would be the consumers for smart glasses, but they have learned that when it comes to this particular product, less is more.

One of the nails in the coffin for Google Glass was the invasion of privacy. While users might be able to come to terms with Google tracking what you say, buy, and do online, adding a camera to your glasses was simply too much for just about everyone. It was thought for a time that smart glasses could be a viable alternative to a smartphone, but the technologies behind the device simply haven’t been perfected to the point of proper implementation.

Virtual Reality
While virtual reality might be “available” today, people have been talking about it for upwards of 40 years. Other technologies being developed and discussed in the 1980s, like VHS and audio cassettes, have come and gone, but the idea of virtual reality lingers on. This is despite the fact that practical applications of VR are few and far between.

The primary use for virtual reality--gaming--has turned out to be a major failure so far. While there is some value in giving people the ability to share experiences online through VR, it hasn’t been a priority for developers, creating a similar situation to 3D technology. VR as a technology might not be completely dead in the water yet, but there isn’t much excitement out there for the technology--at least not to the point where it can be transformative (at this moment).

What are some of your favorite technologies that haven’t been as successful as you’d have liked them to be? Let us know in the comments.

Tip of the Week: Simplifying Your Email with Conso...
Data Recovery: Find Your Balance
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, March 23 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware VoIP Productivity Mobile Office Malware Email Gadgets Network Security Quick Tips Efficiency Business Management Network Innovation IT Services IT Support Business Social Media Server Business Continuity Smartphones Miscellaneous Upgrade Communication User Tips Windows Communications Virtualization Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Data Recovery Users Smartphone Browser Android Passwords Mobile Device Management Internet of Things Holiday Marketing Save Money WiFi Alert Productivity Vendor Management Ransomware Tech Term Outsourced IT Operating System Artificial Intelligence BDR Mobile Computing Cybercrime Cloud Computing Windows 10 Remote Monitoring Chrome Router Remote Computing Avoiding Downtime Bring Your Own Device Computers Apple BYOD Cybersecurity Automation Information Technology Big Data VPN IT Solutions Firewall The Internet of Things Managed IT Services Collaboration Current Events Health Telephone Systems Going Green Best Practice History Spam Employer-Employee Relationship Windows 10 Printer Facebook Trending Phone System Wireless Technology Application IT Consultant Hacking Social Engineering Proactive IT Excel Encryption App Office Mobility Budget IT Support Lithium-ion Battery Bandwidth Mobile Device Money Unified Threat Management Office 365 Applications Business Intelligence Two-factor Authentication Phishing iPhone Training Mouse Business Managament Recovery Content Filtering Fax Server Maintenance Private Cloud Windows 8 Networking How To Gmail PowerPoint Access Control Antivirus Settings Information Analytics User Error Customer Relationship Management File Sharing Google Drive Humor Hard Drives Data Protection Outlook Blockchain Managed IT Tutorials Virus Word Sports Save Time Value Data Security Website Apps Redundancy Law Enforcement Flexibility IT Management Entertainment Servers Scam Saving Time Administrator Machine Learning Augmented Reality Retail Human Resources Software as a Service Downtime Analysis Memory Inbound Marketing Managed Service Network Congestion Hacker Social Paperless Office Business Technology Conferencing Vulnerability Connectivity Administration Wi-Fi Search Tablet Identity Theft Twitter Office Tips Digital Payment Meetings Document Management Social Networking Voice over Internet Protocol Computer Repair Data Management Streaming Media Risk Management Tech Support Compliance Data loss Solid State Drive Piracy Black Market Programming Smart Tech IBM Skype CES Cryptocurrency Leadership Fraud Spam Blocking Instant Messaging Running Cable IT Plan Wireless Physical Security Intranet Environment Cleaning Password Computer Accessories Wearable Technology Manufacturing Public Cloud Content Management SaaS Net Neutrality Biometrics IT service Unsupported Software Infrastructure OneNote Data storage Display Best Available Update Bluetooth Virtual Private Network Internet Exlporer People Data Storage eWaste Webinar Touchscreen Comparison Keyboard Telephony PDF Samsung Robot Google Docs Safety Virtual Assistant Work/Life Balance Data Breach USB Windows 7 HaaS End of Support YouTube Government Online Currency Help Desk Botnet Healthcare Recycling Workers Point of Sale Video Surveillance Education Telephone System Statistics Credit Cards DDoS Crowdfunding Electronic Health Records eCommerce Employee Millennials Customers Remote Support Line of Business Upgrades Analyitcs Webcam Mobile Cortana Uninterrupted Power Supply nternet FENG Customer Service Multi-Factor Security Strategy Knowledge Logistics Wireless Charging Advertising Wire Microchip Chromecast Law Firm IT Macro Consultant Restore Data Frequently Asked Questions Distributed Denial of Service Files Company Culture Content Filter Camera Patch Management Co-managed IT Vendor Screen Mirroring Digital Signage PC Care Workforce Authentication MSP 360 Emails Professional Services Google Apps Electronic Medical Records Cameras 3D Lifestyle Insurance Scheduling Flash Fiber-Optic Notifications LinkedIn Smart Office eBay Laptop Safe Mode Business Owner Licensing Backup and Disaster Recovery Tip of the week Amazon Colocation Storage Windows 10s HVAC Security Cameras Charger Cast WIndows 7 Google Search Alerts Telecommuting SharePoint Windows 8.1 Update Nanotechnology Remote Worker Virtual Reality Tools Shadow IT Search Engine Hiring/Firing Printer Server Shortcut Practices HIPAA Biometric Security Sync Cables Hybrid Cloud Text Messaging Touchpad Debate Accountants User Cryptomining Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Legal Enterprise Content Management Employee/Employer Relationship Computer Care Managing Stress Domains ISP Work Station Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Gaming Console Password Manager Students Bing Monitor Hosted Computing Proactive Science Unified Communications Staff Database Online Shopping Cache Project Management Audit Business Mangement Password Management File Versioning Devices GDPR Netflix Entrepreneur Shortcuts Root Cause Analysis Smartwatch Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets Start Menu Theft Windows Media Player Virtual Desktop Digital Signature IT Security IoT Supercomputer Hiring/Firing Distribution Regulations Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Travel Criminal NarrowBand Print Server NIST Multiple Versions HBO Thought Leadership E-Commerce Cost Management Worker Congratulations Music Regulation Audiobook Scalability Assessment Rootkit Politics Utility Computing How to Television Printers Transportation Techology Troubleshooting Webinar Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Thank You Experience Battery Content Two Factor Authentication Video Games Emergency

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *