Deleting Old iTunes Backups

If you’re concerned about storage space on your computer, consider removing old iTunes backups.

If you’ve ever looked at the Apple–>About this Mac/”Storage” section on your computer, you may have noticed that there is a chunk of storage space being used by “Other” files. One thing that is grouped in this category is old iTunes backups. On a Windows computer it’s not so easy to see exactly how your files are using up disk space, but it’s easy to check in iTunes to see if there are any backups you are ready to get rid of.

Seeing Exactly how Much Space iTunes Backups are Using (totally optional, for the curious)

If you want to see how much space is being used by iTunes backups on your computer:

On a Mac:

  1. Click on the desktop to make sure you’re in the Finder, hold down the Option key, and choose “Go–>Library”.
  2. Find and select (single click) the folder “MobileSync”.
  3. Select File–>Get Info and look at the “Size” figure.

On a PC the backups are stored in “Users\(username)\AppData\Roaming\Apple Computer\MobileSync\Backup”. To navigate to that folder:

  1. Find the Search bar:
    • In Windows 7, click “Start”.
    • In Windows 8, click the magnifying glass in the upper-right corner.
    • In Windows 10, click the Search bar next to the “Start” button.
  2. In the Search bar, enter “%appdata%”
  3. Press “Return”.
  4. Open up the “Apple Computer” folder
  5. Right-click on the “MobileSync” folder and select “Properties” and look for the folder size.

Checking & Removing Backups in iTunes

When you are ready to remove iTunes backups:

  1. Open up iTunes.
  2. On a Mac choose iTunes–>Preferences, and on Windows choose Edit–>Preferences.
  3. Click Devices.
  4. Choose the backup that you want to delete. If you have several devices or backups, hover the mouse pointer over the backup to see more details.
  5. Choose “Delete Backup”, then confirm.

Cleaning out your Thunderbird Address Book

If you’ve been using Thunderbird for a while it has probably built up a good-sized address book for you. Cleaning it out every now and then is a good practice to avoid making addressing mistakes.

Auto-fill of known addresses is a handy feature, but if you’ve got lots of old addresses hanging around it can cause headaches and mistakes if you’re not paying attention. For instance, usernames at Hampshire should always be unique, but email aliases, which are composed from the person’s first initial and last name, may be re-used. It’s also easier to type the first few letters of someone’s name and home in on the right correspondent if your address book is in good shape.

When you open up your address book in Thunderbird, you will notice there are at least 2: Collected Addresses and Personal Address Book. There may be more, including Mac OS X Address Book, depending on what type of system you’re working on and whether you’ve imported any address books in the past.

Open up each address book, and just scan the list quickly, looking for people who have moved on & with whom you no longer correspond. You can select a name and press the Delete key (Mac) or Backspace key (PC) to remove it. This can be a tedious project, but you can break it into different sessions if need be.

The Hampshire Intranet, Daily Digest, and Campus Calendar Overhaul Project

Many students, faculty, and staff are already aware that some of us in IT and the communications office have been working on a major redesign of the Hampshire Intranet, which includes the announcement and event system that runs the campus calendar and daily digest emails you receive each morning during the week. We want to provide the campus community with some details about the project along the way, so here goes…

What is the Intranet?

The Intranet is a portal-like website that contains some password-protected content meant for the Hampshire community. The main page has a bunch of links, and it’s the place to post announcements and events that appear in the daily digest emails and on the campus calendar.

Why are we overhauling it?

The Intranet has existed in a similar state for well over 10 years. As a community we still have a need for communication tools like announcements, a central campus calendar, and a place to put information that requires a Hampshire login. We’ve received a LOT of feedback over the years about different aspects of this system. We’ve done user testing and interviews with some students, faculty, and staff, which made the direction of our work very clear. The same feature requests and bugs came up over and over again. We want to provide similar and better functionality in a user-friendly way.

What kinds of changes are we talking about?

There will be a lot of changes, but here are highlights of the big ticket items we’re addressing:

  • Redesigned daily digest email, including new features when submitting announcements and events.
  • Redesigned Intranet homepage with helpful links targeted specifically for students, faculty, and staff respectively based on who is logged in.
  • Centralized campus calendar and academic calendar.
  • Student job postings (both work study and non-work study) that can be easily searched and filtered.
  • Search functionality that indexes all Intranet content, including announcements and events.


We plan to launch the new Intranet/Digest/Calendar in January 2017.

We’ll be posting more details about the project as we progress and we’ll be looking for feedback. In the meantime, questions, comments, or concerns can be sent to

Hampshire Wireless Network Security

iOS 10 gives hints about how to make Hampshire wireless networks more secure. What’s that about?

If you have a device that runs iOS 10 you may have noticed that it offers hints for improving the security of wireless networks, in particular Hampguest, Wallace, and Gromit, but not for Eduroam. There’s nothing you need to do to improve the security, but all of us should understand the basics of the security issue so we can make the best choice.

