Should I shoot RAW or JPG and what ratio should I pick when shooting stills?

I want to take artistic pictures. Does that mean I should shoot RAW and then deal with the settings in Photoshop? I realize I can't for the corporate photo contest because I am not allowed to Photoshop anything for the contest. And pictures at a party that I intend to share or immediately upload, I understand why I would not shoot RAW.
Are there other reasons not to do so?
Many of you know me. I have been shooting video for a while and I am just now starting to shoot stills. These are tough questions for me.
I always assumed I would shoot stills using the maximum frame size possible. However, I have other choices.
When the aspect ratio setting is [4:3]
4608x3456 pixels, 3264x2448 pixels, 2336x1752 pixels
When the aspect ratio setting is [3:2]
4608x3072 pixels, 3264x2176 pixels, 2336x1560 pixels
When the aspect ratio setting is [16:9]
4608x2592 pixels, 3264x1840 pixels, 1920x1080 pixels
When the aspect ratio setting is [1:1 ]
3456x3456 pixels, 2448x2448 pixels, 1744x1744 pixels
Now, to be honest, I can't think of a reason to shoot stills at any size other than the 4:3 based 4608x3456 except to save room on the memory card. But I figured I should probably ask just in case I am missing something. Storage is not an issue as far as I can tell at this time. I bought two 64GB cards and I will be able to use part of my 16GB Smartphone memory card for additional storage should the need arise. Most likely I will have plenty of room until I can copy over to my laptop and then on to an external drive.
For reference: http://www.herviewphotography.com/2012/06/18/raw-vs-jpg-file-formats.html

Steven,
You are correct, that you should not shoot the Holiday Party pics in RAW, as they will only be used to blackmail your boss, and co-workers, so JPEG would be adequate for that (unless you really need to do Photoshop work, to make the images more "compromising... ").
Now, shooting in Camera RAW has several advantages, and really only two disadvantages, that I can think of.
Camera RAW captures everything that the sensor can, but it is in unprocessed form (one of the disadvantages), and then Photoshop with the ACR (Adobe Camera RAW) can "process" your images. I do this, when I have real use for the Images. I have developed a Preset for my Nikon Camera RAW, for each camera, so it's fairly easy to batch process. I always Save_As PSD, since I will very likely do additional work (not useful for the company competition, but CAN be useful for those black-mail pictures, if you have much "work" to do).
I Save my NEF's (Nikon Camera RAW) Images, and then, in a separate folder, my processed PSD's. Those are sort of like duplicate transparencies, but with slightly different data in each. From the first, the NEF's, I could always run them through ACR again, should something happen to my PSD's. The reverse is not true, but at least I would have my PSD's.
For use in Video, I will almost always Open my PSD's, and Scale them, plus possibly do other Image-editing, per my needs. As I shoot at max. resolution (~ 4000 x 3000), I will be Scaling, and then likely Cropping (as most Projects now, are 16:9). If you do any 4:3 Projects, then you are already there, save for the Square Pixel vs Rectangular Pixel issue, but if you Scale the 4:3 material to 640 x 480 Square, it should look just fine in a 4:3 PAR=0.9 Project's Frame.
In camera, I always try to mentally compose the Images into 16:9 horizontal, if I see the potential for Video use. It's like keeping 11 x 17 in the back of my mind, when shooting for potential double-truck magazine use. [Back in film days, I made several Nikon screens, to fit various common uses.]
Though PrPro CS 6 (as of CS 5), with full CUDA/MPE support, can do a great job of Scaling, I still use my PS Actions to batch process entire folders, and usually on Bicubic Sharper, though for some subjects, I choose Bicubic Smoother. This means that I am not "pushing around" a bunch of unused pixels. I Crop each Image, and then Scale it, with the Action, to match the Frame Size of the Project.
Now, back to RAW. That allows you the full capture from the sensor, so you have everything to work with. I shoot in 16-bit, for as much data, as I can get. One step in the process, but usually well after the ARC processing, and Saving_As PSD, will be the conversion to 8-bit Mode, but only after ALL of my processing, as PrPro cannot use 16-bit Bit-Depth, for Video.
For just general shooting (usually "happy-snaps"), with no inteneded high-rez printing, or Video use, I will shoot JPEG, at the highest quality setting (lowest compression), and be done with it.
One disatvantage of Camera RAW is the write time to the card, but with newer cameras, and faster cards, that is less of a problem, than it once was. Still, even high-rez JPEG's, though they do require in-camera processing to JPEG, will allow one to shoot more quickly. [That can be very important with those Holiday Party pics, as who knows what will happen in the next nanosecond?]
To me, Camera RAW is sort of like standing in front of a photograph, with my entire set of cameras. I ask, "Is this really a great shot?" If so, out comes the 4 x 5. If the answer is "maybe," then I grab a Hassleblad. If the answer is "no, but it IS interesting," then the 35mm is my choice. Sort of the same thing, but instead of cameras, it's RAW vs High-rez JPEG.
Just some thoughts.
Hunt
[Edit] PS - what the linked article said.

