Emulator X Operation Manual Rev. A

Total Page:16

File Type:pdf, Size:1020Kb

Emulator X Operation Manual Rev. A Desktop Sampling System Operation Manual E-MU Systems i Desktop Sampling System Operation Manual © 2003 E-MU Systems All Rights Reserved Revision B E-MU World Headquarters Europe, Africa, Middle East E-MU Japan E-MU Systems Creative Labs Nihonbashi ICI Bldg. 2F, 1500 Green Hills Road Ballycoolin Business Park 2-2-12 Nihonbashi Bakuro-cho, Scotts Valley, CA USA Blanchardstown Chuo-ku 95067-0015 Dublin 15 Tokyo 103-0002 IRELAND JAPAN ii Emulator X Operation Manual Table of Contents Table of Contents 1 - Introduction & Installation ........................................... 1 Introduction ......................................................................................................................... 1 Emulator X ........................................................................................................................ 1 System Requirements........................................................................................................... 2 Software Installation ............................................................................................................ 2 Optimizing Your Computer for Emulator X .................................................................. 3 SCSI and IDE Drive Tips and Considerations ................................................................ 3 Setting up your Audio.......................................................................................................... 5 Setting up the Preferences.................................................................................................... 6 Audio Preferences ............................................................................................................. 7 MIDI ................................................................................................................................ 10 Controllers ...................................................................................................................... 12 2 - Emulator Architecture ................................................ 15 A Modular System .............................................................................................................. 15 Bank ................................................................................................................................ 15 Flexible Architecture ...................................................................................................... 18 Preset Diagram ............................................................................................................... 19 Voices .............................................................................................................................. 19 The Sample .....................................................................................................................21 3 - Getting Started .......................................................... 23 Exploring the Tree ..............................................................................................................23 Multisetup Page.................................................................................................................. 24 Changing Presets ............................................................................................................ 24 Adjusting the Controllers .............................................................................................. 25 Create Your Own Custom Bank........................................................................................ 26 Load a New Bank ............................................................................................................... 26 Opening a Preset ................................................................................................................27 Examine a Voice .................................................................................................................30 Examine the Samples ......................................................................................................... 32 Using DSP ....................................................................................................................... 33 Save and Save As ............................................................................................................ 35 The Librarian ...................................................................................................................... 36 4 - Multisetup / Global Controls ....................................... 39 The Multisetup ................................................................................................................... 39 Global Controls.................................................................................................................. 41 Working with Multisetups ................................................................................................. 46 E-MU Systems iii Table of Contents 5 - Preset Editor .............................................................. 47 Preset Globals..................................................................................................................... 48 Transpose & Volume ...................................................................................................... 48 Initial Controllers A-P .................................................................................................... 48 Tuning Tables ................................................................................................................. 49 Preset Modulators .......................................................................................................... 50 Voices & Sample Zones...................................................................................................... 53 Mix/Tune Tab ................................................................................................................. 53 Voice Selection ............................................................................................................... 53 Samples & Multisamples ............................................................................................... 53 Groups ............................................................................................................................ 54 Key Window Page............................................................................................................... 55 Velocity Window Tab ..................................................................................................... 57 Realtime Window Tab ................................................................................................... 58 Continuous Controller Window Tabs .......................................................................... 60 Voice & Sample Zone Utilities........................................................................................... 61 Voice Utilities ................................................................................................................. 61 Edit Menu Utilities - Cut, Copy & Paste ........................................................................... 63 Links.................................................................................................................................... 64 Link Utilities ................................................................................................................... 65 Mix/Tune Window ......................................................................................................... 65 Key Window ................................................................................................................... 66 Velocity Window ............................................................................................................ 66 CC Window .................................................................................................................... 66 6 - Voice Editor / Synthesizer Level ................................. 67 Simplified Emulator X Signal Path ................................................................................... 67 Overview of the Voice Editor............................................................................................. 68 Templates ........................................................................................................................ 68 Oscillator ............................................................................................................................ 70 Pitch Bend Range ........................................................................................................... 70 Tuning Controls ............................................................................................................. 70 Chorus Amount ............................................................................................................. 71 Glide Rate & Curve ......................................................................................................... 71 Key Controls ...................................................................................................................72 Amplifier, Filter & Auxiliary Envelopes............................................................................. 73 Time-based and BPM Envelopes ................................................................................... 74 Envelope Repeat ............................................................................................................
