News about nformation systems throughout M I T

w                                      can also make corrections, spell, and       Windows 3.0 is a Windows 95 and
Software Spotlight

Operating System Features                                                                  Display Op...
                     Network N...
Configurations and Pricing
              MIT Computer Connection/Bits and Bytes                                   Prices l...
• Blink Tags. Don’t use them. Besides
               Publishing Pointers                                                  ...
Computers and Health: Resources at MIT

Who can help you                                 What they provide
Administrative ...
Getting Help

If you don’t know where to get help             For help with...                      Dial...     Or send a...
Upcoming SlideShare
Loading in …5

News about nformation s ystems throughout M I T


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

News about nformation s ystems throughout M I T

  1. 1. News about nformation systems throughout M I T . . . . . . . . Volume 13 • Number 2 Mission Remains the Same Lee Ridgway IS The ATIC Lab Moves, But Its November / December 1997 A Place to Try Things Out The ATIC Lab is the place where you can try out a variety of adaptive technologies. Some recently added . MIT Offers Many Resources for Preventing and Treating RSI ............... 2 . . . . . S ince 1992, the Adaptive Technol- ogy for Information and Computing products are highlighted below. You can find out more about these solu- tions from the ATIC Web site at . . (ATIC) Lab has assisted disabled Software Spotlight . members of the MIT community with Operating System Features . For more in-depth information, check . their computing needs. The ATIC Lab Can Aid Accessibility ........................... 3 . the list of vendors’ Web sites on page 8. . now serves about 250 students, faculty, . . and staff each year. Alternative Keyboards and Mice Network Notes . . Disabilities include a wide range Makers of alternative keyboards Protect Your Computer from . . of visual, speech, hearing, and neuro- have created different configurations Packet Sniffing Programs ..................... 4 . . logical impairments, as well as learn- to relieve repetitive strain injuries (RSI) Computer Corner ................................... 4 . ing disabilities. Adaptive technology and to help those whose disabilities . . for computing environments is equally limit movement of hands and fingers. MIT Computer Connection/ . . wide-ranging. For example, a simple Kinesis makes a split, tilted keyboard Bits and Bytes . . adaptation might be an alternative with a concave key layout. It’s de- Apple’s G3 Series Offers . mouse or adjustable-height table. Or signed to improve arm positioning . Breakthrough Performance ................. 5 . the technology may be more complex, and is easy for people of different . Hot Topics, Cold Weather: IS . such as a voice recognition system or sizes to use. Several keys let users . . refreshable Braille display. take advantage of thumb strength in- Computing Events During IAP .......... 5 . . stead of stretching their little fingers. Publishing Pointers . A Move to Larger Quarters This keyboard comes in a Dvorak/ . How to Design an Accessible . This fall, after several months in QWERTY model so that you can . . temporary space, the ATIC Lab moved switch key layouts or use program- (ADA-Compliant) Web Site ................ 6 . . to new quarters in Room 11-103, near mable keys to remap key positions to Customer Alert: Many IS Groups . the Student Services Center on the . your preference. The Kinesis comes Prepare to Move to N42 ....................... 6 . Infinite Corridor. Coordinator Kathy . with optional foot switches to emulate . Cahill and her student consultants keystrokes. While many clients with Computers and Health: . . are again offering the full range of RSI have found the Kinesis helpful, Resources at MIT ................................... 7 . . ATIC Lab services. These services, ATIC staff recommend that each . Getting Help ........................................... 8 . available by appointment, include person test this and other keyboards . demonstrations of adaptive technol- . before deciding which one is most Selected Vendors of Adaptive . ogies, advice, and troubleshooting. . appropriate. Hardware and Software ........................ 8 . Access to Lab equipment is available Other alternative devices can be . . to students on a continuing basis by combined with, or used in lieu of, a . . prior arrangement. . v . continued on page 2
