Re: OCR Scanner
Eleni Vamvakari <elvam2167@...>
Do you remember the name of the machine, or is there any way to obtain
toggle quoted messageShow quoted text
it? If possible, perhaps, you can search for the same type and find it.
On 05/02/2018, Allen West <alwest0324@gmail.com> wrote:
Gene, It comes down to the number of buttons. The fewer the buttons --
Facebook: elvam2167@gmail.com anyaudio.net: elvam2167 Skype: elvam2167
|
|
Re: OCR Scanner
Allen West
Gene, It comes down to the number of buttons. The fewer the buttons
toggle quoted messageShow quoted text
the easier it is for some. We had a machine donated by a former employee that they found easy. But when he left, he took his machine with him. Allen
On 2/5/18, Allen West <alwest0324@gmail.com> wrote:
The Pearl is a dedicated camera for VFO software. Currently it only
|
|
Re: interacting with something called downward pointed triangles
David Mehler
Hi,
toggle quoted messageShow quoted text
When I either hit enter on or spacebar on the downward triangle not getting anything out of them, using jaws18. Thanks. Dave.
On 2/5/18, Stan Bobbitt <stan.bobbitt@outlook.com> wrote:
Hi, I'm using JAWS 2018. I hit enter on the down pointing triangle then
|
|
Re: if someone is using audacity, I need your help.
Gene
Unless your sound card has a what you hear option,
you should use virtual recorder for recording. It is by far the easiest
program I've seen for changing the source you want to use and it also is very
easy to use the Windows version of what you hear for recording what you hear
from your sound card. If you are going to record what Winamp is playing,
you will need some version of this feature. I can give you a web page
where you can find and download the portable version of Virtual Recorder.
One person had problems with the installed version. The program interface
was designed by the late Carlos and it is a very easy interface to access the
program, which originally was a command line program as I recall. He
intentionally designed it to be very easy to use. If you want to edit, you
will have to use another program to edit with. Again, you didn't say which
format you want to use. That will have an important bearing on the program
you will use to edit.
Gene
----- Original Message -----
From: Jim Rawls
Sent: Monday, February 05, 2018 6:35 PM
Subject: Re: [TechTalk] if someone is using audacity, I need your
help. player, some music files. Jim -----Original Message----- From: main@TechTalk.groups.io [mailto:main@TechTalk.groups.io] On Behalf Of Jujube Sent: Monday, February 5, 2018 1:06 PM To: main@TechTalk.groups.io Subject: Re: [TechTalk] if someone is using audacity, I need your help. You can check out the Audacity manual at manual.audacityteam.org. What feature are you wanting to learn specifically? ----- Original Message ----- From: "Jim Rawls" <jazzpiano@... To: main@TechTalk.groups.io Date sent: Mon, 5 Feb 2018 12:21:00 -0800 Subject: [TechTalk] if someone is using audacity, I need your help. Hi all, I have audacity 2.1.3 and I don't have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
Does Winnows ten have an equalizer on it?
Jim Rawls
I have a microphone that has too much base on it, and it cost too much just to dump it, so is there any way I can reduce the base sound on it, and increase the mid-range on windows to compensate for the microphone? jim
|
|
Re: interacting with something called downward pointed triangles
Hi, I'm using JAWS 2018. I hit enter on the down pointing triangle then arrow down and there are links, buttons, etc. Almost like a combo box except it doesn't report it as such ... Btw, it seems the "down pointing triangle" inverts to an "up pointing triangle" after I hit enter on it.
toggle quoted messageShow quoted text
HTH Stan B
-----Original Message---
-- From: main@TechTalk.groups.io [mailto:main@TechTalk.groups.io] On Behalf Of David Mehler Sent: Saturday, February 3, 2018 1:26 PM To: main@TechTalk.groups.io Subject: Re: [TechTalk] interacting with something called downward pointed triangles Hi, Thanks. I've tried enter and the space bar, they are not reading. If it helps this is with jaws18. NVDA seems a little better, at least It sees them and can interact but once enabled I am not getting any feedback. Any ideas? Thanks. Dave. On 2/3/18, Steve Matzura <number6@noisynotes.com> wrote: Those most annoying objects are just what they say they are--triangle
|
|
Re: if someone is using audacity, I need your help.
