Remotely controlling digital cameras with gPhoto
Taking a Series of Pictures
In the example provided in Listing 4, gPhoto takes five pictures at ISO 200, aperture 2.8, at intervals of 10 seconds. It automatically transfers the images to the directory from which you ran the command.
Remotely Controlling the Camera
$ gphoto2 --set-config capture=on --set-config eos-iso=200 --set-config eos-aperture=6 --frames=5 --interval=10 --capture-image-and-download
Because the camera transfers the images directly to the disk, without the use of intermediate storage, you don't even need a memory card for this step. However, make sure the camera does not generate RAW and JPG images at the same time; otherwise, the large RAW files will soon fill up the cache because the application only auto-transfers and deletes the JPG images from cache memory. If the images are not automatically transferred to your computer, you can use --capture-image instead of --capture-image-and-download.
If you do not want to limit the number of images and let gPhoto take snapshots until your disk is full, or the battery is dead, delete the --frames switch from Listing 4. If you want the software to perform some action after transferring an image, you can specify the --hook-script=File option, which will launch the specified script (File; e.g., to rename or move an image, upload an image to an FTP server, or even send an email).
- Nikon Camera Control: http://imaging.nikon.com/products/imaging/lineup/software/control_pro2/
- gPhoto: http://www.gphoto.org
- digiKam: http://www.digikam.org
- Remote control cameras: http://www.gphoto.org/doc/remote/
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm