Solved

Play MIDI files (*.mid)

Posted on 1998-01-20
3
357 Views
Last Modified: 2010-04-16
i can find source pascal code for playing *.mid files
do u have an example?
0
Comment
Question by:arieldri
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 5

Expert Comment

by:inter
ID: 1217172
Do you want an example midi file? Send you email and I send you dozens.
Igor
0
 
LVL 2

Accepted Solution

by:
omsec earned 10 total points
ID: 1217173
you should not use midi in dos-programs. i didnt find any routines to play em under dos there are windows based codes. If you wanna play them under windows its ok, u will find sources at much pages i dont have them on mind. Just go to mine www.centralnet.ch/userpages/omsec click there on 'join other pages' and u will find a list of some good libraries. If you code for dos i would recommend to play digitalized music in the MOD or
S3M format. XM is also a such tracker format, but note there are no ways to play them in Real Mode if ya dont have a GUS (Gravis Ultra SoundCard) A great player is the MIDAS Sound System you can find it at www.hornet.org

grests, omsec
0
 

Author Comment

by:arieldri
ID: 1217174
10x, but the code must exist somewhere...
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Today it’s fairly well known that high-performing websites and applications bring in more visitors, higher SEO, and ultimately more sales. By the same token, downtime is disastrous for companies and can lead to major hits on a brand, reputation, an…
Although a lot of people devote their energy toward marketing for specific industries, there are some basic principles that can be applied to any sector imaginable. We’ll look at four steps to take and examine how those steps were put into action fo…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question