SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
A video camera is a camera used for electronic motion picture acquisition, initially
developed by the television industry but now common in other applications as well. The
earliest video cameras were those of John Logie Baird, based on the electromechanical
Nipkow disk and used by the BBC in experimental broadcasts through the 1930s. All-
electronic designs based on the cathode ray tube, such as Vladimir Zworykin's Iconoscope
and Philo T. Farnsworth's Image dissector, supplanted the Baird system by the 1940s and
remained in wide use until the 1980s, when cameras based on solid-state image sensors
such as CCDs (and later CMOS active pixel sensors) eliminated common problems with tube
technologies such as image burn-in and made digital video workflow practical.


Video cameras are used primarily in two modes. The first, characteristic of much early
broadcasting, is live television, where the camera feeds real time images directly to a screen
for immediate observation. A few cameras still serve live television production, but most live
connections are for security, military/tactical, and industrial operations where surreptitious
or remote viewing is required. In the second mode the images are recorded to a storage
device for archiving or further processing; for many years, videotape was the primary format
used for this purpose, but optical disc media, hard disk, and flash memory in tapeless
camcorders are all increasingly used. Recorded video is used in television and film
production and more often surveillance and monitoring tasks where unattended recording
of a situation is required for later analysis.

Modern video cameras have numerous designs and uses, not all of which resemble the early
television cameras.

Professional video cameras, such as those used in television production and
sometimes filmmaking in digital cinema; these may be television studio-based or mobile in
the case of an electronic field production (EFP). Such cameras generally offer extremely fine-
grained manual control for the camera operator, often to the exclusion of automated
operation. Camcorders, which combine a camera and a VCR or other recording device in one
unit; these are mobile, and are widely used for television production, home movies,
electronic news gathering (ENG) (including citizen journalism), and similar applications.
Some digital ones are Pocket video camera.

Closed-circuit television (CCTV) generally use pan tilt zoom cameras (PTZ), for
security, surveillance, and/or monitoring purposes. Such cameras are designed to be small,
easily hidden, and able to operate unattended; those used in industrial or scientific settings
are often meant for use in environments that are normally inaccessible or uncomfortable for
humans, and are therefore hardened for such hostile environments (e.g. radiation, high
)heat, or toxic chemical exposure.

Webcams are video cameras which stream a live video feed to a computer. Larger
video cameras (especially camcorders and CCTV cameras) can be similarly used, though they
may need an analog-to-digital converter in order to store the output on a computer or
digital video recorder or send it to a wider network.
Most 21st century video cameras are digital cameras which converts the signal
directly to a digital output; such cameras are often small, even smaller than CCTV security
cameras, and are often used as webcams or optimized for still-camera use. The majority are
incorporated directly into computer or communications hardware, particularly mobile
phones, though analog video equipment remains in use.

Special systems, like those used for scientific research, e.g. on board a satellite or a
space probe, or in artificial intelligence and robotics research. Such cameras are often tuned
for non-visible radiation for Infrared photography (for night vision and heat sensing) or X-ray
(for medical and video astronomy use).

Más contenido relacionado

Destacado

Destacado (15)

Logo puzzle
Logo puzzleLogo puzzle
Logo puzzle
 
Redireccionamiento de datos parte ii is
Redireccionamiento de datos parte ii isRedireccionamiento de datos parte ii is
Redireccionamiento de datos parte ii is
 
Researching video game dependency? Some first empirical results of a qualitat...
Researching video game dependency? Some first empirical results of a qualitat...Researching video game dependency? Some first empirical results of a qualitat...
Researching video game dependency? Some first empirical results of a qualitat...
 
