1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers For Sale

1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers


This item has been shown -1 times.

Buy Now

1979 Computer Music BYTE Book Altair 8800 IMSAI 8080 KIM-1 Cromemco Synthesizers:
$34

1979 BYTE Computer Music Projects Book
featuring the Altair 8800, KIM-1, Intellec 8/MOD 80, Cromemco Z-2,
Mostek MK50240 ...and even Player Pianos!
Increasingly hard to find, this fascinating compilation contains a wide array of electronic music articles from 1975 through 1978, some of them in full color. Apart from a little cover wear, the book is in very good condition. Softcover. Copyright 1979. This item ships WORLDWIDE.Contents include:- SCORTOS: A Music Language System for the Altair 8800
- A Two-Computer Music System using the Altair 8800 & Intellec 8/MOD 80
- An 8080 Microcomputer-controlled Pipe Organ
- Build a 555-based Tone Generator for your Altair/IMSAI
- Build an Inexpensive Tone Generator for the KIM-1
- Polyphonic Music with the KIM-1 (w/ source code code; uses a home-brew DAC)
- Walsh Functions: Digital Fourier Series
- Music Synthesis using the Mostek MK50240 Top Octave Generator
- Interfacing Pneumatic Player Pianos
- Electronic Organ Chips for Computer Music Synthesis (SGS Mxxx)
- FFTs for the Motorola 6800 (w/ complete source code)
- Polyphonic Music with the Cromemco Z-2D
- Making Music with the Altair 8800
- Teach the KIM-1 to Sing


Buy Now

1965 Psa Pacific Southwest Airlines Plane Photo Ncr 315 Computer Print Ad picture
1965 Psa Pacific Southwest Airlines Plane Photo Ncr 315 Computer Print Ad


Eastern Front 1941 Computer Strategy Game Rx8039 Atari 400/800/xl/xe Not Tested picture
Eastern Front 1941 Computer Strategy Game Rx8039 Atari 400/800/xl/xe Not Tested


Usb Don Lancaster's Classic Library Tvt, Ismm, Rtl + Lots More picture
Usb Don Lancaster's Classic Library Tvt, Ismm, Rtl + Lots More


Cyclone Vision 360 Degrees Computer Software picture
Cyclone Vision 360 Degrees Computer Software


Documentation

  • AIX Local Security Checks
  • Backdoors
  • CentOS Local Security Checks
  • CGI abuses
  • CISCO
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • Fedora Local Security Checks
  • Finger abuses
  • Firewalls
  • FreeBSD Local Security Checks