Feeds

Yes! It's the handgun camcorder!

Point-and-shoot photography given new meaning

Intelligent flash storage arrays

The term 'point and shoot' has been used by photographers for years. However, snappers’ images were never fatal - until the invention of a compact camera-cum-handgun, that is.

PistolCam2

PistolCam: photography at its most deadly

PistolCam is a camera unit that clips onto a variety of handguns. Once in place, and the deadly weapon’s removed from the holster, the gadget can be used to ‘shoot’ still images and videos.

During a shoot-out, 3.2-megapixel JPEG images can be recorded onto the gadget's 512MB internal memory. Trigger-happy users need only squeeze the shutter key to capture a miscreant in the act before he pays the price... BAM! BAM! BAM! Click! Click! Click!

If you need video footage of the target, then the PistolCam’s manufacturer claims the unit can record between 40 and 60 minutes of MPEG 4 footage at 30 frames per second.

The shooter's USB 1.1 connection enables both video and still images to be transferred to other devices.

You’ll never miss an opportunity for a good shot with this device. Once the gun’s been removed from its holster, a “Tactical Illuminator” - a red laser aiming aid, essentially - helps you draw a bead on the target... er... subject.

A handgun is only as good as the number of rounds left in the chamber. However, the PistolCam will continue shooting pictures for five hours.

PistolCam costs around $700 (£350/€400) and is available direct from the manufacturer. And no, the gun isn’t included...

Intelligent flash storage arrays

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.