News about nformation systems throughout M I T
Volume 13 • Number 2
Mission Remains the Same
The ATIC Lab Moves, But Its
November / December 1997
A Place to Try Things Out
The ATIC Lab is the place where
you can try out a variety of adaptive
technologies. Some recently added
MIT Offers Many Resources for
Preventing and Treating RSI ............... 2
S ince 1992, the Adaptive Technol-
ogy for Information and Computing
products are highlighted below. You
can find out more about these solu-
tions from the ATIC Web site at
. (ATIC) Lab has assisted disabled http://web.mit.edu/atic/www/
Software Spotlight .
members of the MIT community with
Operating System Features
. For more in-depth information, check
. their computing needs. The ATIC Lab
Can Aid Accessibility ........................... 3
. the list of vendors’ Web sites on page 8.
. now serves about 250 students, faculty,
. and staff each year. Alternative Keyboards and Mice
Network Notes .
. Disabilities include a wide range Makers of alternative keyboards
Protect Your Computer from .
. of visual, speech, hearing, and neuro- have created different configurations
Packet Sniffing Programs ..................... 4 .
. logical impairments, as well as learn- to relieve repetitive strain injuries (RSI)
Computer Corner ................................... 4 . ing disabilities. Adaptive technology and to help those whose disabilities
. for computing environments is equally limit movement of hands and fingers.
MIT Computer Connection/ .
. wide-ranging. For example, a simple Kinesis makes a split, tilted keyboard
Bits and Bytes .
. adaptation might be an alternative with a concave key layout. It’s de-
Apple’s G3 Series Offers .
mouse or adjustable-height table. Or signed to improve arm positioning
Breakthrough Performance ................. 5 .
the technology may be more complex, and is easy for people of different
Hot Topics, Cold Weather: IS
. such as a voice recognition system or sizes to use. Several keys let users
. refreshable Braille display. take advantage of thumb strength in-
Computing Events During IAP .......... 5 .
. stead of stretching their little fingers.
. A Move to Larger Quarters This keyboard comes in a Dvorak/
How to Design an Accessible . This fall, after several months in QWERTY model so that you can
. temporary space, the ATIC Lab moved switch key layouts or use program-
(ADA-Compliant) Web Site ................ 6 .
. to new quarters in Room 11-103, near mable keys to remap key positions to
Customer Alert: Many IS Groups . the Student Services Center on the
. your preference. The Kinesis comes
Prepare to Move to N42 ....................... 6 . Infinite Corridor. Coordinator Kathy
. with optional foot switches to emulate
. Cahill and her student consultants keystrokes. While many clients with
Computers and Health: .
. are again offering the full range of RSI have found the Kinesis helpful,
Resources at MIT ................................... 7 .
. ATIC Lab services. These services, ATIC staff recommend that each
Getting Help ........................................... 8 . available by appointment, include person test this and other keyboards
. demonstrations of adaptive technol-
. before deciding which one is most
Selected Vendors of Adaptive . ogies, advice, and troubleshooting.
Hardware and Software ........................ 8 . Access to Lab equipment is available Other alternative devices can be
. to students on a continuing basis by combined with, or used in lieu of, a
. prior arrangement.
. continued on page 2
Operating System Features Display Options
Can Aid Accessibility Features that let you alter the con-
trast or size of the screen display are
Mary Ziegler and Kathy Cahill
useful for people with low vision con-
I f you use a Macintosh or Windows
computer with a reasonably up-to-date
ditions such as cataracts or glaucoma.
Contrast settings can also be helpful
for reducing eye strain.
operating system, you have access to • High Contrast (Windows) and
various built-in options that can make CloseView (Macintosh)
your computer easier to use. These op- High Contrast lets you activate a
tions were developed for people with display mode to make it easy to distin-
disabilities, but even if you don’t face guish between foreground and back-
physical challenges, these features may ground. You can display white text on
help you reduce muscle or eye strain. a black background or black text on
Macintosh OS 7.x & 8 offer the Options in the CloseView control panel white (this displays at a higher con-
Easy Access and CloseView control trast than the default black on white).
panels. (Easy Access includes Mouse- mand, Alt, or Shift) into place until CloseView magnifies screen con-
Keys, SlowKeys, and StickyKeys.) Both another key is pressed. tents up to 16 times the normal size.
control panels are on the Mac OS in- Visual indicators and sounds alert When activated, a black rectangle ap-
stallation CD. If you don’t have this you when StickyKeys is activated. On pears on the screen. The area inside the
CD, you can download Easy Access the Macintosh, an icon of an empty rectangle is magnified by the degree
and CloseView from bucket appears in the upper right cor- of magnification you have selected.
ner of the menu bar. When you press a CloseView also has an option for
modifier key, an arrow points into the displaying white text on a black back-
bucket and a system sound plays. ground.