Recommended publications
  • Security + Encryption Standards
    Security + Encryption Standards Author: Joseph Lee Email: joseph@ ripplesoftware.ca Mobile: 778-725-3206 General Concepts Forward secrecy / perfect forward secrecy • Using a key exchange to provide a new key for each session provides improved forward secrecy because if keys are found out by an attacker, past data cannot be compromised with the keys Confusion • Cipher-text is significantly different than the original plaintext data • The property of confusion hides the relationship between the cipher-text and the key Diffusion • Is the principle that small changes in message plaintext results in large changes in the cipher-text • The idea of diffusion is to hide the relationship between the cipher-text and the plaintext Secret-algorithm • A proprietary algorithm that is not publicly disclosed • This is discouraged because it cannot be reviewed Weak / depreciated algorithms • An algorithm that can be easily "cracked" or defeated by an attacker High-resiliency • Refers to the strength of the encryption key if an attacker discovers part of the key Data-in-transit • Data sent over a network Data-at-rest • Data stored on a medium Data-in-use • Data being used by an application / computer system Out-of-band KEX • Using a medium / channel for key-exchange other than the medium the data transfer is taking place (phone, email, snail mail) In-band KEX • Using the same medium / channel for key-exchange that the data transfer is taking place Integrity • Ability to determine the message has not been altered • Hashing algorithms manage Authenticity
    [Show full text]
  • Considering PGP
    Security Now! Transcript of Episode #418 Page 1 of 38 Transcript of Episode #418 Considering PGP Description: This week, Steve and Leo continue covering the consequences of the Snowden leaks and, with that in mind, they examine the Pretty Good Privacy (PGP) system for securely encrypting eMail and attachments. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-418.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-418-lq.mp3 SHOW TEASE: It's time for Security Now!. Steve Gibson, our security guru, is here. This is a show everybody has to watch. In fact, share it with your friends, your neighbors, your colleagues: Using PGP to protect your email. Steve talks about it next on Security Now!. Leo Laporte: This is Security Now! with Steve Gibson, Episode 418, recorded August 21st, 2013: Considering PGP. It's time for Security Now!, the show that covers your security, your privacy, your safety online with this man here, the 'Splainer in Chief, Steven Gibson at GRC.com. Hey, Steverino. Steve Gibson: Hey, Leo. Great to be with you for Show No. 1 of Year No. 9. Leo: Wow. Steve: We begin our ninth year. Leo: Wow. Episode 418, and you've only missed one, and that was because we made you. Steve: Yeah. So we're not going to do that again. That was not pretty. There was an uprising among the natives. Security Now! Transcript of Episode #418 Page 2 of 38 Leo: Well, you've got to fight it out with Lisa because I don't - I never had the cojones to stop you, but she does.
    [Show full text]
  • A Few Thoughts on Cryptographic Engineering What's the Matter With
    13/06/2020 What’s the matter with PGP? – A Few Thoughts on Cryptographic Engineering MenuMenu A Few Thoughts on Cryptographic Engineering Some random thoughts about crypto. Notes from a course I teach. Pictures of my dachshunds. Mahew Green in messaging, privacy August 13, 2014July 29, 2016 2,592 Words What’s the matter with PGP? Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google’s end-to-end email extension (hps://code.google.com/p/end-to-end/). This is a Big Deal. With providers like Google and Yahoo onboard, email encryption is bound to get a big kick in the ass. This is something email badly needs (hp://www.newyorker.com/tech/elements/the-daunting-challenge-of- secure-e-mail). So great work by Google and Yahoo! Which is why following complaint is going to seem awfully ungrateful. I realize this and I couldn’t feel worse about it. As transparent and user-friendly as the new email extensions are, they’re fundamentally just re-implementations of OpenPGP (hp://en.wikipedia.org/wiki/Prey_Good_Privacy) — and non-legacy-compatible ones, too. The problem with this is that, for all the good PGP has done in the past, it’s a model of email encryption that’s fundamentally broken. It’s time for PGP to die. In the remainder of this post I’m going to explain why this is so, what it means for the future of email encryption, and some of the things we should do about it. Nothing I’m going to say here will surprise anyone who’s familiar with the technology — in fact, this will barely be a technical post.