Jim Rawls
I want to record using a microphone, and then, record using win amps as my
toggle quoted messageShow quoted text
player, some music files. Jim
-----Original Message-----
From: main@TechTalk.groups.io [mailto:main@TechTalk.groups.io] On Behalf Of Jujube Sent: Monday, February 5, 2018 1:06 PM To: main@TechTalk.groups.io Subject: Re: [TechTalk] if someone is using audacity, I need your help. You can check out the Audacity manual at manual.audacityteam.org. What feature are you wanting to learn specifically? ----- Original Message ----- From: "Jim Rawls" <jazzpiano@ca.rr.com To: main@TechTalk.groups.io Date sent: Mon, 5 Feb 2018 12:21:00 -0800 Subject: [TechTalk] if someone is using audacity, I need your help. Hi all, I have audacity 2.1.3 and I don't have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
Re: malware bites question
James Bentley
I am running the latest version of Malwarebytes Premium on 3
computers. Around 2 weeks ago, malware turned up on the computer
that was powered up. Malwarebytes quarantined the 2 bad files on the
computer and gave me 3 options on how to handle the malware.
1. Delete the malware.
2. Keep the malware quarantined.
3. Do nothing and ignore the files in the future.
I do not remember the precise steps that I took to just keep the files
quarantined but it was either hitting the space bar or the enter key to check
what I wanted. Then, I had to answer OK or hit apply. Sorry that I
can’t give you precise steps. I did not realize that it would be important
for any one later. I did run a subsequent scan which detected no
problems.
I very much dislike the way the new version of MB works now. The
older version was extremely easy to use with Jaws. But, I have read in
several places on the net that the malware definitions are not all it takes to
be up to date. The updated program has far better self protection and
protection from ransomware. Again, I wish I had taken notes because
I would like to share the different web sites where I got the information.
I just did not consider the info important at the time. Hopefully, a more
experienced user will chime in on this subject.
Newer threats like improved versions of ransomware are out there just
waiting for some one to click on the wrong link.So, I recommend that users
exercise extreme care and always maintain a full system back up especially when
running older antivirus or malware programs.
Regards,
James B
No, it doesn't tell you how to do it. But it
positively states that it can be done. Someone else may describe how to do
it.
Gene
----- Original Message -----
From: Gerald Levy
Sent: Monday, February 05, 2018 2:00 PM
Subject: Re: [TechTalk] malware bites question Carlos’s response was “Latest version of Malware Bytes accessibility
verified”. What does this mean, exactly? This assessment is vague
and unhelpful. Nowhere did Carlos explain how he selected and removed
detected threats. Besides, these messages are more than two years old, and
the most recent version of Malware Bytes may be different than the older version
whose accessibility was supposedly verified by Carlos, who, unfortunately, is no
longer around to explain in more detail what he meant. So I will ask yet
again. How do you select and remove detected threats using the latest
version ofMalware Bytes? I’ve been waiting two years for an answer
Gerald
See this series of messages from the TechTalk
archive. Gerald asked this specific question about a recent version of
Malware Bytes after Carlos wrote a brief assessment. You will see that
Carlos' response answers Gerald's question of today. Unless the program
has regressed, which I very much doubt, I consider Carlos' response to be more
reliable than this other person referenced by Gerald.
Gene
----- Original Message -----
Thank you.
When I use the word accessible, I usually mean
accessible from the keyboard using standard keys and commands. I say a
program is useable if it can't be used in that way and that a program is partly
accessible if a combination of keyboard commands and screen-reader functions
like the JAWS cursor and the JAWS touch cursor need to be used, or their
equivalents in other screen-readers.
In the message you are referring to, I didn't use
it in that way because it seemed better to use accessible because I said
accessible in that way, meaning the controls are accessible, useable or
reachable in that way..
Gene
----- Original Message -----
From: Steve Matzura
Sent: Monday, February 05, 2018 10:56 AM
Subject: Re: [TechTalk] malware bites question Gene, you're a feisty bird. I LOVE FEISTY BIRDS! Accessible is a word that's
loosely bandied about these days.To some folks it means that a program can be
fully accessed simply by using the TAB key. Of course, nothing could be
further from correct. Accessible means that a piece of software can be used when
any or all the tools available to one are employed,and after employing all those
tools, no part of said software is not within reachability. On 2/5/2018 7:57 AM, Gene wrote:
|
|
Re: if someone is using audacity, I need your help.
Gene
Most people would do much better with a good
tutorial, at least until they learn a reasonable amount about the program.
After that, I don't have a strong opinion but even then, they would probably do
better to read the Audacity for JAWS material. I don't remember who wrote
it. It doesn't matter if you use JAWS. The material is generally
applicable. Where JAWS keys are specified, if you know your screen-reader,
you can use the corresponding or appropriate commands. It's a dry work and
I still think people would generally like tutorials better but for advanced
functions, it may be easier, perhaps much easier, to use if you already know a
reasonable amount about the program.
Gene.
----- Original Message -----
Gene
----- Original Message -----
From: Jujube
Sent: Monday, February 05, 2018 3:06 PM
Subject: Re: [TechTalk] if someone is using audacity, I need your
help. What feature are you wanting to learn specifically? ----- Original Message ----- From: "Jim Rawls" <jazzpiano@... To: main@TechTalk.groups.io Date sent: Mon, 5 Feb 2018 12:21:00 -0800 Subject: [TechTalk] if someone is using audacity, I need your help. Hi all, I have audacity 2.1.3 and I don't have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
Re: if someone is using audacity, I need your help.
