Feeds

Fairlight: The Rolls Royce of synthesizers

We salute the big beige monster of the 80s

High performance access to file storage

Synthesizers and Royal Weddings were everywhere in the early Eighties, but the real Rolls Royce of electronic music was the Fairlight.

An Australian-made music production system based on the Motorola 6800 processor, the Fairlight was - at well over £20,000 – a stupendously pricey piece of kit.

Officially named the Fairlight Computer Musical Instrument, the Fairlight was a pioneering digital music workstation. It was designed by Peter Vogel and Kim Ryrie, and imported into the UK by Syco – a high-end music (and later video) equipment retailer run by Peter Gabriel’s then brother-in-law, Stephen Paine.

The Fairlight marked the practical beginning of digital samplers in music. The other ‘big ticket’ digital music production system of the era, New England Digital’s even pricier Synclavier, soon added sampling to its wavetable-based vocabulary.

sigCMIKEYBOARDB

The early Eighties were, in a sense, the high water mark for big technology in music. Not because the charts were particularly dominated by high tech: Shakin' Stevens’s unapologetically retro Green Door was at number one in July ’81 and although Depeche Mode and The Human League were certainly bouncing around in the hit parade, they used comparatively low-end gear.

In their early years Depeche Mode tended to use the new wave of entry-level synthesizers that were just coming onto the market, typified by the basic but meaty-sounding Moog Rogue. The Human League mainly used Roland modular systems from the mid-70s, controlled by Roland’s notoriously hard-to-master sequencers the MC-4 and MC-8.

The Fairlight was an entirely different beast.

It was launched in Australia in 1979 but first really excited the popular imagination after a 1982 South Bank Show special, which followed the recording of Peter Gabriel’s fourth and final self-titled album which our American friends know as Security. Other pioneers of the big beige monster included Kate Bush, who first used one on her 1980 Never For Ever album. The single Babooshka displays to great effect the Fairlight’s signature ‘glass breaking’ samples.

The Fairlight sampled in mono, with a fairly grainy sounding 8 bit resolution and had a bandwidth of around 2100 Hz to 30 kHz. If there’s a mobile phone in your pocket right now, chances are that it can sample better than that.

Sampling is now so ubiquitous that we forget how, back when Charles and Di were pledging their everlasting troth, it was a quite amazing trick. Just crudely playing a tune with a sampled dog bark (Wonderdog) was enough to kickstart the dastardly Simon Cowell’s musical career in 1982.

By contrast, Gabriel used the Fairlight to evoke exotic ‘world music’ textures and generate skittery sequenced percussion for his ambitious and still very listenable fourth album.

The Mark 2 version that Peter Gabriel would have used on tracks such as Shock The Monkey boasted 64 kilobytes of system memory. There was no hard disk. The operating system was loaded on a floppy disk that really was floppy, a big 8” square vinyl job that you could almost bend in half. A second drive enabled the user to load pre-made samples into RAM.

The charts of the early Eighties were filled with the CMI’s ‘ORCH 5’ orchestra stab and breathy ‘ARR 1’ choir.

The Fairlight was much more than just a magic box for playing back animal noises and violin screeches. There was a complex and powerful music composition environment (MCL) that no one I ever met really understood, a fully featured performance capture sequencer (called Page S) and a waveform analysis tool on which the user could modify an audio waveform directly onscreen using the attached light-pen.

The big sell, though, was Page R. It was in effect a giant drum machine. Short ‘patterns’ of eight monophonic samples could be assembled quickly and easily into songs.

If you wanted to use a Fairlight in tandem with, for example, a then-ubiquitous Roger Linn drum machine, there was no plug and play synchronisation. A dedicated studio clock called an SRC had to be pressed into service in order to get all of the devices of the era to talk to one another.

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.