    [Show full text]
  • ECE 646 – Lecture 4 Required Reading
    ECE 646 – Lecture 4 Required Reading Stallings, Cryptography and Network Security: Principles and Practice, 6/E or 7/E Pretty Good Privacy Chapter 19.1 Pretty Good Privacy (PGP) PGP On-line Chapters (available after registration): Appendix O Data Compression Using Zip Appendix P More on PGP Phil Zimmermann – early years • grew up in Florida, got interested in cryptography in teenage years • studied physics at Florida Atlantic Short History of PGP University, 1972-1977 based on the book Crypto • learned about RSA shortly after its discovery, from the Mathematical by Steven Levy Recreational column in Scientific American • became active in the antinuclear political movement of 1970s-1980s 1 Collaboration with Charlie Merritt Early Work (1986-1991) • in 1984, Zimmermann was contacted by Charlie Merritt, who implemented RSA on a microcomputer based on Z80 • in 1986, Zimmermann summarized his ideas in the paper 8-bit microprocessor published in IEEE Computer • by 1986, Merritt passed to Zimmermann all his knowledge • As a secret key cipher he chose a cipher developed by of multiprecision integer arithmetic required to implement Merritt for navy, with his own security improvements. RSA He called this cipher Bass-O-Matic, see • In 1986, Merritt and Zimmermann met with Jim Bidzos, http://www.nbc.com/saturday-night-live/video/bassomatic/n8631?snl=1 the new CEO of RSA Data Security Inc., who brought with him a copy of Mailsafe, a program written by Rivest and • in 1990, he devoted his time completely to finishing the Adleman, implementing RSA. After the meeting: program he called Pretty Good Privacy • Zimmermann claimed that Bidzos offered him a free • In 1990 he called Jim Bidzos to confirm his free RSA license.
    [Show full text]
  • View the Index
    INDEX OF TERMS 2013, 2 Axolotl, 11 65537, 2 Backdoor, 11 A5/0, 2 Backtracking resistance, 11 A5/1, 2 Backward secrecy, 11 A5/2, 3 Base64, 12 A5/3, 3 BassOmatic, 12 A5/4, 3 BB84, 12 Adaptive attack, 3 bcrypt, 12 AEAD (authenticated encryption Biclique cryptanalysis, 13 with associated data) , 3 BIKE (Bit Flipping Key AES (Advanced Encryption Encapsulation), 13 Standard), 4 BIP (Bitcoin improvement AES-CCM, 4 proposal), 13 AES-GCM, 5 Bit Gold, 14 AES-GCM-SIV, 5 Bitcoin, 14 AES-NI, 5 Black, 14 AES-SIV, 6 BLAKE, 14 AIM (Advanced INFOSEC Machine), 6 BLAKE2, 14 AKA, 6 BLAKE3, 14 AKS (Agrawal–Kayal–Saxena), 7 Bleichenbacher attack, 15 Algebraic cryptanalysis, 7 Blind signature, 15 Alice, 7 Block cipher, 16 All-or-nothing transform (AONT), 7 Blockchain, 16 Anonymous signature, 8 Blockcipher, 17 Applied Cryptography, 8 Blowfish, 17 Applied cryptography, 8 BLS (Boneh-Lynn-Shacham) ARC4, 8 signature, 17 Argon2, 8 Bob, 18 ARX (Add-Rotate-XOR), 9 Boolean function, 18 ASIACRYPT, 9 Boomerang attack, 18 Asymmetric cryptography, 9 BQP (bounded-error quantum Attack, 9 polynomial time), 19 Attribute-based encryption (ABE), 10 Braid group cryptography, 19 Authenticated cipher, 11 Brainpool curves, 19 Break-in recovery, 20 Cryptologia, 29 Broadcast encryption, 20 Cryptology, 29 Brute-force attack, 20 Cryptonomicon, 29 Bulletproof, 20 Cryptorchidism, 30 Byzantine fault tolerance, 21 Cryptovirology, 30 CAESAR, 21 CRYPTREC, 30 Caesar’s cipher, 22 CSIDH (Commutative Supersingular CAVP (Cryptographic Algorithm Isogeny Diffie–Hellman), 30 Validation Program), 22
    [Show full text]
  • Open UNSUSPECTED TEACHERS 4.15.Pdf
