1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers For Sale

1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers


This item has been shown 1 times.

Buy Now

1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers:
$34

1979 BYTE Computer Music Projects Book
featuring the Altair 8800, KIM-1, Intellec 8/MOD 80, Cromemco Z-2,
Mostek MK50240 ...and even Player Pianos!
Increasingly hard to find, this fascinating compilation contains a wide array of electronic music articles from 1975 through 1978, some of them in full color. Apart from a little cover wear, the book is in very good condition. Softcover. Copyright 1979. This item ships WORLDWIDE.Contents include:- SCORTOS: A Music Language System for the Altair 8800
- A Two-Computer Music System using the Altair 8800 & Intellec 8/MOD 80
- An 8080 Microcomputer-controlled Pipe Organ
- Build a 555-based Tone Generator for your Altair/IMSAI
- Build an Inexpensive Tone Generator for the KIM-1
- Polyphonic Music with the KIM-1 (w/ source code code; uses a home-brew DAC)
- Walsh Functions: Digital Fourier Series
- Music Synthesis using the Mostek MK50240 Top Octave Generator
- Interfacing Pneumatic Player Pianos
- Electronic Organ Chips for Computer Music Synthesis (SGS Mxxx)
- FFTs for the Motorola 6800 (w/ complete source code)
- Polyphonic Music with the Cromemco Z-2D
- Making Music with the Altair 8800
- Teach the KIM-1 to Sing


Buy Now

Vtg Legacy Mutanoid Math Challenge Problem Solving Alien Pc Game Ibm Tandy 3.5
Vtg Legacy Mutanoid Math Challenge Problem Solving Alien Pc Game Ibm Tandy 3.5"


Macintosh & Apple Ii 12
Macintosh & Apple Ii 12"x16" Photo Poster From The Apple Museum Poland


Dungeon Master Ii - Legend Of Skullkeep - Interplay Macplay -  picture
Dungeon Master Ii - Legend Of Skullkeep - Interplay Macplay -


Winstream Ibm Tandy Windows Dice Games Roll 'em And Shoot 3.5
Winstream Ibm Tandy Windows Dice Games Roll 'em And Shoot 3.5" Diskette New


Documentation

  • AIX Local Security Checks
  • Backdoors
  • CentOS Local Security Checks
  • CGI abuses
  • CISCO
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • Fedora Local Security Checks
  • Finger abuses
  • Firewalls
  • FreeBSD Local Security Checks