Half of this image is a photo, and half is a CGI rendering.
By Joseph Flaherty (Wired Magazine)
Computer-generated images are moving out of theaters and onto store shelves and catalog pages, thanks to software that makes it nearly impossible to distinguish the real from the photorealistic. Encroaching upon what was once the domain of sci-fi filmmakers, product designers have started employing CGI and utilizing a program called KeyShot to give their digital models lighting effects that makes them appear to be actual items photographed in a studio or out in the wild. (Read Further)
Buildings in Calcutta lit up at night for the 1912 British royal visit Picture: RCAHMS/PA
A shoe box full of images capturing life in India at least a century ago has been discovered in one of Scotland’s national collections. 178 plate-glass negatives were found inside a size-nine Peter Lord shoe box by the Royal Commission on the Ancient and Historical Monuments of Scotland (RCAHMS) in Edinburgh. (Courtesy of The Telegraph. Follow this link for slide show)
Best known for his dramatic and evocative landscapes, Ansel Adams is considered one of the most influential photographers in US history. He produced beautiful images of American nature – from high mountains and thick forests, to the rugged ocean shoreline.
To celebrate his pioneering work, the National Maritime Museum at Greenwich in London has brought together more than 100 of his most powerful pictures. Take a look, with the museum’s Philippa Simpson. Screen grab from the BBC. For presentation, follow this link.
By Ismail Lagardien
Here is an example of how photography helps one look at very ordinary situations or structures and see different things. The first picture is a wide-angle shot of a scene, the second is a close-up and different framing of a single aspect of the scene. Both were taken with a phone; the second was taken with Instagram app.
Worker taking a break in the heat of the Bastakiya District, Dubai. Picture taken with Hipstamatic app for iPhone. Please do not republish without permission – or at least link back to source.