- From: Joshue O Connor <joshue.oconnor@ncbi.ie>
- Date: Fri, 03 Nov 2006 10:32:02 +0000
- To: ac@nomensa.com
- Cc: foliot@wats.ca, w3c-wai-ig@w3.org, WebAIM Discussion List <webaim-forum@list.webaim.org>
Thanks for that Alastair. All the best Josh Alastair Campbell wrote: > Josh wrote: >> At the risk of upsetting a hornets nest here, can you please point to >> any resources which indicate exactly what UA key combinations are > mostly >> effected by user defined access keys? > > There's a list of browser, OS & access technology keys here: > http://www.wats.ca/show.php?contentid=43 > > Colin wrote: >> I would be curious to read about any user or users who either use the >> feature or who have tried and found it unhelpful. > > There are some, you might find such a reply in the WAI-IG archive > somewhere, but it is rare. > > When testing client sites with a variety of people with different > abilities and access technologies, I've not found one who spontaneously > used accesskeys when they were available. > > When asked after the tasks if they noticed the accesskeys or used them > on other sites, replies varied between "what accesskeys", "what are > accesskeys", and "yes, but I've never used them". Given the poor > implementations both in browsers and in sites (e.g. one that gave > 'helpful' hidden text that spelt them phonetically, but then they didn't > work anyway), those type of results are hardly surprising. > > I'd love to make this sort of data available, but 1) It's confidential > to each client, and 2) we asked out of curiosity, the tasks were to find > or use things on the site. Accesskeys were not the focus, which I guess > is quite realistic! > > I can see good uses for often used applications (e.g. intranet apps or > webmail clients), but they would still have to be user defined. For > general sites, the @role style methods are the way forward. > > Kind regards, > > -Alastair > ******************************************************************** NOTICE: The information contained in this email and any attachments is confidential and may be privileged. If you are not the intended recipient you should not use, disclose, distribute or copy any of the content of it or of any attachment; you are requested to notify the sender immediately of your receipt of the email and then to delete it and any attachments from your system. NCBI endeavours to ensure that emails and any attachments generated by its staff are free from viruses or other contaminants. However, it cannot accept any responsibility for any such which are transmitted. We therefore recommend you scan all attachments. Please note that the statements and views expressed in this email and any attachments are those of the author and do not necessarily represent the views of NCBI ********************************************************************
Received on Friday, 3 November 2006 10:32:19 UTC