Data Entry    (3)
• Then add audio analyses from plugin(s) to help identify note attacks.
•
•
• In this example, the MzAttack plugin was used:
•
      http://sv.mazurka.org.uk/MzAttack