    The Pennsylvania State University The Graduate School College of Education THE UNSUSPECTED TEACHERS: ENVIRONMENTAL IDENTITY AND SUSTAINABILITY EDUCATION IN THE ANTHROPOCENE A Dissertation in Educational Theory and Policy by Peter Dawson Buckland © 2015 Peter Dawson Buckland Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2015 ii The dissertation of Peter Dawson Buckland was reviewed and approved* by the following: Madhu Suri Prakash Professor of Education Dissertation Advisor Co-Chair of Committee Jacqueline Edmondson Professor of Education Associate Vice President and Associate Dean for Undergraduate Education Co-Chair of Committee Mindy Kornhaber Associate Professor of Education Christopher Uhl Professor of Biology Gerald LeTendre Professor of Educational Theory and Policy Department Head of Education Policy Studies Center for the Study of Leadership in American Indian Education iii Abstract People in higher education institutions are designing, advocating, and implementing curricular changes for sustainability and ecological literacy. This study sought to understand the environmental identities of sustainability education advocates working in higher education. Do they have self-conscious environmental identities? If so, what do those identities entail for their actions, ethics, and professional lives? To answer these questions, I used two research methods. First, using memoir and poetry, I wrote an extended researcher identity piece to investigate the development and facets of my own environmental identity. Second, the study detailed the environmental identities of twelve sustainability education policy entrepreneurs working at two Pennsylvania universities. This information was obtained through semi-structured interviews. The presentation of this study concludes with modest but transformative recommendations to foment a culture that values strong environmental identification and creates positive feedback loops for faculty and staff who work for ecological literacy and sustainability.
    [Show full text]
  • My Crazy Boss Asked Me to Design a New Block Cipher. What's Next?
    Advanced Block Cipher Design My crazy boss asked me to design a new block cipher. What’s next? Pascal Junod University of Applied Sciences Western Switzerland Pascal Junod -- Advanced Block Cipher Design 1 ECRYPT II Summer School - May 31st, 2011, Albena, Bulgaria Outline •High-Level Schemes •Confusion •Diffusion •Key-Schedule •Beyond the Design Pascal Junod -- Advanced Block Cipher Design 2 ECRYPT II Summer School - May 31st, 2011, Albena, Bulgaria Introduction Pascal Junod -- Advanced Block Cipher Design 3 ECRYPT II Summer School - May 31st, 2011, Albena, Bulgaria Some Simple Facts • As of today, nobody knows how to design a (mathematically proven) secure block cipher. • Problem related to fundamental open questions in mathematics/computer science • A secure block cipher is a block cipher that nobody can break... • A good block cipher is a secure block cipher that people like to implement. Pascal Junod -- Advanced Block Cipher Design 4 ECRYPT II Summer School - May 31st, 2011, Albena, Bulgaria So many Designs in the Hierocrypt G-DES Wild... LOKI MacGuffin LION RC2 Akellare Coconut98 DFC Square E0 Twofish Anubis CAST Skipjack CS-Cipher DEAL Shark RC5 Rijndael IDEA Camellia Aria Present Noekeon Magenta DES-X Threefish RC6 Seed Mars FOX Serpent BassOmatic GOST DES MESH 3-Way E2 TEA Blowfish Misty XTEA Triple DES Cipherunicorn BEAR CLEFIA FEAL XXTEA 5 Madryga Designing a New Block Cipher • Several good and bad reasons: • Faster/smaller than any other one ✔ • With «better» security guarantees than any other one ✔✔ • My boss crazily asked me to design a new, secret (!) and patented (!!) block cipher ~ • Not enough proposals/diversity in the wild ✖ • I desperately need to publish something to finish my PhD thesis ! ✖ Pascal Junod -- Advanced Block Cipher Design 6 ECRYPT II Summer School - May 31st, 2011, Albena, Bulgaria Designing a New Block Cipher • Claude E.
