Design Rule For Camera File System - Access

Access

Camera file systems can usually be accessed by directly mounting them via the USB mass storage device class protocol, which exposes the file layout, whether DCF compliant or otherwise. Alternatively, and independent of DCF, files may be accessed via the Picture Transfer Protocol, which provides an object-oriented view and need not expose the file layout.

The file system layout is often opaque to users, as images are copied onto a computer or printer and the application deals with layout.

Read more about this topic:  Design Rule For Camera File System

Famous quotes containing the word access:

    The nature of women’s oppression is unique: women are oppressed as women, regardless of class or race; some women have access to significant wealth, but that wealth does not signify power; women are to be found everywhere, but own or control no appreciable territory; women live with those who oppress them, sleep with them, have their children—we are tangled, hopelessly it seems, in the gut of the machinery and way of life which is ruinous to us.
    Andrea Dworkin (b. 1946)

    The last publicized center of American writing was Manhattan. Its writers became known as the New York Intellectuals. With important connections to publishing, and universities, with access to the major book reviews, they were able to pose as the vanguard of American culture when they were so obsessed with the two Joes—McCarthy and Stalin—that they were to produce only two artists, Saul Bellow and Philip Roth, who left town.
    Ishmael Reed (b. 1938)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)