1979 Computer Music Book MITS Altair IMSAI 8080 KIM-1 MK50240 M6800 Synthesizers For Sale

1979 Computer Music Book MITS Altair IMSAI 8080 KIM-1 MK50240 M6800 Synthesizers


This item has been shown 39 times.

Buy Now

1979 Computer Music Book MITS Altair IMSAI 8080 KIM-1 MK50240 M6800 Synthesizers:
$34

1979 BYTE Computer Music Projects Book
featuring the Altair 8800, KIM-1, Intellec 8/MOD 80, Cromemco Z-2,
Mostek MK50240 ...and even Player Pianos!
Increasingly hard to find, this fascinating compilation contains a wide array of electronic music articles from 1975 through 1978, some of them in full color. Apart from a little cover wear, the book is in very good condition. Softcover. Copyright 1979. This item ships WORLDWIDE.Contents include:- SCORTOS: A Music Language System for the Altair 8800
- A Two-Computer Music System using the Altair 8800 & Intellec 8/MOD 80
- An 8080 Microcomputer-controlled Pipe Organ
- Build a 555-based Tone Generator for your Altair/IMSAI
- Build an Inexpensive Tone Generator for the KIM-1
- Polyphonic Music with the KIM-1 (w/ source code code; uses a home-brew DAC)
- Walsh Functions: Digital Fourier Series
- Music Synthesis using the Mostek MK50240 Top Octave Generator
- Interfacing Pneumatic Player Pianos
- Electronic Organ Chips for Computer Music Synthesis (SGS Mxxx)
- FFTs for the Motorola 6800 (w/ complete source code)
- Polyphonic Music with the Cromemco Z-2D
- Making Music with the Altair 8800
- Teach the KIM-1 to Sing


Buy Now

Vintage Commodore Computer Vic 20 The Sky Is Falling  Vic-1911 Game picture
Vintage Commodore Computer Vic 20 The Sky Is Falling Vic-1911 Game


Apple Ii Forever (a) 12
Apple Ii Forever (a) 12"x16" Photo Poster From The Apple Museum Poland


Vintage Apple Logo Black Business Pen Very Rare - Made In Japan - Mac Macintosh picture
Vintage Apple Logo Black Business Pen Very Rare - Made In Japan - Mac Macintosh


Vintage Commodore Computer Vic 20 Voodoo Castll Vic-1918 Game picture
Vintage Commodore Computer Vic 20 Voodoo Castll Vic-1918 Game


Documentation

  • AIX Local Security Checks
  • Backdoors
  • CentOS Local Security Checks
  • CGI abuses
  • CISCO
  • Databases
  • Debian Local Security Checks
  • Default Unix Accounts
  • Denial of Service
  • Fedora Local Security Checks
  • Finger abuses
  • Firewalls
  • FreeBSD Local Security Checks