Gene
What format do you want these files to be in?
Do you want to edit or just record? If what you want to do is simple, we
might be able to tell you on the list. I don't know what tutorials are
available. Many years ago, I did one which explains how to record and
edit. There have been one or two new features added to the program that
make editing easier but I almost never use Audacity and haven't kept up with
changes.
If you want these files to be MP3 files, you are
much better off using MP3 Direct Cut.
Gene
----- Original Message -----
From: Jim Rawls
Sent: Monday, February 05, 2018 2:21 PM
Subject: [TechTalk] if someone is using audacity, I need your
help. Hi all, I have audacity 2.1.3 and I don’t have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
Re: OCR Scanner
Gene
Then how is a stand alone reading machine going to
be any easier? You have to press a key to scan. You have to use
commands to move around the text. Openbook scans and then, if it is using
the default, will read the page that is scanned. That's what stand alone
reading machines do as well. I can't see any reason to spend three
thousand dollars for a stand alone reading machine.
Gene
----- Original Message -----
works with OpenBook and JAWS 2018. I did not see the Sara on the VFO website. I did find the iPal from ABISEE. Besides being lind, these residents have developmental disabilities. We find OpenBook easy, but for some finding and pressing a spacebar is a slight challenge. It becomes a real challenge when they need to delte or reread a page. That is why we are looking for a stand alone scanner that is very simple. Allen On 2/4/18, Allen West <alwest0324@...> wrote: > The agency has the Pearl already. The Pearl only works with OpenBook > or JAWS 2018. Some of the residents find usingn OpenBook to be too > complicated. We are looking for a OCR scanner where someone can place > a paper on top, close the lid and press a button and have it read. > > Allen > 2/4/18, Allen West <alwest0324@...> wrote: >> Hi All, >> >> I work at a place that has a fair amount of blind residents that >> cannot use smart phones or OpenBook. We are looking for a stand along >> OCR scanner. Are they still made? If so, can someone tell me who sells >> them? >> >> Thanks in Advance >> >> Allen >> >> >> >> > > > >
|
|
Re: malware bites question
Gene
No, it doesn't tell you how to do it. But it
positively states that it can be done. Someone else may describe how to do
it.
Gene
----- Original Message -----
From: Gerald Levy
Sent: Monday, February 05, 2018 2:00 PM
Subject: Re: [TechTalk] malware bites question Carlos’s response was “Latest version of Malware Bytes accessibility
verified”. What does this mean, exactly? This assessment is vague
and unhelpful. Nowhere did Carlos explain how he selected and removed
detected threats. Besides, these messages are more than two years old, and
the most recent version of Malware Bytes may be different than the older version
whose accessibility was supposedly verified by Carlos, who, unfortunately, is no
longer around to explain in more detail what he meant. So I will ask yet
again. How do you select and remove detected threats using the latest
version ofMalware Bytes? I’ve been waiting two years for an answer.
Gerald
See this series of messages from the TechTalk
archive. Gerald asked this specific question about a recent version of
Malware Bytes after Carlos wrote a brief assessment. You will see that
Carlos' response answers Gerald's question of today. Unless the program
has regressed, which I very much doubt, I consider Carlos' response to be more
reliable than this other person referenced by Gerald.
Gene
----- Original Message -----
Thank you.
When I use the word accessible, I usually mean
accessible from the keyboard using standard keys and commands. I say a
program is useable if it can't be used in that way and that a program is partly
accessible if a combination of keyboard commands and screen-reader functions
like the JAWS cursor and the JAWS touch cursor need to be used, or their
equivalents in other screen-readers.
In the message you are referring to, I didn't use
it in that way because it seemed better to use accessible because I said
accessible in that way, meaning the controls are accessible, useable or
reachable in that way..
Gene
----- Original Message -----
From: Steve Matzura
Sent: Monday, February 05, 2018 10:56 AM
Subject: Re: [TechTalk] malware bites question Gene, you're a feisty bird. I LOVE FEISTY BIRDS! Accessible is a word that's
loosely bandied about these days.To some folks it means that a program can be
fully accessed simply by using the TAB key. Of course, nothing could be
further from correct. Accessible means that a piece of software can be used when
any or all the tools available to one are employed,and after employing all those
tools, no part of said software is not within reachability. On 2/5/2018 7:57 AM, Gene wrote:
|
|
Re: if someone is using audacity, I need your help.
