Browse Definitions :
Definition

flanging

Flanging is an audio process that combines two copies of the same signal , with the second delayed slightly, to produce a swirling effect. The process originated before digital effect boxes and computer editing were available. The effect, invented in the early 1950s by Les Paul and later used by artists such as Jimi Hendrix and The Beatles, was originally created using two tape recorders.

Here's how the nondigital process worked: While the original sound was being played from Tape Recorder #1, a second copy of the same audio material was played back from Tape Recorder #2. This process alone creates a hollow sound caused by the slight irregularities in the phase relationship of the audio waveforms. To get the flanging effect, the speed of the second recording was altered slightly. This was done most often by pressing a finger lightly on the tape reel's "flange", the large metal circle that surrounds and contains the tape on its hub. This created a time delay in addition to the phase differences, making the effect more pronounced.

Today, digital simulations of the process have replaced the flanging effect that was created using reel-to-reel tape recorders. The basic concept remains the same. The software or hardware device delays a copy of the source audio, but instead uses a low frequency oscillator (LFO) to vary the speed of the copy's playback. (The oscillator moves in the range of 1-20 cycles per seconds to get the effect.) Feeding the processed signal back into the device to be processed again can get a more intense effect.

Guitarist Les Paul invented flanging. He and Mary Ford first made it popular in the early 1950s. Les Paul also invented the solid body electric guitar and many sound techiques in use today. The first completely digital electronic flanging unit was the Delta Lab Research CompuEffectron, introduced in the 1970s.

This was last updated in April 2005
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close