Similar Messages

  • HT5117 I am producing an ibook with video and jpg images, what sizes should they be?

    I am producing an ibook with video and jpg images, what sizes should they be?
    <Image Edited by Host>

    I and others answered a similar question only  yesterday.
    There are also many other similar posts and it is advised we first check out "our"  problem by doing a search.
    I also  suggest you download "iBookstore Asset Guide 5" its a pdf and contains all the  information you  ask for.

  • Last week, I had no problems streaming my MacBook Pro to my sony Bravia with a logix hdmi cable. I came back from holidays and now it doesn't work anymore.  What settings should my computer be on and what settings should my tv be on?

    Last week, I had no problems streaming my MacBook Pro to my sony Bravia with a logix hdmi cable. I came back from holidays and now it doesn't work anymore.  What settings should my computer be on and what settings should my tv be on?

    TarahCurrie Sep 10, 2014 3:48 PM
    Restore From Time Machine Backup
    Reinstall OS X
    Get Help Online
    Disk Utility
    MacBook Pro, Mac OS X (10.5.8)
    You are running 10.5.8
    Did you try booting off your Install disk holding the c key down.  From here you can get to the drop down menu just a few clicks in (you are not going to install) and run  the Disk Utility>Repair Disk.  See if it will let you do this.

  • Everytime I try to enter something into the search box a further box appears to tell me this is a json file and what program should I use to open it. How can I

    I am using Linux mint 12 with firefox.
    Everytime I try to type something in the search box a further box appears to tell me this is a JSON file and what program should I use to open it.
    This has only happened since reinstalling my system a couple of weeks ago.
    I am not really interested in what a json file is I simply want to get rid of this pop up box.

    Start Firefox in <u>[[Safe Mode]]</u> to check if one of the extensions or if hardware acceleration is causing the problem (switch to the DEFAULT theme: Firefox/Tools > Add-ons > Appearance/Themes).
    *Don't make any changes on the Safe mode start window.
    *https://support.mozilla.org/kb/Safe+Mode
    *https://support.mozilla.org/kb/Troubleshooting+extensions+and+themes
    See also:
    *[[/questions/921535]]

  • Hi help unlock the phone happened after we installed a new programa we can not get the activation password and ID, I know and still does not stop the phone bought in Israel and what documents should be sent to confirm that my phone Please read through the

    hi help unlock the phone happened after we installed a new programa we can not get the activation password and ID, I know and still does not stop the phone bought in Israel and what documents should be sent to confirm that my phone Please read through the help

    What I am saying is ..........
    The iPhone HAS to be active making calls on the UK carrier network for the carrier to identify as "theirs" and therefore eligible for the Carrier to unlock
    The way to achieve this is to use a PAYG sim making and receiving calls to establish a customer relationship  with the Carrier and then follow the Carrier's process to unlock
    With a PAYG it usually means adding a specified (by the carrier ) amount  usually £15 /£20 depending on the carrier
    This is how O2 function and according to Gemma  this is how Vodafone work

  • HT1338 How can I download windows to my Mountain Lion OSX 10.9 and what browser should I use?

    How do I download windows to my OSX Maverick 10.9 and what Browser should I use for this?

    http://www.apple.com/support/bootcamp/
    what Browser should I use for this?
    No browser is required.

  • How do i reset safari and what items should I check or delete?

    How do I reset safari and what items should I check or delete

    Reset Safari. OS X 10.8 Mountain Lion/ Safari 6
    Click Safari in the menu bar.
    From the drop down select "Reset Safari".
    Check the box beside each item you want to reset.
    No need to check the box beside "Remove saved names and passwords".
    Click "Reset".
    For more info:  http://support.apple.com/kb/PH11914
    Best.