Practica 1 tic
Practica 1 ticPractica 1 tic
Practica 1 tic
 
Ali Celik: "Der Gastarbeiter braucht Pflege"
Ali Celik: "Der Gastarbeiter braucht Pflege"Ali Celik: "Der Gastarbeiter braucht Pflege"
Ali Celik: "Der Gastarbeiter braucht Pflege"
 
Tag galaxy
Tag galaxyTag galaxy
Tag galaxy
 
Pedagógico
PedagógicoPedagógico
Pedagógico
 
HTML5 Update (am Internet-Briefing)
HTML5 Update (am Internet-Briefing)HTML5 Update (am Internet-Briefing)
HTML5 Update (am Internet-Briefing)
 
Redireccionamiento de datos parte ii is
Redireccionamiento de datos parte ii isRedireccionamiento de datos parte ii is
Redireccionamiento de datos parte ii is
 
Frank Turner- England Keep my Bones
Frank Turner- England Keep my BonesFrank Turner- England Keep my Bones
Frank Turner- England Keep my Bones
 
II concurso de fotografia
II concurso de fotografiaII concurso de fotografia
II concurso de fotografia
 
Ficha de inscripción poa 2012
Ficha de inscripción poa 2012Ficha de inscripción poa 2012
Ficha de inscripción poa 2012
 
Caracteritiscas y funciones de la reforma
Caracteritiscas  y funciones de la reformaCaracteritiscas  y funciones de la reforma
Caracteritiscas y funciones de la reforma
 
Hola
HolaHola
Hola
 
Dallenbach Amd Jenkis 1924 Forgrtting In Ltm
Dallenbach Amd Jenkis 1924 Forgrtting In LtmDallenbach Amd Jenkis 1924 Forgrtting In Ltm
Dallenbach Amd Jenkis 1924 Forgrtting In Ltm
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Video camera

  • 1. A video camera is a camera used for electronic motion picture acquisition, initially developed by the television industry but now common in other applications as well. The earliest video cameras were those of John Logie Baird, based on the electromechanical Nipkow disk and used by the BBC in experimental broadcasts through the 1930s. All- electronic designs based on the cathode ray tube, such as Vladimir Zworykin's Iconoscope and Philo T. Farnsworth's Image dissector, supplanted the Baird system by the 1940s and remained in wide use until the 1980s, when cameras based on solid-state image sensors such as CCDs (and later CMOS active pixel sensors) eliminated common problems with tube technologies such as image burn-in and made digital video workflow practical. Video cameras are used primarily in two modes. The first, characteristic of much early broadcasting, is live television, where the camera feeds real time images directly to a screen for immediate observation. A few cameras still serve live television production, but most live connections are for security, military/tactical, and industrial operations where surreptitious or remote viewing is required. In the second mode the images are recorded to a storage device for archiving or further processing; for many years, videotape was the primary format used for this purpose, but optical disc media, hard disk, and flash memory in tapeless camcorders are all increasingly used. Recorded video is used in television and film production and more often surveillance and monitoring tasks where unattended recording of a situation is required for later analysis. Modern video cameras have numerous designs and uses, not all of which resemble the early television cameras. Professional video cameras, such as those used in television production and sometimes filmmaking in digital cinema; these may be television studio-based or mobile in the case of an electronic field production (EFP). Such cameras generally offer extremely fine- grained manual control for the camera operator, often to the exclusion of automated operation. Camcorders, which combine a camera and a VCR or other recording device in one unit; these are mobile, and are widely used for television production, home movies, electronic news gathering (ENG) (including citizen journalism), and similar applications. Some digital ones are Pocket video camera. Closed-circuit television (CCTV) generally use pan tilt zoom cameras (PTZ), for security, surveillance, and/or monitoring purposes. Such cameras are designed to be small, easily hidden, and able to operate unattended; those used in industrial or scientific settings are often meant for use in environments that are normally inaccessible or uncomfortable for humans, and are therefore hardened for such hostile environments (e.g. radiation, high )heat, or toxic chemical exposure. Webcams are video cameras which stream a live video feed to a computer. Larger video cameras (especially camcorders and CCTV cameras) can be similarly used, though they may need an analog-to-digital converter in order to store the output on a computer or digital video recorder or send it to a wider network.
  • 2. Most 21st century video cameras are digital cameras which converts the signal directly to a digital output; such cameras are often small, even smaller than CCTV security cameras, and are often used as webcams or optimized for still-camera use. The majority are incorporated directly into computer or communications hardware, particularly mobile phones, though analog video equipment remains in use. Special systems, like those used for scientific research, e.g. on board a satellite or a space probe, or in artificial intelligence and robotics research. Such cameras are often tuned for non-visible radiation for Infrared photography (for night vision and heat sensing) or X-ray (for medical and video astronomy use).