Solved

System requirements for Google Tilt Brush

Posted on 2016-07-16
4
210 Views
Last Modified: 2016-07-16
I'd like to know if my HP Notebook can run Google Tilt Brush.  I tried the online application from systemrequiremenyslab.com but it did not run to completion.  I see the system requirements for tilt brush, but I can't tell whether my system meets the "equivalent or better" threshold for some of them.  I've attached the Tilt Brush system requirements along with system and graphics information for my notebook.

System infoGraphics infoSystem requirements
0
Comment
Question by:ddantes
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 81

Accepted Solution

by:
David Johnson, CD, MVP earned 500 total points
ID: 41714832
Your display is not powerful enough, it needs the requirements for the HTC VIVE which is a discrete graphics card Nvidia 970 or AMD R290 (these are top end video cards) with 4GB dedicated video ram
0
 

Author Comment

by:ddantes
ID: 41714844
Thank you David.  Is there a way to add such a card to the notebook?
0
 
LVL 81

Expert Comment

by:David Johnson, CD, MVP
ID: 41714854
no not a notebook, or laptop.. maybe in 5 years or so basic graphics cards will be powerful enough, the video cards required today cost more than your notebook
0
 

Author Comment

by:ddantes
ID: 41714858
Thank you.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question