Two other Macintosh control panels – In Windows, StickyKeys comes with
Keyboard and Speech – also get a an audio signal and a visual icon of Sound Options
mention in this article. three rectangular keys in the Task Bar. Windows 95 and NT have features
Windows 95 and NT offer many of Each rectangle corresponds to a modi- that provide visual feedback in place
the same features (though Windows fier key (Alt, Control, or Shift) and ap- of computer sounds. This can be help-
offers some options not found on the pears shaded when the key is locked. ful to the deaf and hearing impaired,
Macintosh, and vice versa). You select who might otherwise miss critical
the Windows features in the Accessi- • SlowKeys (Macintosh and Windows)
bility Options control panel (which in- SlowKeys lets you adjust the amount The sound-related access option
cludes Keyboard, Sound, Display, and of time you have to hold down a key built into the Macintosh serves a dif-
Mouse). If the options don’t appear before it registers a valid keystroke. ferent audience. It lets the computer
there, you can install them from your For people with fine motor difficulties, speak out loud, which can benefit users
Windows CD. Click on Add/Remove this saves unwanted keystrokes from who are blind or have low vision.
Programs in the Control Panel, select appearing on the screen.
• SoundSentry and ShowSounds
Windows Setup, and click the check • RepeatKeys (Windows) and Keyboard (Windows)
box next to Accessibility Options. Control Panel (Macintosh) SoundSentry sends a visible cue,
Keyboard and Mouse Options These utilities let you adjust the Key such as a flashing title bar or active
Options for the keyboard and mouse Repeat Rate (how often a character re- window, in the place of a system beep.
are useful for people with fine motor peats on the screen as you keep the key ShowSounds instructs applications to
control problems such as arthritis, depressed). You can also set Delay provide visual feedback where possible,
cerebral palsy, multiple sclerosis, and Until Repeat, that is, how long you comparable to “close-captioned” TV.
Parkinson’s disease. They are also fa- must depress the key after a character
• Talking Alerts (Macintosh)
vored by people with repetitive strain first appears before it appears again.
Talking Alerts is an option in the
injuries, because they can reduce hand Note: In Windows, SlowKeys and Speech control panel. When turned on,
strain from stretching to reach keys or RepeatKeys are packaged under the the computer recites the system alerts
from using a mouse. FilterKeys option, which in turn is that appear on the screen. If you click
• StickyKeys (Macintosh and Windows).
found under the Keyboard option. the OK button in an alert, the Talking
Most applications have commands • MouseKeys (Macintosh and Windows)
Alert is cut off and you are returned
that require you to press two or three MouseKeys lets you perform the to your application.
keys simultaneously. StickyKeys lets functions of a pointing device with Questions?
you issue a two- or three-key command the numeric keypad of the keyboard. If you need help configuring any
by pressing one key at a time. Using a You can click, drag, and execute all of the access features described in this
software keylatch, StickyKeys “locks” the usual mouse movements by press- article, contact the ATIC Lab at x3-7808
modifier keys (Control, Option, Com- ing designated keys on the keyboard. or <email@example.com>. ø
is . 3
Network Notes . Computer Corner
Protect Your Computer from the host system by typing passwords. . This column presents news and tips
. from the consultants who staff the
Packet Sniffing Programs These passwords travel over the net- .
work in the clear. Kerberized telnet, .
Computing Help Desk, x3-1104.
Joanne Costello . Check out their Web home page at
however, protects your password as .
I n recent months many computers
you authenticate yourself to a remote
system. It also provides you with an
at MIT have been broken into by out- encrypted telnet session. . Is there software that can help
. me prevent repetitive strain in-
siders. These intruders have gained To find out which version of .
Kerberized telnet is available for . juries by prompting me to take breaks?
unauthorized access to machines and .
your platform, see .
planted “packet sniffers” on them. .
