Making ProTools Accessible for Visually Impaired
ProTools, an industry standard audio edit and mix software, is not accessible for visually impaired. Precisely, it was not accessible and this paper presents how was ProTools access enabled with the help of ProAccess application. ProAccess was created for this purpose and uses mach code injection techniques to load an access enabling bundle into ProTools and applies the method that was published 2 years ago. The paper also describes the relationships in between ProTools, ProAccess, and VoiceOver technology and what results we have obtained together with ProTools, timing of its learning process for a visually impaired person.
KeywordsAccessibility ProTools Visual impairment VoiceOver
Unable to display preview. Download preview PDF.
- 1.Apple Human Interface Guidelines. Apple Computer, Inc. (2005)Google Scholar
- 2.Accessibility Programming Guidelines for Carbon. Apple Computer, Inc. (2005)Google Scholar
- 3.Accessibility Programming Guidelines for Cocoa. Apple Computer, Inc. (2005)Google Scholar
- 4.Empowering Your Carbon Application with the VoiceOver Accessibility Interface. Apple Computer, Inc. (2006)Google Scholar
- 5.Baron, R.V., Black, D., Bolosky, W., Chew, J., Draves, R.P., Golub, D.B., Rashid, R.F., Tevanian, A., Young, M.W.: Mach Kernel Interface Manual. 8/1990, Unpublished manuscript from the School of Computer Science. Carnegie Mellon University (1990)Google Scholar
- 6.Boykin, J., Kirschen, D., Langerman, A., LoVerso, S.: Programming under Mach. Addison-Wesley Publishing Company, Inc., Reading (1993)Google Scholar
- 7.Cílek, J.: Optické rozpoznávání textu na obrazovce. Bachelor Thesis. Department of Computer Science and Engineering. The Faculty of Electrical Engineering. The Czech Technical University in Prague. FEL ČVUT (2007), https://dip.felk.cvut.cz/browse/pdfcache/cilekj2/2007bach.pdf
- 8.Draves, R.P., Jones, M.B., Thompson, M.R.: MIG — The MACH Interface Generator. Department of Computer Science. Carnegie-Mellon University (1989)Google Scholar
- 9.Knaster, S.: Hacking Mac OS X Tiger. Wiley Pub., Indianapolis (2005)Google Scholar
- 10.Rentzsch, J.W.: Dynamically overriding Mac OS XGoogle Scholar