Hi Berhard On Sat, 1 May 2021 at 22:59, Bernhard <darkta...@intervalsignals.org> wrote:
> > this is simple: what you see in-camera is the in-camera-jpg provided by > the in-camera-engine. > These in-camera-jpg are embedded in the raw also and can be extracted > using exiftool > > https://exiftool.org/examples.html > > exiftool -b -JpgFromRaw -w _JFR.JPG -ext NEF -r . > > > darktable reads the raw data and expects YOU to work with them > > Thanks - so 1 method would be to extract the JPEG and use that avoiding all the Raw processing or maybe my bad photography skills are being hidden by the camera :-) will read up the inks However is there a way to "replicate " what the camera is doing through dark table ram ___________________________________________________________________________ darktable developer mailing list to unsubscribe send a mail to darktable-dev+unsubscr...@lists.darktable.org