Packet sniffing, which has been around
since the invention of Ethernet, has
A Yes.The ATIC Lab maintains a
page that lists Web sites of
typing break software at
legitimate uses. Today, however, the Be aware that for Kerberized telnet
threat of misuse of these programs has to work, both your machine and the .
increased greatly because they can be remote host must be running it. If .
downloaded readily via the Internet. you regularly telnet to a non-Athena . ATIC Lab staff have evaluated some
. of these programs. Here are three that
What’s a Packet? machine, check with the system .
. they recommend.
Ethernet transmits data in blocks manager of that machine to see if it .
of characters called packets. While each supports Kerberized telnet sessions. . • ErgoMinder (Macintosh and Windows)
packet is intended for a particular des- Note: MITVMA/C, EREQ, and . ErgoMinder gives you friendly re-
Athena are all Kerberized. .
tination, once a sniffer is planted on a . minders to move and stretch in timed
Unfortunately, there is no standard .
machine, it can listen in on all packets . intervals. The Ergo-Dudes (cartoon
that travel on that subnet. Generally, for Kerberized ftp on any platform. If . characters) pop up, along with text
these programs are written to capture you use ftp to transfer files from your . descriptions of exercises that help pre-
only the first 128 or so characters of any desktop computer to Athena or any . vent RSI and promote good posture.
telnet or ftp session. This is enough to other computer, you are at risk of . ErgoMinder Lite for the Macintosh is
having your password compromised. .
find out the destination machine, . freeware; the full version for Macintosh
For instance, if you create HTML files .
username, and password. . or Windows is $25. You can download
on your local machine and use ftp to . a free evaluation copy from
Who’s at Risk? .
transfer them to an Athena locker, .
If you are the system administrator . http://www.vision.net.au/~macsol/
your password travels the network .
of a multi-user system such as UNIX, in the clear. The only thing you can .
. • Stretch Break (Windows)
the machines you administer may be do to guard against packet sniffers is .
vulnerable to intruders. For advice on . Stretch Break reminds you to take
to change your password often. .
how to protect your system and what . breaks by inviting you to perform
Eudora uses Kerberos authentica- .
low-impact stretches. These are illus-
to do if you suspect a break-in, see .
tion, so your password can’t be com- .
trated by on-screen animations. You
http://web.mit.edu/network/ promised when you use it for e-mail. . can select how long to wait between
unix_security.html However, since you have the same . sessions and the number of stretches
username and password for e-mail as .
If you regularly telnet or ftp to . per session (defaults are 30 minutes
you do when you ftp to Athena, your .
another machine, your username and . and 3 stretches). You can also delay
password may have been compromised. e-mail password can be compromised .
or cancel the stretches.
Read about what steps you should through your use of ftp. . This program costs $44.95. To down-
take at Encrypting Data
. load a free evaluation copy, go to
http://web.mit.edu/network/ While sniffer programs usually . http://www.paratec.com/
compromise.html capture only the first 128 characters .
of a packet, they can be set to capture . • Xwrits (Athena)
What Can Be Done? .
all data as it passes over the network. . This freeware program pops up an
There is no “silver bullet” that .
This includes data sent via FTP or . X window with a graphic of a hand in
protects against this type of attack on .
e-mail. Your best protection against . pain when it’s time to take a break.
an open network like MIT’s. The best .
such eavesdropping is to use a public . You can set the number of minutes be-
defense is conscientious password
key encryption system such as Pretty . tween breaks and how long the break
management, careful system manage- .
Good Privacy (PGP). MIT has a license . lasts. There’s also an option to lock the
ment, and use, whenever possible, of .
to distribute this program. For more in- . keyboard during the break.
applications that support Kerberos .
formation or to download a copy, go to . To access xwrits, type the following
or public key security systems. .
. at the athena% prompt:
Traditional telnet and ftp require http://web.mit.edu/network/ .
users to authenticate themselves to pgp.html ø . add eddietwo; xwrits &
To read the xwrits manual page, type
The dialup number for Tether has changed. The new number is (617) 679-4000. .
