Thursday, 4 June 2015

Specialist Software for the Blind or Visually Impaired.



How and why does specialist improve accessibility

To help you improve your accessibility to communicating via IT I have provided you with ways that will help you overcome barriers with sight and give you information on software's that help the visually impaired.

Screen Display

Having the screen displayed to the users needs is vital as some visually impaired people will find it difficult. To some people having the computer with a software of screen magnification benefits  them as it will help them see small sized text clearly. A software that can be used in the Supernova and Lunar Software; this software also helps the users have more control over their screen display

Settings for text sizes, fonts and colours can be used to modify the screen. The computer settings can help people with contrast and brightness difficulty which can be altered. The operating system, Windows, have a built in system which helps people with visual problems such as enlarging the screen. Purchasing an anti glare screen computer or laptop can also be beneficial. 



Speech with Computers
Within some computers there is a system which allows the option of speech aid which allows you to read text. The computer system also provides a reading software. 

Specialized Equipment and Software
RNIB and other organisations are the common makers of equipment and software of the visually impaired. It is sensible to start by trying to use the readily available equipment. Without having these equipment and softwares you can manually change the text size in a word and other documents.

In addition to standard computer equipment there is a range of special electronic equipment designed to be used by people with a visual impairment. An example of one product or specialized equipment is a portable braille computer or braille input and output devices for everyday normal computers.

Working Environment
An appropriate working environment is important for people with visual impairment. Lighting and a good working position and posture can make it easier for an individuals vision.

Zoom Software
There are several different software's that can be accessed by different operating systems such as Apple and Microsoft. There are several reasons why Zoom applications is used, one being that it can be customized. For example, individuals can decide on how much they would like to zoom in as well as the shortcuts to change the zooming option, access from the mouse pointer, tracking and color settings; however this can be seen as a disadvantage as it can be harder to use. 
There are various software's such as Magnifying Glass, Zoom Lens, Desktop Magnify and ZoomIt

Easy Access via On-Screen Keyboard

How and why does an on-screen keyboard improve accessibility to IT communications? 
It allows individuals who are visually impaired to use devices that they normally cannot access. With keys that are not on regular keyboards put in place it will help people access different documents with one touch. 
How can it be accessed?
To access this device you will need to click on the start button,then click on the 'All Programmes' button which will lead you to various different options; clicking on the 'Accessories' command will take you to the option of Easy Access; this will give you the device. There are various different features that come with the on screen keyboard such as programmable keys, customization, auto-correction, gestures.

The reason why it increases accessibility 
To access this device you will need to click on the start button,then click on the 'All Programmes' button which will lead you to various different options; clicking on the 'Accessories' command will take you to the option of Easy Access; this will give you the device. There are various different features that come with the on screen keyboard such as programmable keys, customization, auto-correction, gestures.

Programmable Keys
A programmable key is a key that is on a keyboard which has the function and capability of doing a specific objective. For example there could be a key for opening a web browser with just one touch. These types of keys are not normally found on general keyboards  

Customization

To make your on screen keyboard more personal and unique to you there are over 50 different designs that can be applied with the correct software. If the sample designs do also not meet your preferred taste you can be unique and modify the keyboard by creating your own; this can be done by changing the colour, font, size, shape, background etc.  

Auto Correction and Gestures
With predictive text, text replacement in place as you type is useful as it will allow you to type faster as it provides you with suggestions; this also enables words to be corrected after writing several letters. Gestures also allow spaces to be put in place and Auto Capitalization.

Key Logger
With key-logger in place it will make it more easier for people as the software picks up every keystrokes and saves it in a log. Having the recorder on will record various details from emails to messaging servers. 

Security
Having an on-screen keyboard also allows the risk of lack of security. One reason to this is because it is very easy to shoulder surf as it is on the screen. Another reason this can be a risk is that key logger can be a flaw at times due to the fact that people can go against the Computer Misuse Act and will be able to access personal information due to the log. 

