?
Solved

does anyone have cyber-shot sw in linux

Posted on 2009-07-01
4
Medium Priority
?
277 Views
Last Modified: 2012-05-07
My sister just gave me her cyber-shot camera that has some pics on it I want.  A CD with Windows viewing software is in the box she gave me.  I always run Ubuntu.  Do you know if there is software so I can download from her camera to my computer?
0
Comment
Question by:dwcronin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 63

Accepted Solution

by:
☠ MASQ ☠ earned 2000 total points
ID: 24758695
Have you tried just plugging it in to see if Ubuntu sees it as a disk drive?
0
 
LVL 28

Expert Comment

by:burrcm
ID: 24762327
Does it have a removable memory card? If you stick that in a reader, it will definitely see it as a drive.

Chris B
0
 

Author Comment

by:dwcronin
ID: 24766575
MASQUERAID: No.  I saw the windows disk and didn't even think to just try plugging it in.  I don't know what emoticon I use for feeling stupid...

burrcm:  If MASQUERAID's suggestion ( aka TRY!!! ) doesn't work, I'll ask her if she has a reader.  I know she has a memory card.
0
 

Author Closing Comment

by:dwcronin
ID: 31598975
MASQUERAID: I think the Windows disk just scared me that a program was needed.  I plugged the camera into my computer and ubuntu saw it as an external disk perfectly.  I tried it with and without the extra memory card.  I worked fine both ways and it had no trouble showing the extra pictures that were on the card.
0

Featured Post

Veeam Task Manager for Hyper-V

Task Manager for Hyper-V provides critical information that allows you to monitor Hyper-V performance by displaying real-time views of CPU and memory at the individual VM-level, so you can quickly identify which VMs are using host resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video teaches viewers how to process images for a time-lapse video. Programs required: Adobe Lightroom, Adobe After Effects, Video Editing Program. In Adobe Lightroom: Import sequence image files into Adobe Lightroom: Develop settings of an I…
I designed this idea while studying technology in the classroom.  This is a semester long project.  Students are asked to take photographs on a specific topic which they find meaningful, it can be a place or situation such as travel or homelessness.…
Suggested Courses
Course of the Month14 days, 7 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question