Data Entry
(3)
•
Then add audio analyses from plugin(s) to help identify note attacks.
•
•
•
In this example, the MzAttack plugin was used:
•
http://sv.mazurka.org.uk/MzAttack