  2. 2. w can also make corrections, spell, and Windows 3.0 is a Windows 95 and ATIC LAB MOVES format with voice commands. The NT-based package from Henter-Joyce. continued from page 1 deluxe version lets you create custom It uses the numeric keypad for speech macros to increase your productivity. control and keyboard hotkeys in place keyboard. Computer mice come in of a mouse. JAWS can be used with a many designs, and you can also move Alternative Output Devices hardware speech synthesizer, such as a cursor and click buttons with track- People who are partially sighted an internal DECtalk PC board, or a balls, touch-sensitive pads, and even or blind need alternative ways to read software synthesizer, such as FlexTalk. foot pedals. Digitizing tablets with a output. The visually impaired can use Emacspeak, from Cornell, is the stylus also fall into this category. magnification utilities to enlarge screen first full-fledged speech output system The Kensington Expert Mouse is a contents. Blind users can opt for re- for UNIX. The ATIC Lab is running large trackball with four programma- freshable displays that convert text this software on a Sun SPARC4. The ble keys. It comes with MouseWorks on the screen into tactile Braille. These program does require users to have software so that you can change displays holds 20 characters at a time; some knowledge of Emacs. mouse key assignments as well as users indicate when they are ready for the next “stream” of characters. Contact Information control the speed of the trackball and Another option, embossing devices, You can reach the ATIC Lab at the cursor display on the screen. You produce Braille paper copies of text. x3-7808 or <>. Staffed can use different parts of your fingers Screen readers are voice synthesis hours are posted at and palm to control the trackball and keys, according to your comfort level. systems that convert words on the screen into audio output. JAWS for hours.html ø Voice Recognition Voice recognition systems let you manipulate a computer and enter text ATIC Lab Events During IAP by talking. While this technology has • Open House, January 14, 1 to 4 pm, 11-103 been under development for over a Come meet the ATIC Lab staff, enjoy refreshments, and try out a range decade, it has only recently become of adaptive hardware and software. a viable method for alternative input. Dragon NaturallySpeaking, new • Talk to Your PC: Voice Recognition Software, January 23, noon to 1:30 pm, 3-133 from Dragon Systems, is a continuous- See a demo of some popular off-the-shelf voice recognition software for speech voice recognition product. the PC, including NaturallySpeaking and Dragon Dictate. Also covered: You can dictate into a word processor the pros and cons of voice recognition software for different uses. without pausing between words. You MIT Offers Many Resources for Page, is Computers and Health: Resources Preventing and Treating RSI at MIT (for a version in hard copy, see MIT Information Systems p. 7 of this issue). RSI Task Force and Mailing List Managing Editor With its high concentration of com- Robyn Fizz puters, MIT is sensitive to the risk of MIT has an RSI Task Force that meets once a month. Members include Writer/Editor repetitive strain injuries (RSI) among Lee Ridgway staff and students. The Institute offers representatives from the various MIT offices providing RSI services to the i/s is published six times a year. MIT faculty and several resources for the prevention and staff receive copies through campus mail; i/s is treatment of RSI – from ergonomic community, plus a staff and student also available in lobbies around campus. Indi- advice to medical evaluations. member with RSI. If you have a ques- viduals at MIT may subscribe by contacting the tion or concern about RSI that you managing editor. The Best Prevention would like the Task Force to address, Send comments or subscription requests to: The best way to prevent RSI is to send e-mail to <>. MIT 11- 309, 77 Massachusetts Avenue, learn about the injury and its warning The RSIAlert mailing list announces Cambridge, MA 02139-4307 signs, and then to protect yourself public RSI meetings and events, and Phone: (617) 253- 0540 through workstation and work habit provides a forum for RSI-related Electronic mail: <> alterations. A good starting place is information. You can subscribe to i/s is also published online at MIT’s RSI Information Page at the mailing list by sending e-mail to <>. In the A companion Web site, i/s NewsLink, offers rsi/mitrsi.htm body of the message, type: frequent news updates. It’s located at From here, you can find the link to a subscribe RSIALERT All product names are trademarks of their good overview document, Repetitive YourFirstName YourLastName manufacturers. Strain Injuries: What You Absolutely Note: Type this message on one line, © 1997 Massachusetts Institute of Technology Need to Know. Another key resource, using your real name. This list is for also available from the RSI Information MIT and affiliated labs only. ø . . 2 . is . .
