Welcome!

IBM Cloud Authors: Yeshim Deniz, Elizabeth White, Pat Romanski, Liz McMillan, Stefan Bernbo

Related Topics: IBM Cloud

IBM Cloud: Article

Make All Available to All

Achieving accessibility in WebSphere applications

As your company makes more of its applications available on the Web, you will need to determine the level of accessibility for each of those applications. The term accessibility describes how IT hardware, software, and services address and/or neglect the needs of a user community, including users with disabilities. To achieve this aim, accessible applications often include or interface with assistive technology such as screen reader software, voice recognition, screen magnifiers, and special keyboards.

For WebSphere Web- and applet-based applications, accessibility compliance is primarily a consideration of user interface design:

  • Information should not be lost when using an alternative presentation, such as with assistive technology (e.g., processing images with text-to-speech software).
  • Site navigation and input controls should also be available in non-default usage scenarios (such as keyboard-only access).
  • The overall user experience should not be a diminutive one for users with disabilities - resolve problems of information loss, inaccessible controls, and layouts that may be frustrating or long-winded from different views.
Users today expect higher levels of convenience and ease of use from software applications. However, wider adoption of the technology by new demographic groups, such as older users and special-needs communities, leads to new requirements of the software for accessibility. These requirements go beyond enhancements of convenience and constitute functional changes. Software compliance may address the needs of those with limitations of dexterity or mobility, vision impairments, loss of hearing, eye/hand coordination problems, and cognitive disability. Consider that images flashing at a certain frequency can incite epileptic seizures in some users; this is an example of why accessibility factors need to be taken seriously.

Some of the measures that address special-needs users include:

  • Text-to-speech synthesizer software for visually impaired users
  • Greyscale mode and high-contrast settings for color-blind users
  • Keyboard-only alternative for users with limited hand usage
These few examples of functionality are detailed in government standards for accessibility. The most commonly referenced standard is Section 508 of the U.S. Rehabilitation Act, which places a requirement on all U.S. federal agencies to use products and services that are accessible to people with disabilities. Similar directives exist in the EU, Japan, Australia, and across the globe.

Assistive Technology
Assistive technology includes software and hardware solutions such as screen reader software, voice recognition, screen magnifiers, special keyboards, and wireless communications. IBM provides screen reader software called Homepage Reader which is available as a beta download. Another example of assistive technology is the MS-Windows NT/XP operating system Accessibility Options (see Figure 1). These are reached via:Start Menu -> Settings -> Control Panel -> Accessibility Options.

These options include:

  • Settings for cursor flashing
  • The enabling of special keyboard settings such as StickyKeys, Filter Keys, ToggleKeys
  • The settings for high-contrast mode, including different larger and bolder fonts, combined with customizable background/foreground color schemes
Figures 2 and 3 of the same Windows XP desktop illustrate the effect of high-contrast settings.

As shown in Figure 3, the application's background has become black and many of the fonts are now bolder and larger. The font settings are adopted from the new system settings. Note that the figures include a Web page in Internet Explorer 6.0 and windows from MS Outlook and MS Word applications. All of these applications converted properly to the high-contrast settings, but this is not guaranteed to be the case.

Readers are encouraged to try out these settings and explore how different software packages and applications are affected. The results will vary according to software and version, and depend on whether or not it ignores or blocks Windows systems settings or overloads functions such as special keys. In general, the software needs to support these APIs explicitly, so it is not safe to assume it will be accessible by default.

Web Design Considerations: HTML
The main focus of accessibility considerations for Web applications is on how the content is presented using HTML, stylesheets, JavaScript, and media content. This is irrespective of whether the rendered pages are static or are created using dynamic server-side technology such as Servlets, JSPs, or Windows ASPs. Since it is the final product rather than the creation process that is key, the principles will apply to different types of architectures. This article focuses on WebSphere applications.

Clean Up the HTML
Many browsers are flexible in accepting HTML that does not meet HTML and XML standards. You cannot assume your rendered HTML meets specification even if it looks acceptable in the predominant browsers such as Internet Explorer and Netscape. The HTML needs to be cleaned up; assistive HTML readers do more than handle basic presentation and therefore require a coherent base to interpret. They are not as flexible in handling unstructured HTML as are normal browsers.

Here are some areas that will need to be addressed:

  • Add missing HTML end tags. Single tags such as <br> also require an end tag, as per XML guidelines.
  • Avoid uppercase HTML tags. XML is case sensitive so use lowercase tags only.
  • Use quotation marks in tag parameters.
Such changes will appear trivial at first, but if these formatting issues permeate most of the site's pages, a seemingly simple task becomes a large and tedious project.

There are tools to assist with the HTML cleanup work that automate fixing problems such as those highlighted above. IBM WebSphere Studio Application Developer 5.1 provides a facility to clean up HTML and JSPs. The "Cleanup" function is available via Web Perspective -> select HTML/JSP > right-click Cleanup Document (see Figure 4).

Clean Up the Forms
Before using automated tools to clean up the HTML, first check the format of forms. This requires a manual process, otherwise, if the HTML is reorganized by a tool (e.g., WebSphere Studio -> Cleanup Documents -> Insert Missing Tags) and form tags are moved around, you will likely lose information that is intended for submission to the server, which will break the application's functionality.


More Stories By Max King

Max King, based in Prolifics' London office, has extensive experience delivering WebSphere solutions for clients worldwide, including JP Morgan Chase, NYSE, Wal-Mart, Lufthansa, BNP Paribas, MetLife, Honda, and Hertz. As a senior member of the Prolifics WebSphere Consulting Division, he specializes in J2EE architecture and best practices, application development and deployment, production 'crit-sit' support, production readiness assessments, application migration, and messaging and integration.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...