Entangle, Rapid Photo Downloader, and GTKRawGallery
Nifty Photo Helpers
Capture, transfer, process, and manage photos using the Entangle, Rapid Photo Downloader, and GTKRawGallery applications.
When it comes to working with photos, digiKam, GIMP, et al. are not the only fish in the sea. Plenty of other applications can prove to be useful additions to your photographic toolbox.
Tethering your camera to a computer opens a whole new world of possibilities. You can instantly view captured photos on a large screen, trigger the camera remotely, and do time-lapse photography. Although applications like Rawstudio and Darktable support tethered shooting functionality, Entangle  makes a better choice as a dedicated tool for the job.
This application lets you control the camera and its settings via a simple and user-friendly interface. Because Entangle is light on resources, it can run even on modest hardware, so you can, for example, transform an old netbook into a tethered shooting station. Based on gPhoto2, Entangle can handle a wide range of cameras, but it's worth keeping in mind that the application only provides access to features supported by your specific camera model (Figure 1). Although you can use Entangle with a smartphone camera, the application is better suited for use with a decent DSLR camera.
Buy this article as PDF
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.