Solved

Downloading images from a digital camera

Posted on 2004-09-24
7
237 Views
Last Modified: 2010-04-06
How can I download the images from a digital camera?
0
Comment
Question by:hutelihut
  • 2
  • 2
  • 2
  • +1
7 Comments
 
LVL 17

Expert Comment

by:mokule
ID: 12145245
Well I've got camera which connects to PC with USB cable.
Then I can see another drive in a system. In that drive there is a folder in which the images reside. It is only copy file task needed.
Don't know what is in Your case.
0
 
LVL 11

Expert Comment

by:robert_marquardt
ID: 12145246
Most digital cameras are simply USB mass storage devices.
They show up as a removable hard disk. Copy the files as you would any other file.
0
 

Author Comment

by:hutelihut
ID: 12145863
I want to use Delphi for making a program, that downloads the images from the camera and shows them directly on a form.

I've heard, that a "twain-component" is what i need...
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 

Author Comment

by:hutelihut
ID: 12145924
...feel free to ask
0
 
LVL 17

Accepted Solution

by:
mokule earned 250 total points
ID: 12146272
0
 
LVL 11

Expert Comment

by:robert_marquardt
ID: 12149249
The question is if the camera provides a TWAIN driver.
It can but it does not need to.
Usually the camera is either a still image device which needs a TWAIN driver
or a mass storage device which makes it a removable harddisk.
Mass storage is more common.
For TWAIN there are several components available. Have a look at Torry's.
0
 
LVL 26

Expert Comment

by:EddieShipman
ID: 12279604
more information is needed.
Brand of camera
transfer means (usb via Explorer, twain, WMAPI)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now