Rich De Steno <ironrock@...>
Here are links to 2 parts of an Audacity tutorial https://www.dropbox.com/s/e55hs5thvjkll30/Audacity%20Materials%20June%202015.zip?dl=1 https://www.dropbox.com/s/szbnhbc89ph03p1/Audacity%20Tutorial%20Part%202.mp3?dl=1 On 2/5/2018 3:21 PM, Jim Rawls wrote:
-- Rich De Steno
|
|
Re: if someone is using audacity, I need your help.
Jujube
You can check out the Audacity manual at manual.audacityteam.org. What feature are you wanting to learn specifically?
toggle quoted messageShow quoted text
----- Original Message -----
From: "Jim Rawls" <jazzpiano@ca.rr.com To: main@TechTalk.groups.io Date sent: Mon, 5 Feb 2018 12:21:00 -0800 Subject: [TechTalk] if someone is using audacity, I need your help. Hi all, I have audacity 2.1.3 and I don't have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
if someone is using audacity, I need your help.
Jim Rawls
Hi all, I have audacity 2.1.3 and I don’t have a clue on how to use it. I want to record files to use on my internet radio show. If someone can help it would be greatly appreciated. Thanks. Jims
|
|
Re: OCR Scanner
Allen West
The Pearl is a dedicated camera for VFO software. Currently it only
toggle quoted messageShow quoted text
works with OpenBook and JAWS 2018. I did not see the Sara on the VFO website. I did find the iPal from ABISEE. Besides being lind, these residents have developmental disabilities. We find OpenBook easy, but for some finding and pressing a spacebar is a slight challenge. It becomes a real challenge when they need to delte or reread a page. That is why we are looking for a stand alone scanner that is very simple. Allen
On 2/4/18, Allen West <alwest0324@gmail.com> wrote:
The agency has the Pearl already. The Pearl only works with OpenBook
|
|
Re: malware bites question
Gerald Levy
Carlos’s response was “Latest version of Malware Bytes accessibility
verified”. What does this mean, exactly? This assessment is vague
and unhelpful. Nowhere did Carlos explain how he selected and removed
detected threats. Besides, these messages are more than two years old, and
the most recent version of Malware Bytes may be different than the older version
whose accessibility was supposedly verified by Carlos, who, unfortunately, is no
longer around to explain in more detail what he meant. So I will ask yet
again. How do you select and remove detected threats using the latest
version ofMalware Bytes? I’ve been waiting two years for an answer.
Gerald
See this series of messages from the TechTalk
archive. Gerald asked this specific question about a recent version of
Malware Bytes after Carlos wrote a brief assessment. You will see that
Carlos' response answers Gerald's question of today. Unless the program
has regressed, which I very much doubt, I consider Carlos' response to be more
reliable than this other person referenced by Gerald.
Gene
----- Original Message -----
Thank you.
When I use the word accessible, I usually mean
accessible from the keyboard using standard keys and commands. I say a
program is useable if it can't be used in that way and that a program is partly
accessible if a combination of keyboard commands and screen-reader functions
like the JAWS cursor and the JAWS touch cursor need to be used, or their
equivalents in other screen-readers.
In the message you are referring to, I didn't use
it in that way because it seemed better to use accessible because I said
accessible in that way, meaning the controls are accessible, useable or
reachable in that way..
Gene
----- Original Message -----
From: Steve Matzura
Sent: Monday, February 05, 2018 10:56 AM
Subject: Re: [TechTalk] malware bites question Gene, you're a feisty bird. I LOVE FEISTY BIRDS! Accessible is a word that's
loosely bandied about these days.To some folks it means that a program can be
fully accessed simply by using the TAB key. Of course, nothing could be
further from correct. Accessible means that a piece of software can be used when
any or all the tools available to one are employed,and after employing all those
tools, no part of said software is not within reachability. On 2/5/2018 7:57 AM, Gene wrote:
|
|
Re: Question about "Resolve 1 security issue found on your Google account" email
mcLeod stinnett
--
From Mack often times, they want you to verify a phone number or a backup email address, or do stup multi step verification. also, in order to make thunderbird work with google you have to allow google to accept less secure apps. they want you to turn that off.
|
|
Re: Question about "Resolve 1 security issue found on your Google account" email
chris judge
I’ve gotten them lately
From: main@TechTalk.groups.io [mailto:main@TechTalk.groups.io] On Behalf Of Loy
Sent: February 4, 2018 9:40 AM To: main@TechTalk.groups.io Subject: [TechTalk] Question about "Resolve 1 security issue found on your Google account" email
Are others receiving this message and what does it mean. I go to my Google. account and find nothing wrong. 1 security issue found on your account We’ve upgraded the Security Checkup to give you specific, personalized recommendations to strengthen the security of your Google Account. Take the 2-minute checkup today to see the actions you should take to make your account more secure.
|
|
Finding Videos With Audio Descriptions, news article
-
|
|