Easy Access via Text Readers

What is a Text/Screen Reader?
This is a software that helps people that are visually impaired use their computer more efficiently; this application can be used on any Operating System. This can be available for free online as there are various different websites that can also offer this service. These applications and software's provide the correct support for visually impaired users and other individuals as well as providing natural voices. Text Readers allows users to play the information at a customized rate and volume with the added option of having the text highlighted.
How does a Screen/Text Reader help the individual?
Whether the user is blind or partially sighted, this software will give back the information that they have been provided through speech or braille. The information can be passed through speech via the Text to Speech application that is installed with the software and it can also be passed via braille through an external hardware device.  
How does the Screen/Text Reader work?
Using this software is quite easy as it is accessible through a variety of keyboard shortcuts which carry out a specific task such as reading documents or listening to music. It also works with scanners which allow documents to be printed with a 99% success rate. 
Natural Reader Software 
There are various different software's that have this application in place whether you have to pay or its free of charge. A popular software that is most  commonly used is 'Natural Reader' as this has the Text to Speech application with natural sounding voices; this software converts text from webpages, PDF files, emails Microsoft documents and an optional change from text to audio files such as MP3. 
Power-Talk
Another software that also has Text Reader is Power-talk which is a free program that allows individuals to have the option of Power-point presentations to be spoken out loud.
Purpose of Text Readers
There are various different reasons to why this software can be used. The most common reason to why it is used is that people can be able to listen to documents, emails and books; the purpose behind this is that some individuals suffer from strong headaches and eye strain or are blind. 
Another purpose could be that the Text Readers are designed for dyslexic users; this will help them due to the option of having highlighted words while they are being spoken as it will help them with reading.   

Specialist Software for People with Physical Difficulties

Puff-Suck Switch
This device helps people with limited physical mobility by providing them with a switch that is connected to a computer. When the user sucks or puff down the device it will activate the switch. The video shows the device explained and shown in depth.







Foot Mouse
This particular device aids people with limited mobility of their hands and arms. This mouse gives individuals the right to be independent as it gives them access to navigate through programs like a normal mouse. The foot mouse has to controls which are the cursor that enables users to move around and the other control that enables them  to click.
An additional device that has access to various different types of computers such as Tablets and IPad's is the Page turner. This device is enabled via Bluetooth.This software works on Microsoft and Apple Operating systems that will allow individuals to navigate the page up and down.

Eye Typer

This device is aimed at people who have no control over their hands and legs and can no longer operate a normal mouse and keyboard. An eye typer consists of a camera installed on the computer and is set to look at the individuals eye. The users eye is now see as the mouse and determines where to navigate; one slow blink is also known as the conventional moue click. This video is an example of the device being used however this is an old version.

How to Stay Safe and Secure While Using a Specialist Communication Channel

Securing Data
To make sure you are safe and secure while using specialist communication channels you should make sure to not put any of your personal information on public for example, phone numbers, bank details and passwords. You can also secure your blog by listing your blog private or public; having it set on private will mean that viewers will need a password to access the blog. Other social media sites such as Facebook also allows you to change the settings to keep your profile more secure. For example, custmozing who sees your images and posts.
Guideline 
Having a strong password is key as it will prevent strangers from hacking into your personal sites to make sure your password is strong you will need to have at least numbers and lower and upper case letters and a minimum of 6 letters; this is an example of a strong password- S3curitY. 

With you not being safe with your personal information it could lead to identity theft, to avoid this from happening individuals should not be giving personal details on-line and make sure if the website you are giving the details to is safe and secure.

Encryption/Fire-walls To secure your data you could use various things to help such as encryption which is the most effective way to achieve a safe and secure data. However having this and other features in place means that you will need to pay for the software to keep the encryption going and using fire walls to back up data.

Digital Content
Viewing digital content on-line is good as it provides people with information  for free and it can be accessed on all time. However a drawback to viewing content on-line is that the computer can be prone to viruses; to prevent this you will need to make sure your computer has got a secured anti-virus software installed beforehand. 
Guideline 
If you would like to upload any content on-line you need to make sure that you have the right to upload the information you have given and make sure it is not copyrighted. Once you upload something on-line it means it can be viewed by anyone so you have to make sure you are 100% positive to what you have published.

Data Protection
The Data Protection Act 1998 is a way to ensure individuals that what has been said will be kept confidential.  When personal data has been received the individual who has provided you with the information should know who you are and how the information will be used. Handling data is key as the data should be accurate, valid and up to date, the individual who is charge will need to pick up any errors that can be changed. When the data is no longer needed then, it can no longer be stored so it should be deleted; if not then the information should be secured in case of any access.  There are 8 main principles which should be followed and people should abide. All data should be managed fairly and lawfully for the use of lawful purpose; the data should also be acceptable, applicable and not excessive. The data that has been provided should be kept up to date and regularly updated and should not be kept when it is no longer needed.  

Guideline
This will keep the employers rights respected. There are several ways that your personal information could be kept intact, for example in a filing cabinet with high security that only one individual has contact too. If this act has not been followed correctly then an individual could be prosecuted depending on the offence.