Solved

Where is Microsoft Midi Mapper?

Posted on 2004-08-16
7
2,330 Views
Last Modified: 2008-01-09
As title states:

Where is Microsoft Midi Mapper?

I can't find that and i need it.
0
Comment
Question by:ornicar
  • 4
  • 3
7 Comments
 
LVL 4

Expert Comment

by:lexicon_dominus
ID: 11814073
Which operating system you're running ?
0
 
LVL 9

Author Comment

by:ornicar
ID: 11814157
Sorry, forgott about that, but its XP, if you read the Topic title.
0
 
LVL 4

Expert Comment

by:lexicon_dominus
ID: 11814297
All right then... If you're using Windows XP, Microsoft Midi Mapper has became obsolote...
You should select a MIDI device in Sound Properties.
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 9

Author Comment

by:ornicar
ID: 11814351
I see...
This annoys me because I'd like to do some mapping with the midi devices. I bought an USB midi port and plugged here a Roland synth and a Yamaha DX-7, and I'd like some of their channels to be used instead of the soundcard's channels.
Do you know if this would be possible? Maybe there is a mapping program doing this?
0
 
LVL 4

Accepted Solution

by:
lexicon_dominus earned 125 total points
ID: 11814440
Hello Ornicar;
Maybe this link helps:
http://www.midiox.com/
0
 
LVL 9

Author Comment

by:ornicar
ID: 11816181
Great! I've been tweaking my MIDI settings with this program and it really does what I need, plus additional features very useful.
Thanks.
0
 
LVL 4

Expert Comment

by:lexicon_dominus
ID: 11816220
Thank you for the points and you're welcome... I'm glad you've solved your issue...
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Migration of Exchange mailbox can be done with the ExProfre.exe tool. But at times, when the ExProfre.exe tool migrates the Exchange Server user profile, it results in numerous synchronization problems. Synchronization error messages appear in the e…
For both online and offline retail, the cross-channel business is the most recent pattern in the B2C trade space.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question