. man xwrits ø
4 . is
Configurations and Pricing
MIT Computer Connection/Bits and Bytes Prices listed below are from the
MCC/Online-NECX catalog at
Apple’s G3 Series Offers
Breakthrough Performance • Power Macintosh G3 desktop
Joanne Hallisey 233-MHz processor, 32MB RAM,
T he Power Macintosh G3 series
from Apple features innovations in
4GB hard drive
NECX #110063 $1760.80
• Power Macintosh G3 desktop
processor technology and system ar- (M62021LL/A)
chitecture that significantly increase 266-MHz processor, 32MB RAM,
Power Macintosh G3 minitower
performance and flexibility. 4GB hard drive
The G3 series is based on the NECX #110058 $2114.22
The G3 Lineup
PowerPC G3. This third-generation
The Power Macintosh G3 series • Power Macintosh G3 minitower
chip builds on features pioneered in
includes two desktop models and a (M61421LL/A)
the PowerPC 603 and 604 chips, but
minitower. These systems come with 266-MHz processor, 32MB RAM,
goes beyond them in several ways:
a 24x-speed CD-ROM drive, high- 6GB hard drive
• Processor design specifically opti- quality audio, Ethernet networking, NECX #110054 $2642.78
mized for the Mac OS a communications slot, and three PCI
• Doubling of level 1 (on-chip) data expansion slots. The two higher-end • Macintosh PowerBook G3
and instruction cache from 32k to 64k models have Zip drives for easy file (M5993LL/A)
transfer and backup. 250-MHz processor, 32MB RAM,
• Innovative level 2 backside cache
Apple also makes the Macintosh 5GB hard drive
• Small, low-power chip design, made PowerBook G3. It has a 20x-speed NECX #110054 $5021.80
possible by a 0.25 micron process CD-ROM drive, a four-speaker sound
As a result, G3 models provide system, built-in Ethernet and 33.6-Kbps For the latest product information,
nearly twice the performance of modem, 2MB of VRAM, and a video see the Apple Web site at
systems based on the 603e chip. controller for enhanced graphics. http://www.apple.com/ ø
Hot Topics, Cold Weather: IS from the Center and from IS Training Dr Solomon’s Anti-Virus Toolkit (for
Computing Events During IAP Services, Personnel Training and De- Macintoshes and PCs). MIT has a site
velopment, and SAP’s Management license for this product, so members
Reporting will be on hand to answer of the community can use it for free.
I nformation Systems staff have
geared up to give several IAP presen-
your training-related questions.
Practical Windows NT Security
Jan. 14, 10–11am, E40-302
Find out how Dr Solomon’s works
and how to get a copy.
ECAT2 – The Latest in Electronic
tations that focus on computers. The
This seminar on network security Purchasing
seminars highlighed below are open
for NT workstations provides a range Jan. 21, noon–1:30pm, 3-133
to a general audience and require no
preregistration. They are listed in of tips and techniques. Topics include This presentation gives an overview
chronological order. Service Pack 3, Network Neighborhood/ of developments in making Institute
NetBEUI, Kerberos and NT, and the purchases over the Web. There will
Practical UNIX Security latest Microsoft slams and rumors. be a demo of the MCC-Online/NECX
Jan. 6, 2–3pm, E40-302 catalog for buying hardware and soft-
(Repeated Jan. 13, 22, and 27, A Virtual Tour of MITnet ware and a review of policies and pro-
same time and room) Jan. 15, 11am–12:30pm, 3-133 cedures. People who do purchasing
Security is vital to productive Find out what goes on behind the for departments, labs, and offices are
computing. Whether you’re running scenes as you send and retrieve e-mail especially encouraged to attend.
a Linux PC or a lab of Sun machines, or browse the World Wide Web. This
it’s important to secure your systems. presentation goes over the basics of The Year 2000: How to Cope
This seminar gives an overview of computer networking, paying close at Home
tools and techniques, including en- attention to the network technologies Jan. 29, 11am–noon, 4-370
cryption, Kerberos, and auditing. and services in use on MITnet. Does your home computer think
the world is going to end by the year
W89 Open House Dr Solomon’s Anti-Virus Toolkit 2000? You’d be surprised how many
Jan. 9, noon–2pm, W89 Jan. 20, 2–3pm, E40-302 common applications assume that
Many Institute training opportuni- Computer viruses are a continuing you won’t be using them past 1999.
ties now take place at the MIT Learning problem on campus. Learn how to pro- Find out how to get your at-home
Center (W89) at 301 Vassar Street. Staff tect yourself from this threat by using machine ready for the year 2000. ø
is . 5
• Blink Tags. Don’t use them. Besides
Publishing Pointers being annoying, they crash screen
readers. This is the only HTML that
really shouldn’t be used at all.