    [Show full text]
  • Download Sample
    Crypto Dictionary © 2021 by Jean-Philippe Aumasson Authenticated cipher A See AEAD. Axolotl B The original name of the Signal application’s end-to-end messaging protocol. A See Signal protocol. B Backdoor A covert feature to bypass an algorithm or protocol’s security. Trapdoors are known by users to exist; backdoors usually are not. A backdoor was once defined as a feature or defect that allows surreptitious access to data. A good backdoor must be undetectable, NOBUS (no-one- but-us, or exclusively exploitable by its architects), reusable, unmodifi- able, and deniable. For these reasons, backdoors in cryptographic algorithms are dif- ficult to design and are more easily added in implementations, espe- cially when the internal logic isn’t open and hard to deobfuscate. The NSA backdoor in Dual_EC_DRBG is a notable exception. Unfortunately, the most interesting research about backdoors isn’t presented at IACR conferences. Backtracking resistance Term notably used by NIST to refer to a notion similar to forward secrecy. The opposite of prediction resistance. A See Forward secrecy. Backward secrecy The opposite of forward secrecy: backward secrecy is the property that if an attacker compromises some secret keys, future messages remain protected. If an entire system’s state is compromised—includ- ing long-term and short-term keys as well as any secret state or Backward secrecy 11 Crypto Dictionary © 2021 by Jean-Philippe Aumasson counter—backward secrecy is often impossible. An exception is pseudo- random generators, where uncertainty can be brought into the system via reseeding from reliable entropy sources, preventing an attacker from determining future output bits from a past snapshot of the sys- tem.
    [Show full text]
  • XL-7 Operation Manual (Revison D)
    Operation Manual © 2001 E-MU / ENSONIQ All Rights Reserved FI11541 Rev. D E-MU World Headquarters Europe, Africa, Middle East E-MU / ENSONIQ E-MU / ENSONIQ P.O. Box 660015 Suite 6, Adam Ferguson House Scotts Valley, CA USA Eskmills Industrial Park 95067-0015 Musselburgh, East Lothian Telephone: 831-438-1921 Scotland, EH21 7PQ Fax: 831-438-8612 Tel: +44 (0) 131-653-6556 Internet: www.emu.com Fax: +44 (0) 131-665-0473 Important Notice: In order to obtain warranty service on your XL-7 unit, the serial number sticker must be intact and you must have a sales receipt or other proof of purchase. If there is no serial number sticker on the XL-7, please contact E-MU Systems at once. This product is covered under one or more of the following U.S. patents: 4,404,529; 4,506,579; 4,699,038; 4,987,600; 5,013,105; 5,072,645; 5,111,727; 5,144,676; 5,170,367; 5,248,845; 5,303,309; 5,317,104; 5,342,990; 5,430,244 and foreign patents and/or pending patents. All other trademarks belong to their respective companies. Specifications and features are subject to change without notice. XL-7 Operation Manual i Table of Contents Introduction ............................................................................. 1 Product Description .......................................................................................1 Important Safety Instructions .................................................. 4 Foreign Language Warnings - German ................................... 7 Foreign Language Warnings - French ................................... 10 Setup .....................................................................................