  3. 3. Software Spotlight Operating System Features Display Options Can Aid Accessibility Features that let you alter the con- trast or size of the screen display are Mary Ziegler and Kathy Cahill useful for people with low vision con- I f you use a Macintosh or Windows computer with a reasonably up-to-date ditions such as cataracts or glaucoma. Contrast settings can also be helpful for reducing eye strain. operating system, you have access to • High Contrast (Windows) and various built-in options that can make CloseView (Macintosh) your computer easier to use. These op- High Contrast lets you activate a tions were developed for people with display mode to make it easy to distin- disabilities, but even if you don’t face guish between foreground and back- physical challenges, these features may ground. You can display white text on help you reduce muscle or eye strain. a black background or black text on Macintosh OS 7.x & 8 offer the Options in the CloseView control panel white (this displays at a higher con- Easy Access and CloseView control trast than the default black on white). panels. (Easy Access includes Mouse- mand, Alt, or Shift) into place until CloseView magnifies screen con- Keys, SlowKeys, and StickyKeys.) Both another key is pressed. tents up to 16 times the normal size. control panels are on the Mac OS in- Visual indicators and sounds alert When activated, a black rectangle ap- stallation CD. If you don’t have this you when StickyKeys is activated. On pears on the screen. The area inside the CD, you can download Easy Access the Macintosh, an icon of an empty rectangle is magnified by the degree and CloseView from bucket appears in the upper right cor- of magnification you have selected. ner of the menu bar. When you press a CloseView also has an option for modifier key, an arrow points into the displaying white text on a black back- easyaccess.html bucket and a system sound plays. ground. Two other Macintosh control panels – In Windows, StickyKeys comes with Keyboard and Speech – also get a an audio signal and a visual icon of Sound Options mention in this article. three rectangular keys in the Task Bar. Windows 95 and NT have features Windows 95 and NT offer many of Each rectangle corresponds to a modi- that provide visual feedback in place the same features (though Windows fier key (Alt, Control, or Shift) and ap- of computer sounds. This can be help- offers some options not found on the pears shaded when the key is locked. ful to the deaf and hearing impaired, Macintosh, and vice versa). You select who might otherwise miss critical the Windows features in the Accessi- • SlowKeys (Macintosh and Windows) audio feedback. bility Options control panel (which in- SlowKeys lets you adjust the amount The sound-related access option cludes Keyboard, Sound, Display, and of time you have to hold down a key built into the Macintosh serves a dif- Mouse). If the options don’t appear before it registers a valid keystroke. ferent audience. It lets the computer there, you can install them from your For people with fine motor difficulties, speak out loud, which can benefit users Windows CD. Click on Add/Remove this saves unwanted keystrokes from who are blind or have low vision. Programs in the Control Panel, select appearing on the screen. • SoundSentry and ShowSounds Windows Setup, and click the check • RepeatKeys (Windows) and Keyboard (Windows) box next to Accessibility Options. Control Panel (Macintosh) SoundSentry sends a visible cue, Keyboard and Mouse Options These utilities let you adjust the Key such as a flashing title bar or active Options for the keyboard and mouse Repeat Rate (how often a character re- window, in the place of a system beep. are useful for people with fine motor peats on the screen as you keep the key ShowSounds instructs applications to control problems such as arthritis, depressed). You can also set Delay provide visual feedback where possible, cerebral palsy, multiple sclerosis, and Until Repeat, that is, how long you comparable to “close-captioned” TV. Parkinson’s disease. They are also fa- must depress the key after a character • Talking Alerts (Macintosh) vored by people with repetitive strain first appears before it appears again. Talking Alerts is an option in the injuries, because they can reduce hand Note: In Windows, SlowKeys and Speech control panel. When turned on, strain from stretching to reach keys or RepeatKeys are packaged under the the computer recites the system alerts from using a mouse. FilterKeys option, which in turn is that appear on the screen. If you click • StickyKeys (Macintosh and Windows). found under the Keyboard option. the OK button in an alert, the Talking Most applications have commands • MouseKeys (Macintosh and Windows) Alert is cut off and you are returned that require you to press two or three MouseKeys lets you perform the to your application. keys simultaneously. StickyKeys lets functions of a pointing device with Questions? you issue a two- or three-key command the numeric keypad of the keyboard. If you need help configuring any by pressing one key at a time. Using a You can click, drag, and execute all of the access features described in this software keylatch, StickyKeys “locks” the usual mouse movements by press- article, contact the ATIC Lab at x3-7808 modifier keys (Control, Option, Com- ing designated keys on the keyboard. or <>. ø . . is . 3 . .
  4. 4. . . Network Notes . Computer Corner . . . . . Protect Your Computer from the host system by typing passwords. . This column presents news and tips . from the consultants who staff the Packet Sniffing Programs These passwords travel over the net- . work in the clear. Kerberized telnet, . . Computing Help Desk, x3-1104. Joanne Costello . Check out their Web home page at however, protects your password as . I n recent months many computers you authenticate yourself to a remote system. It also provides you with an . . . Q . at MIT have been broken into by out- encrypted telnet session. . Is there software that can help . me prevent repetitive strain in- siders. These intruders have gained To find out which version of . Kerberized telnet is available for . juries by prompting me to take breaks? unauthorized access to machines and . your platform, see . planted “packet sniffers” on them. . Packet sniffing, which has been around since the invention of Ethernet, has ktelnet/ . . . . A Yes.The ATIC Lab maintains a page that lists Web sites of typing break software at legitimate uses. Today, however, the Be aware that for Kerberized telnet . . threat of misuse of these programs has to work, both your machine and the . . break.html increased greatly because they can be remote host must be running it. If . . downloaded readily via the Internet. you regularly telnet to a non-Athena . ATIC Lab staff have evaluated some . of these programs. Here are three that What’s a Packet? machine, check with the system . . they recommend. Ethernet transmits data in blocks manager of that machine to see if it . . of characters called packets. While each supports Kerberized telnet sessions. . • ErgoMinder (Macintosh and Windows) . packet is intended for a particular des- Note: MITVMA/C, EREQ, and . ErgoMinder gives you friendly re- Athena are all Kerberized. . tination, once a sniffer is planted on a . minders to move and stretch in timed Unfortunately, there is no standard . machine, it can listen in on all packets . intervals. The Ergo-Dudes (cartoon that travel on that subnet. Generally, for Kerberized ftp on any platform. If . characters) pop up, along with text . these programs are written to capture you use ftp to transfer files from your . descriptions of exercises that help pre- . only the first 128 or so characters of any desktop computer to Athena or any . vent RSI and promote good posture. . telnet or ftp session. This is enough to other computer, you are at risk of . ErgoMinder Lite for the Macintosh is having your password compromised. . find out the destination machine, . freeware; the full version for Macintosh For instance, if you create HTML files . username, and password. . or Windows is $25. You can download on your local machine and use ftp to . a free evaluation copy from Who’s at Risk? . transfer them to an Athena locker, . If you are the system administrator . your password travels the network . of a multi-user system such as UNIX, in the clear. The only thing you can . . • Stretch Break (Windows) the machines you administer may be do to guard against packet sniffers is . vulnerable to intruders. For advice on . Stretch Break reminds you to take to change your password often. . how to protect your system and what . breaks by inviting you to perform Eudora uses Kerberos authentica- . low-impact stretches. These are illus- to do if you suspect a break-in, see . tion, so your password can’t be com- . trated by on-screen animations. You . promised when you use it for e-mail. . can select how long to wait between . unix_security.html However, since you have the same . sessions and the number of stretches username and password for e-mail as . If you regularly telnet or ftp to . per session (defaults are 30 minutes you do when you ftp to Athena, your . another machine, your username and . and 3 stretches). You can also delay password may have been compromised. e-mail password can be compromised . or cancel the stretches. . Read about what steps you should through your use of ftp. . This program costs $44.95. To down- . take at Encrypting Data . load a free evaluation copy, go to . . While sniffer programs usually . compromise.html capture only the first 128 characters . . of a packet, they can be set to capture . • Xwrits (Athena) What Can Be Done? . all data as it passes over the network. . This freeware program pops up an There is no “silver bullet” that . This includes data sent via FTP or . X window with a graphic of a hand in protects against this type of attack on . e-mail. Your best protection against . pain when it’s time to take a break. an open network like MIT’s. The best . such eavesdropping is to use a public . You can set the number of minutes be- defense is conscientious password key encryption system such as Pretty . tween breaks and how long the break management, careful system manage- . Good Privacy (PGP). MIT has a license . lasts. There’s also an option to lock the ment, and use, whenever possible, of . to distribute this program. For more in- . keyboard during the break. applications that support Kerberos . formation or to download a copy, go to . To access xwrits, type the following or public key security systems. . . at the athena% prompt: Traditional telnet and ftp require . users to authenticate themselves to pgp.html ø . add eddietwo; xwrits & . . . To read the xwrits manual page, type The dialup number for Tether has changed. The new number is (617) 679-4000. . . man xwrits ø . . 4 . is . .
  5. 5. Configurations and Pricing MIT Computer Connection/Bits and Bytes Prices listed below are from the MCC/Online-NECX catalog at Apple’s G3 Series Offers Breakthrough Performance • Power Macintosh G3 desktop (M6141LL/A) Joanne Hallisey 233-MHz processor, 32MB RAM, ® T he Power Macintosh G3 series from Apple features innovations in 4GB hard drive NECX #110063 $1760.80 • Power Macintosh G3 desktop processor technology and system ar- (M62021LL/A) chitecture that significantly increase 266-MHz processor, 32MB RAM, Power Macintosh G3 minitower performance and flexibility. 4GB hard drive The G3 series is based on the NECX #110058 $2114.22 The G3 Lineup PowerPC G3. This third-generation The Power Macintosh G3 series • Power Macintosh G3 minitower chip builds on features pioneered in includes two desktop models and a (M61421LL/A) the PowerPC 603 and 604 chips, but minitower. These systems come with 266-MHz processor, 32MB RAM, goes beyond them in several ways: a 24x-speed CD-ROM drive, high- 6GB hard drive • Processor design specifically opti- quality audio, Ethernet networking, NECX #110054 $2642.78 mized for the Mac OS a communications slot, and three PCI • Doubling of level 1 (on-chip) data expansion slots. The two higher-end • Macintosh PowerBook G3 and instruction cache from 32k to 64k models have Zip drives for easy file (M5993LL/A) transfer and backup. 250-MHz processor, 32MB RAM, • Innovative level 2 backside cache Apple also makes the Macintosh 5GB hard drive • Small, low-power chip design, made PowerBook G3. It has a 20x-speed NECX #110054 $5021.80 possible by a 0.25 micron process CD-ROM drive, a four-speaker sound As a result, G3 models provide system, built-in Ethernet and 33.6-Kbps For the latest product information, nearly twice the performance of modem, 2MB of VRAM, and a video see the Apple Web site at systems based on the 603e chip. controller for enhanced graphics. ø Hot Topics, Cold Weather: IS from the Center and from IS Training Dr Solomon’s Anti-Virus Toolkit (for Computing Events During IAP Services, Personnel Training and De- Macintoshes and PCs). MIT has a site velopment, and SAP’s Management license for this product, so members Jeanne Cavanaugh Reporting will be on hand to answer of the community can use it for free. I nformation Systems staff have geared up to give several IAP presen- your training-related questions. Practical Windows NT Security Jan. 14, 10–11am, E40-302 Find out how Dr Solomon’s works and how to get a copy. ECAT2 – The Latest in Electronic tations that focus on computers. The This seminar on network security Purchasing seminars highlighed below are open for NT workstations provides a range Jan. 21, noon–1:30pm, 3-133 to a general audience and require no preregistration. They are listed in of tips and techniques. Topics include This presentation gives an overview chronological order. Service Pack 3, Network Neighborhood/ of developments in making Institute NetBEUI, Kerberos and NT, and the purchases over the Web. There will Practical UNIX Security latest Microsoft slams and rumors. be a demo of the MCC-Online/NECX Jan. 6, 2–3pm, E40-302 catalog for buying hardware and soft- (Repeated Jan. 13, 22, and 27, A Virtual Tour of MITnet ware and a review of policies and pro- same time and room) Jan. 15, 11am–12:30pm, 3-133 cedures. People who do purchasing Security is vital to productive Find out what goes on behind the for departments, labs, and offices are computing. Whether you’re running scenes as you send and retrieve e-mail especially encouraged to attend. a Linux PC or a lab of Sun machines, or browse the World Wide Web. This it’s important to secure your systems. presentation goes over the basics of The Year 2000: How to Cope This seminar gives an overview of computer networking, paying close at Home tools and techniques, including en- attention to the network technologies Jan. 29, 11am–noon, 4-370 cryption, Kerberos, and auditing. and services in use on MITnet. Does your home computer think the world is going to end by the year W89 Open House Dr Solomon’s Anti-Virus Toolkit 2000? You’d be surprised how many Jan. 9, noon–2pm, W89 Jan. 20, 2–3pm, E40-302 common applications assume that Many Institute training opportuni- Computer viruses are a continuing you won’t be using them past 1999. ties now take place at the MIT Learning problem on campus. Learn how to pro- Find out how to get your at-home Center (W89) at 301 Vassar Street. Staff tect yourself from this threat by using machine ready for the year 2000. ø . . is . 5 . .
  6. 6. • Blink Tags. Don’t use them. Besides Publishing Pointers being annoying, they crash screen readers. This is the only HTML that really shouldn’t be used at all. How to Design an Accessible Making Your Page Accessible (ADA-Compliant) Web Site Here are some of the guidelines for • Buttons/Image Maps. Whenever accessibility outlined in Weeks’ paper. possible, use buttons rather than image A t a recent conference, Catherine Weeks of the University of Missouri- • Text-only Link. Browsers like Netscape Navigator and Internet Explorer dis- maps. Image maps are inaccessible to people with visual impairments, and buttons that serve as links work much Columbia gave a presentation on how play graphics automatically. Others, better in text browsers. If you must use to make Web sites readable for people like Lynx, are text-only browsers. an image map, repeat the links else- with disabilities. This article presents Screen-readers, for people with visual where on the page to assure accessibility. some of her points, in a very condensed impairments, also function as text-only readers. To facilitate easier access, • Tables. Tables should be aligned pri- version. You can read the full paper, create a text-only version of the Web marily left-to-right then top-to-bottom, with examples of HTML code, at page, and put a link to it at the top of because both text-only browsers and screen readers read table cells from the graphical version of the Web page. ~cccathy/ada/ left to right. In other words, put your • Alt Tags. Alt tags are used in conjunc- headings down the left-hand side of Misconceptions tion with the image source code and the column. People think writing accessible code give the image a “name.” When a screen is hard, or that they have to change • Sound Files. To make sound files reader or text browser encounters an their design to make it accessible. It’s accessible to people who are deaf or image without an alt tag, the word assumed that you should omit things hard-of-hearing, provide a link to a “[image]” is displayed on screen, and like graphics, Java, JavaScript, tables, text transcript of the file. This is also the person browsing this page has no frames, and forms when designing helpful for people who don’t have idea what the image is or why it is ADA-compliant pages. None of the machines that can play sound files. there. Alt tags let you include a short above is true. description of the image in question, • Bobby. Use Bobby, a free service at Writing accessible HTML is easy. so your viewers can “see” what they It is additive: there is very little you are missing. need to change; rather you need to This page analyzes your Web pages Alt tags should also be used to in- add to the design and HTML codes. for ADA-accessible code, and points clude a short description for image- maps, sound files, and Java applets. out any errors it finds. ø Customer Alert: Many IS Groups Barring a blizzard or other such • Noontime Quick Start classes and Prepare to Move to N42 emergency, the various groups will user group meetings will start to be move in phases, starting January 22 offered in both E40-302 and N42 Naomi Schmidt and continuing for about two weeks. sometime later in the winter. I n an effort to consolidate IS groups scattered across campus, IS staff from During the 36 hours surrounding the move of a group, phones for that group will go to voice mail. (The Computing • Open Lab sessions, previously held in the IS Training Lab in Building 11, have been discontinued. IS is work- Buildings 11, E19, and E40 will move to Help Desk, which will start its move ing with the MIT Libraries to make N42 starting the third week in January. on January 23, will provide limited these materials available for loan. N42 – the former Graphic Arts building – service on January 23 and 26.) • N42 will be the new port of call for is located at 211 Massachusetts Avenue, IS hopes to make the moves as walk-in customers of the Computing two blocks northwest of the Institute transparent to its clients as possible. Help Desk (especially worth keep- main entrance. The building will in- If you plan to visit anyone in IS dur- ing in mind if you have equipment clude offices and other work areas ing the transition, call ahead to make in tow). for 92 staff and 42 students, as well as sure that you know where to go. conference rooms and a Demo Center. • The Faculty Liaison Office, Athena Groups moving to N42 include the Changes in Service Test Cluster, and Faculty Project Lab Computing Help Desk, the Athena/ IS customers should note the follow- will move to N42. Faculty and TAs Residential Computing Consultants, ing changes resulting from the move: are welcome to come to the new and the Training and Publications • Starting in January, all IS hands-on location to use Athena workstations group. Also moving are the Academic training classes will be taught at and high-end multimedia equip- Computing and Campus Wide Infor- W89, the MIT Learning Center at ment (scanners, video digitizers, mation Systems (CWIS) groups. These 301 Vassar Street. Classes that were and multimedia software). teams will be joined by others from the taught in two half-day sessions in • The CWIS group will continue to Discovery, Integration, and Delivery the past will be taught in one full work with their customers in the Processes, making the building an day to save participants from new facility, just as they did in important hub for IS, its sole tenant. having to make two trips to W89. E40. ø . . 6 . is . .
  7. 7. Computers and Health: Resources at MIT Who can help you What they provide Administrative officer or supervisor • Assistance with job design, job description, job requirements, in your department work conditions Adaptive Technology for Information • Consulting services on adaptive computing solutions and Computing (ATIC) 11-103, x3-7808 Design and Construction Services • Assistance in designing work site illumination E18-207, x3-7771 • Assistance in selecting and purchasing work site furniture, blinds, curtains, window films Disabilities Services Coordinator • Assistance in arranging for reasonable accommodation E19-226, x3-6110 Environmental Medical Service • Assistance in planning and improving the work site 20B-238, x3-5360 • Information on computers and pregnancy Eye Clinic • Eye health and safety for computer monitor users Medical Department E23-268, x3-4351 • Eye screening Health Education Services • Literature, pamphlets, booklets Medical Department E23-205, x3-1316 • Exercise, stretch, and body therapy classes Industrial Hygiene Office • Site assessment 56-235, x3-2596 • Awareness training for departments or groups Medical Department • Medical evaluation by primary care provider E23-189, x3-4481 • Referral to occupational physician or orthopedic specialist MIT Computer Connection • Wrist rests and support gloves (while supplies last) W20-021, x3-7686 Omsbudperson • Confidential advisor when other resources fail or are felt to be 10-213, x3-5921 inappropriate Personnel Department • Assistance with job design, job description, job requirements, E19-239, x3-4251 work conditions Purchasing • Assistance in selecting and purchasing workstation furniture and General Purchasing Office E18-360, x3-8344 accessories Safety Office • General information on safe use of computers E19-207, x3-4736 • Information on Worker’s Compensation issues Social Work Services • Support in coping with the impact of RSI at work and home Medical Department E23-189, x3-4911 Student Counseling and Support Services • Consultation with faculty 5-106, x3-4861 • Services to and accommodations for students with injuries and disabilities Telecommunications • Telephone headsets E19-741, x3-3690 Training Services • Periodic ergonomics workshop; consult the IS Computer Training Information Systems 11-301, x3-7685 Catalog . . is . 7 . .
  8. 8. Getting Help If you don’t know where to get help For help with... Dial... Or send a message to... for your computer, network, or telephone problems, dial one of the Athena Computing Environment 3-4435 help lines listed to the right. Athena hardware repairs 3-1410 If you prefer to use e-mail, you can Computer and printer repairs 3-0815 send your questions to the correspond- ing addresses on the far right. (When Computer sales 3-7686 logged into Athena, you can also use Disabilities and computing 3-7808 the olc command to send questions IS mainframe (VM server) 3-1104 to Athena’s online consultants.) Macintosh computers 3-1101 For a complete list of services offered by Information Systems, Networks/Other 3-1104 see the Web page at PC computers 3-1102 Telephone repairs 3-4357 UNIX/VMS (by subscription) 3-1103 Voice mail 3-3677 Selected Vendors of Adaptive Hardware and Software The ATIC Lab article (pp. 1–2) refers to selected vendors of adaptive tech- Cornell University (Emacspeak) nologies. The Web sites for these ven- dors are listed to the right, as is a link Dragon Systems (Dragon NaturallySpeaking) to other adaptive technology Web sites compiled by the ATIC Lab. Henter-Joyce, Inc. (JAWS for Windows) To browse the ATIC Lab site and its numerous links, start at Kensington Corporation (Kensington Expert Mouse) Kinesis Corporation (Kinesis Contoured Ergonomic Keyboards) Other Adaptive Technology Web Sites MIT Information Systems i/s is printed with soy inks on recycled paper, and can be recycled in MIT’s “white paper only” bins. . . 8 . is . .