Darktable 1.2 RAW converter
Geotagging with Maps
A major innovation in Darktable 1.2 is the geotagging functionality. The map link at the top right takes you to the appropriate window (Figure 9), where you can drag images from the scroll bar or press Ctrl+F and then position them on the map.
The available map sources include several variants of OpenStreetMap, Google's services, and some other providers. As usual Darktable adds the geotagging information to the sidecar files.
The previous versions of Darktable already gave users a powerful tool. The current 1.2 release adds many new features and modes, or significantly improves existing ones, thus making the workflow even more effective. The fixed workflow and advanced style features make the program perfectly suited for editing both individual images and large sets of images.
The tools, however, do have a learning curve, but it is time well spent: Once you understand how to use the functions that are important for your work, you will probably go back to Darktable time after time – if only to save time. The new options offered by the tools, conditional blending, and masks enhance the software significantly. Darktable 1.2 can thus compete with any commercial RAW converter and perform well in a comparison.
Beside RAW formats Darktable also imports JPEG and TIFF images. This opens up additional applications: For example, you can load the images you need for your next presentation, sharpen them up, and save them again with a frame. If the images use an input format that Darktable does not support, you can convert them first with Convert or Converseen .
- Website: http://www.darktable.org
- Features: http://www.darktable.org/features/
- Darktable repositories: http://www.darktable.org/install/
- "Converseen" by Karsten Günther, Linux Magazine September 2010, pg. 66
- Darktable developers: http://www.darktable.org/contact/
- Manual: http://www.darktable.org/usermanual/index.html.php
- Setting up masks: http://www.darktable.org/2012/03/upcoming-features-conditional-blending/
Buy this article as PDF
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems