This might be a bit of late notice but ODEP is having a webinar titled “Accessible Technology in the Workplace Webcast.” It looks to be a great view by anyone involved with disability employment or advocacy.
U.S. Department of Labor — ODEP – Office of Disability Employment Policy – Technology.
Thursday, June 21st from 2:00pm – 3:00pm EDT
Although, in my last post favored, I argued for the open web. I still do favor this overall; though, to stretch myself a bit, I’ve coded a version on the TerpTimer for Android using PhoneGap and released it to the market. Though I do feel like I’m cheating, it does offer some advantages. If I decide to add the full build out of TerpTools to the mix, the code is closer to the hardware.
The problem I’m looking to solve is alerting the interpreters of an impeding session change. The interpreter in the rest/support role should not have to look down at the phone. This is just distracting during a teamed assignment. Additionally, the screen should not stay on the entire time. That eats up the battery. So I’m looking bit better hardware control for the next few versions.
Install from: AppBrain or AndroidZoom
Imagine when Thomas Hopkins Gallaudet traveled across the pond searching for methods to educate deaf children. Imagine if the Braidwood family in Scotland had been open about their methodology in educating deaf children. Imagine if Gallaudet had not traveled with Sicard to Paris. Things might be surely different today. While the former group happily celebrated their results, they kept how they achieved those results secret. The latter openly shared their ideas and methods, and because so, spread those ideas to another continent. That is, because one group operated in an “open source” fashion, they changed the course of history.
The first tenet of the RID Code of Professional Conduct (CPC) states that interpreters “adhere to standards of confidential communication” by locking file cabinets and shredding paper. However, what happens to data that resides on an interpreter’s smart phone calendar, in an email saved to a browser’s cache, or on discarded networked servers? When such items are lost, stolen, or discarded, will traces of data betray the privacy of our clients? Even deleted files are easily recovered with minimal effort (Brandt, 2006).