    [Show full text]
  • International Journal of Engineering Technology Research & Management
    ISSN: 2456-9348 Vol (02) _Issue (11) Impact Factor: 4.520 International Journal of Engineering Technology Research & Management MODERN CRYPTOGRAPHY TECHNIQUES FOR INCREASE NETWORK SECURITY Solmazsharifnia* *Department of Mathematics, Shahed University, Tehran, Iran [email protected] ABSTRACT Network Security & Cryptography is a concept to protect network and data transmission over wireless network.Data Security is the main aspect of secure data transmission over unreliable network. Network security involves theauthorization of access to data in a network, which is controlled by the network administrator. Users choose or are assignedan ID and password or other authenticating information that allows them access to information and programs within theirauthority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobsconducting transactions and communications among businesses, government agencies and individuals. Networks can beprivate, such as within a company, and others which might be open to public access. Network security is involved inorganizations, enterprises, and other types of institutions. In this paper we also studied cryptography along with itsprinciples. Cryptographic systems with ciphers are described.The cryptographic models and algorithms are outlined. Keywords: Encryption, Decryption, Security,Cryptograghy,Cipher, Network Blocks INTRODUCTION Today’s our entire globe is depending on internet and its application for their every part of life. Here comes the requirement of securing our data by ways of Cryptography. Cryptography plays a major role in a science of secret writing. It is the art of protecting information by transforming and technology application. The main reason for using email is probably the convenience and speed with which it can be transmitted, irrespective of geographical distance.
    [Show full text]
  • Encryption Standards
    Security + Encryption Standards Author: Joseph Lee Email: joseph@ ripplesoftware.ca Mobile: 778-725-3206 General Concepts Forward secrecy / perfect forward secrecy • Using a key exchange to provide a new key for each session provides improved forward secrecy because if keys are found out by an attacker, past data cannot be compromised with the keys Confusion • Cipher-text is significantly different than the original plaintext data • The property of confusion hides the relationship between the cipher-text and the key Diffusion • Is the principle that small changes in message plaintext results in large changes in the cipher-text • The idea of diffusion is to hide the relationship between the cipher- text and the plaintext Secret-algorithm • A proprietary algorithm that is not publicly disclosed • This is discouraged because it cannot be reviewed Weak / depreciated algorithms • An algorithm that can be easily cracked or defeated by an attacker High-resiliency • Refers to the strength of the encryption key if an attacker discovers part of the key Data-in-transit • Data sent over a network Data-at-rest • Data stored on a medium Data-in-use • Data being used by an application / computer system Out-of-band KEX • Using a medium/channel for key-exchange other than the medium the data transfer is taking place (phone, email, snail mail, web-portal) In-band KEX • Using the same medium / channel for key-exchange that the data transfer is taking place • DH is an example Integrity • Ability to determine the message has not been altered • Hashing algorithms
    [Show full text]
  • EMU Mo' Phatt MANUAL
    Operation Manual ©2000, E-MU Systems, Inc. d.b.a. E-MU / ENSONIQ. All rights reserved. FI10721 Rev. B E-MU World Headquarters Europe, Africa, Middle East E-MU / ENSONIQ E-MU / ENSONIQ P.O. Box 660015 Suite 6, Adam Ferguson House Scotts Valley, CA USA Eskmills Industrial Park 95067-0015 Musselburgh, East Lothian Telephone: 831-438-1921 Scotland, EH21 7PQ Fax: 831-438-8612 Tel: +44 (0) 131-653-6556 Internet: www.emu.com Fax: +44 (0) 131-665-0473 The following are registered worldwide trademarks owned and/or exclusively licensed by E-MU Systems, Inc.: E-MU® and E-MU Systems®. All other trade- marks are the property of their respective holders. Important Notice: In order to obtain warranty service on your Mo’Phatt unit, the serial number sticker must be intact and you must have a sales receipt or other proof of purchase. If there is no serial number sticker on the Mo’Phatt, please contact E-MU Systems at once. This product is covered under one or more of the following U.S. patents: 4,404,529; 4,506,579; 4,699,038; 4,987,600; 5,013,105; 5,072,645; 5,111,727; 5,144,676; 5,170,367; 5,248,845; 5,303,309; 5,317,104; 5,342,990; 5,430,244 and foreign patents and/or pending patents. All other trademarks belong to their respective companies. Specifications and features are subject to change without notice. Mo’Phatt Operation Manual i Table of Contents Table of Contents Introduction ............................................................................. 1 Product Description ............................................................................. 1 Overview ............................................................................................
    [Show full text]