|
From: | Kieren MacMillan |
Subject: | Re: Accidentals: Unwanted naturals |
Date: | Mon, 31 Aug 2009 11:32:13 -0400 |
Hi Kees,
these programs operate as you describe
Okay, then they *do* use (essentially) the same method as Lilypond, not some "visually-oriented" method which "follows the key signature"...
So is there *any* example of an application which tries to "follow the key signature" for someone? Not only do I know of no such program, I can't even imagine how it could be done (technically).
Cheers, Kieren.
[Prev in Thread] | Current Thread | [Next in Thread] |