  • I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    I just purchased MBP and it is my first Apple computer. How concerned should I be about virus software and what do you recommend for security software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets (see below.)
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been another layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.
    For more information about Gatekeeper, see this Apple Support article.
    4. Beyond XProtect and Gatekeeper, there’s no benefit, in most cases, from any other automated protection against malware. The first and best line of defense is always your own intelligence. All known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    5. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was never a good idea, and Java's developers have had a lot of trouble implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it only on well-known, password-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow these guidelines, and you’ll be practically as safe from malware as you can be.
    6. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    7. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    8. The greatest harm done by anti-virus software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Charging : haven't used my ipad for over 6 months and when I plug it to charge (wall charger) it just doesn't : any idea as to what the issue is and what I should do?

    Hello
    I haven't used my ipad for over 6 months and when I plug it to charge (wall charger) it just doesn't charge anymore : any idea as to what the issue is and what I should do?

    If the battery has been drained completely dry it will take 20 minutes or more for it to indicate that it is actully charging!

  • My Mac Book Pro is giving me a message that the start up disk is full, how do I delete files, and what files should I be deleting

    My Mac Book Pro is giving me a message that the start up disk is full, how do I delete files, and what files should I be deleting

    There are several nice programs that can help you figure out what's on your computer - OmniDiskSweep, WhatSize, and DaisyDisk are the three I like. If you've had your computer for a while - and especially if this isn't your first Mac and you've been migrating from one computer to another, one of these programs can help you find files you didn't know your computer still had. For example, when I was trying to shed files to fit int a 256GB SSD, I discovered I had nearly 1GB of files in my Application Support folder belonging to programs I no longer used.
    Other than that, your easy choice are music, video, and photos. They tend to be the big files. A movie will generally be at least 1.25GB, for example.

  • What is a transfer curve and what does pre-flight mean when it says "transfer curve used"?

    What is a transfer curve and what does  pre-flight mean when it says "transfer curve used"?

    http://dx.aip.org/advisor/transfer_curve.html has some insight.
    Basically, someone who prepared the PDF or an image in it used a magic trick that could cause it to print differently from how it is on screen.

  • I tried opening a pdf file and I set it to use always and firefox which did not work, I was wondering how to undo that and what I should use to open pdf files in the future?

    I was attempting to open a document from a frequently used site, I had never been on, on my new mac however. I attempted to open the pdf file and was given the option of which program to use to open it, I mistakenly clicked use always and firefox as the program with which to open pdf files. I do not know how to undo this or what I should do in the future to access the pdf files.

    Hi Melfour-
    Here is a Support article detailing how to work with your Firefox PDF preferences:
    [[Opening PDF files within Firefox]]
    Hope that helps.

  • My story on the iPhone ... And what i should do ?

    I bought an iPhone from an individual. Once at home, I noticed the iphone has a demo frimware. I'ts d'ont worried me, it's a week later, I see  "network unavailable" on my iPhone. I spent several phones to diagnose my iPhone, but without success. I did some research and I found that my iPhone had been blacklisted. This is where I started to think it might be an iPhone stolen. I sent it for repairs and it worked. I got a replacement iPhone. I never could get back to the seller and he plays dead. I have 13 years old and i worked all the summer to get it. I'ts a major investisment for me. What i should do ? I want my cash back to bought an non-blacklisted iPhone. What should i do ?

    What is the problem? You got a replacement that works so I don't understand what you are complaining about. Just be thankful they replaced it.

  • I get a message from Time Machine ""/Volumes/Data/Don's MacBook Pro.sparsebundle" is aready in use.   Please tell me what this means and what I should do because of it.

    I get a message in a box on my desk top saying "/Volumes'/Data/Don's MacBook Pro.sparsebundle" is alreadyin use.  What does this mean, and what should I do because of it if anything?

    You should do a restart. That often fixes such problems.
    AND You should tell:
    System preferences > Spotlight > Privacy ...
    not to index the backup drive (it does a special index already).
    Does that message mean you are NOT keeping your backups on a separate drive? Backuops should be on a drive with nothing else.

  • I have galaxy note n 7000 and what parametrs should i choose to make job of browser faster and productive

    what parametres of content Google Переводчик
    Определить язык>английский
    what settings should I choose to, and does not buggy korrektnoo otobrzhal konten
    Определить язык>английский
    Переводчик – главная страница - Главная страница Google
    Напишите отзыв.
    Версия Поиска:
    Мобильная | Полная
    ©2012 Google - Конфиденциальность

    what parametres of content Google Переводчик
    Определить язык>английский
    what settings should I choose to, and does not buggy korrektnoo otobrzhal konten
    Определить язык>английский
    Переводчик – главная страница - Главная страница Google
    Напишите отзыв.
    Версия Поиска:
    Мобильная | Полная
    ©2012 Google - Конфиденциальность

Maybe you are looking for