How to Design an Accessible Making Your Page Accessible
(ADA-Compliant) Web Site Here are some of the guidelines for • Buttons/Image Maps. Whenever
accessibility outlined in Weeks’ paper. possible, use buttons rather than image
A t a recent conference, Catherine
Weeks of the University of Missouri-
• Text-only Link. Browsers like Netscape
Navigator and Internet Explorer dis-
maps. Image maps are inaccessible to
people with visual impairments, and
buttons that serve as links work much
Columbia gave a presentation on how play graphics automatically. Others, better in text browsers. If you must use
to make Web sites readable for people like Lynx, are text-only browsers. an image map, repeat the links else-
with disabilities. This article presents Screen-readers, for people with visual where on the page to assure accessibility.
some of her points, in a very condensed impairments, also function as text-only
readers. To facilitate easier access, • Tables. Tables should be aligned pri-
version. You can read the full paper,
create a text-only version of the Web marily left-to-right then top-to-bottom,
with examples of HTML code, at
page, and put a link to it at the top of because both text-only browsers and
http://www.missouri.edu/ screen readers read table cells from
the graphical version of the Web page.
~cccathy/ada/ left to right. In other words, put your
• Alt Tags. Alt tags are used in conjunc- headings down the left-hand side of
tion with the image source code and the column.
People think writing accessible code
give the image a “name.” When a screen
is hard, or that they have to change • Sound Files. To make sound files
reader or text browser encounters an
their design to make it accessible. It’s accessible to people who are deaf or
image without an alt tag, the word
assumed that you should omit things hard-of-hearing, provide a link to a
“[image]” is displayed on screen, and
the person browsing this page has no
frames, and forms when designing helpful for people who don’t have
idea what the image is or why it is
ADA-compliant pages. None of the machines that can play sound files.
there. Alt tags let you include a short
above is true.
description of the image in question, • Bobby. Use Bobby, a free service at
Writing accessible HTML is easy.
so your viewers can “see” what they
It is additive: there is very little you http://www.cast.org/bobby/
need to change; rather you need to This page analyzes your Web pages
Alt tags should also be used to in-
add to the design and HTML codes. for ADA-accessible code, and points
clude a short description for image-
maps, sound files, and Java applets. out any errors it finds. ø
Customer Alert: Many IS Groups Barring a blizzard or other such • Noontime Quick Start classes and
Prepare to Move to N42 emergency, the various groups will user group meetings will start to be
move in phases, starting January 22 offered in both E40-302 and N42
and continuing for about two weeks. sometime later in the winter.
I n an effort to consolidate IS groups
scattered across campus, IS staff from
During the 36 hours surrounding the
move of a group, phones for that group
will go to voice mail. (The Computing
• Open Lab sessions, previously held
in the IS Training Lab in Building 11,
have been discontinued. IS is work-
Buildings 11, E19, and E40 will move to Help Desk, which will start its move ing with the MIT Libraries to make
N42 starting the third week in January. on January 23, will provide limited these materials available for loan.
N42 – the former Graphic Arts building – service on January 23 and 26.)
• N42 will be the new port of call for
is located at 211 Massachusetts Avenue, IS hopes to make the moves as
walk-in customers of the Computing
two blocks northwest of the Institute transparent to its clients as possible.
Help Desk (especially worth keep-
main entrance. The building will in- If you plan to visit anyone in IS dur-
ing in mind if you have equipment
clude offices and other work areas ing the transition, call ahead to make in tow).
for 92 staff and 42 students, as well as sure that you know where to go.
conference rooms and a Demo Center. • The Faculty Liaison Office, Athena
Groups moving to N42 include the Changes in Service Test Cluster, and Faculty Project Lab
Computing Help Desk, the Athena/ IS customers should note the follow- will move to N42. Faculty and TAs
Residential Computing Consultants, ing changes resulting from the move: are welcome to come to the new
and the Training and Publications • Starting in January, all IS hands-on location to use Athena workstations
group. Also moving are the Academic training classes will be taught at and high-end multimedia equip-
Computing and Campus Wide Infor- W89, the MIT Learning Center at ment (scanners, video digitizers,
mation Systems (CWIS) groups. These 301 Vassar Street. Classes that were and multimedia software).
