Browse Definitions :
Definition

MIDI (Musical Instrument Digital Interface)

MIDI (Musical Instrument Digital Interface) is a protocol designed for recording and playing back music on digital synthesizers that is supported by many makes of personal computer sound cards. Originally intended to control one keyboard from another, it was quickly adopted for the personal computer. Rather than representing musical sound directly, it transmits information about how music is produced. The command set includes note-ons, note-offs, key velocity, pitch bend and other methods of controlling a synthesizer. The sound waves produced are those already stored in a wavetable in the receiving instrument or sound card.

Since a MIDI file only represents player information, it is far more concise than formats that the sound directly. An advantage is very small file size. A disadvantage is the lack of specific sound control.

With a program that provides this interface, you can create music using a standard keyboard or other input device. You or others can then play your MIDI-conforming creation with the same or another program and a sound card as a music synthesizer. The MIDI program may come with a graphical user interface that looks like a sound studio control room. Many sound cards come as a package with MIDI software (for example, Media Vision's Pro Audio Studio 16).

The MIDI protocol uses eight-bit serial transmission with one start bit and one stop bit, has a 31.25 Kbs data rate, and is asynchronous. Connection is made through a five-pin DIN plug, of which three pins are used.

This was last updated in April 2005

Continue Reading About MIDI (Musical Instrument Digital Interface)

Join the conversation

2 comments

Send me notifications when other members comment.

Please create a username to comment.

is MIDI used in garage band?
Cancel
I would like to input a simple melody via microphone (voice or woodwind) then see it turned into standard notation: time signature, rhythm, and correct notes.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

  • WPA3

    WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

Close