teams will be joined by others from the taught in two half-day sessions in • The CWIS group will continue to
Discovery, Integration, and Delivery the past will be taught in one full work with their customers in the
Processes, making the building an day to save participants from new facility, just as they did in
important hub for IS, its sole tenant. having to make two trips to W89. E40. ø
6 . is
Computers and Health: Resources at MIT
Who can help you What they provide
Administrative officer or supervisor • Assistance with job design, job description, job requirements,
in your department work conditions
Adaptive Technology for Information • Consulting services on adaptive computing solutions
and Computing (ATIC)
Design and Construction Services • Assistance in designing work site illumination
E18-207, x3-7771 • Assistance in selecting and purchasing work site furniture, blinds,
curtains, window films
Disabilities Services Coordinator • Assistance in arranging for reasonable accommodation
Environmental Medical Service • Assistance in planning and improving the work site
20B-238, x3-5360 • Information on computers and pregnancy
Eye Clinic • Eye health and safety for computer monitor users
Medical Department E23-268, x3-4351 • Eye screening
Health Education Services • Literature, pamphlets, booklets
Medical Department E23-205, x3-1316 • Exercise, stretch, and body therapy classes
Industrial Hygiene Office • Site assessment
56-235, x3-2596 • Awareness training for departments or groups
Medical Department • Medical evaluation by primary care provider
E23-189, x3-4481 • Referral to occupational physician or orthopedic specialist
MIT Computer Connection • Wrist rests and support gloves (while supplies last)
Omsbudperson • Confidential advisor when other resources fail or are felt to be
10-213, x3-5921 inappropriate
Personnel Department • Assistance with job design, job description, job requirements,
E19-239, x3-4251 work conditions
Purchasing • Assistance in selecting and purchasing workstation furniture and
General Purchasing Office E18-360, x3-8344 accessories
Safety Office • General information on safe use of computers
E19-207, x3-4736 • Information on Worker’s Compensation issues
Social Work Services • Support in coping with the impact of RSI at work and home
Medical Department E23-189, x3-4911
Student Counseling and Support Services • Consultation with faculty
5-106, x3-4861 • Services to and accommodations for students with injuries and disabilities
Telecommunications • Telephone headsets
Training Services • Periodic ergonomics workshop; consult the IS Computer Training
Information Systems 11-301, x3-7685 Catalog
is . 7
If you don’t know where to get help For help with... Dial... Or send a message to...
for your computer, network, or
telephone problems, dial one of the Athena Computing Environment 3-4435 firstname.lastname@example.org
help lines listed to the right. Athena hardware repairs 3-1410 email@example.com
If you prefer to use e-mail, you can
Computer and printer repairs 3-0815 firstname.lastname@example.org
send your questions to the correspond-
ing addresses on the far right. (When Computer sales 3-7686 email@example.com
logged into Athena, you can also use Disabilities and computing 3-7808 firstname.lastname@example.org
the olc command to send questions IS mainframe (VM server) 3-1104 email@example.com
to Athena’s online consultants.)
Macintosh computers 3-1101 firstname.lastname@example.org
For a complete list of services
offered by Information Systems, Networks/Other 3-1104 email@example.com
see the Web page at PC computers 3-1102 firstname.lastname@example.org
http://web.mit.edu/is/ Telephone repairs 3-4357 email@example.com
UNIX/VMS (by subscription) 3-1103 firstname.lastname@example.org
Voice mail 3-3677 email@example.com
Selected Vendors of Adaptive Hardware and Software
The ATIC Lab article (pp. 1–2) refers
to selected vendors of adaptive tech- Cornell University (Emacspeak)
nologies. The Web sites for these ven- http://simon.cs.cornell.edu/home/raman/emacspeak/emacspeak.html
dors are listed to the right, as is a link Dragon Systems (Dragon NaturallySpeaking)
to other adaptive technology Web http://www.dragonsys.com/
sites compiled by the ATIC Lab.
Henter-Joyce, Inc. (JAWS for Windows)
To browse the ATIC Lab site and
its numerous links, start at
Kensington Corporation (Kensington Expert Mouse)
Kinesis Corporation (Kinesis Contoured Ergonomic Keyboards)
Other Adaptive Technology Web Sites
MIT Information Systems
i/s is printed with soy inks on recycled paper, and can be recycled in MIT’s “white paper only” bins.
8 . is