Limiting Access to Wireless Networks
There are ways to limit who is allowed to connect using wireless networks. At Hampshire we limit access to the Wallace (faculty and staff) and Gromit (student) networks by requiring a Hampshire account be entered to register each device used on those networks; Hampguest is open for the public to use while on campus. This helps us keep our IT infrastructure somewhat protected, as well as helping to keep wireless traffic within our capacity.

Wireless Network Data Security
What simply controlling access to a wireless network does not do is to encrypt the information that you send over the wireless network. Data that is not encrypted is vulnerable to being intercepted by a nearby hacker. Keep in mind, though, that information you send to secure http sites (web addresses that start with “https”), as well as our email system (and hopefully any current email system), are encrypted by protocols enforced by those systems.

Wireless networks that are encrypted protect the information you send from your computer so that an eavesdropping computer cannot decipher them. There are different methods of encrypting, with a WPA2 encryption method being the current standard.

Eduroam is the Encrypted Wireless Network on Campus
Of the Hampshire wireless networks, only Eduroam provides this encryption protection. We strongly recommend that the Hampshire community use Eduroam whenever possible. Eduroam does provide access to file servers and printing for faculty and staff, but there are Hampshire web services that are not currently available on Eduroam; if you run into problems accessing a service, try switching to Wallace to see if it works.

We are planning to eventually discontinue Wallace and Gromit, and switch entirely to Eduroam. It is a good idea to set up Eduroam sooner rather than later, not only to take advantage of its security features, but also because it is available at many other educational institutions.

Learn more about Eduroam

WebUI 5 for Colleague

WebUI, the web user interface you may use to access Colleague will be upgraded to a new version in the next few months.  This new version will no longer require the use of Microsoft Silverlight plugin, which means you can use any of your favorite browsers such as Firefox, Chrome or Safari.

Please note that WebUI  is not TheHub.

Why a New Version?

The current version relies on Microsoft Silverlight plugin which is problematic for several reasons.  Foremost, Silverlight is begin decommissioned by Microsoft and will no longer be supported in the near future.  Secondly, changes by Chrome make Silverlight mostly non-functional.  Lastly, WebUI 5 will now use HTML5, the latest standard for web development.

When Will I See the New Version?

Over November we will have the new version of WebUI installed in our test environments and users will be notified to try it out.  We anticipate installing it in production around Thanksgiving, but that is speculation at this point.

You can view highlights and a demonstration at HampTV .

What Forms Have Changed?

You may notice slight cosmetic changes to a handful of forms now, before we install the new version, to make them work better under WebUI 5.  In particular:

Contribution Entry Defaults (CNED)
Solicitation Track (MDSO)
Matching Gift Entry (MGE)
Proposal (PRSL)
Recognition Program (RGPM)

GL Account History Inquiry (AHST)
Approval GL Class Maintenance (APGL)
Fixed Asset Maintenance (ASST)
Base Budget Projection (BCBP)
Reporting Units Budgets (BCRU)
GL Class Definition (GLCD)
Other Fixed Asset Information (OFXM)
Purchase Order Summary List (POIL)
Tax Codes (TXCM)
Vendor Register (part of VENR)
Work Order Labor Entry (WOLU)
Work Order Materials (WOMU)

Buildings (BLDG)
Contact History (CON)
Employment Detail (EMPD)
Fixed File Fields (ELFF)
Resolve Relation Addr Dupls (ERRA)
High Schools Attended (HSA)
Person Privacy Warnings (PID5)
Rooms (RMSM)

Benefit/Deduction Cost Update (BCDU)
Employee Taxes (ETAX)
Person’s Leave Plan (PLEV)
Pay Funding Information (PPFI)
Person’s Wage/Salary (PWAG)

Award Detail Entry (AIDE)
Academic Program Requirements (APRS)
AR Summary Inquiry (ARSI)
AR Term Summary Inquiry (ARTI)
Award History (AWHT)
Books (BOOK)
Direct Loan Application (DLAN)
Department of Ed Import (DOEI)
Financial Aid Status Info (FASI)
FA Update Parameters (FAUP)
Invoice Due Date Formula (IDDF)
Parent FA Demographic Data (PI16)
Parent FA Demographic Data (PI17)
Payment Plans (PPLN)
Academic Programs (PROG)
Calculate Return of Funds (ROFC)
Sections (SECT)-Note that SECT has had its detail fields moved, but the field sequence is still the same.
Immediate Payment Control Parameters (SFIP)
Section Offering Info (SOFF)
Student Profile (SPRO)
FA Student Comments (STCM)
Student Term Detail (STDT)
Transcript Requests (TRRQ)

I’m Not Sure What All This Means

If you have questions, send them to and we’ll be happy to help you.

macOS Sierra

If you have a Mac you may have noticed the offer to upgrade to the latest version of the operating system, macOS Sierra. Here’s our breakdown on whether to upgrade.

[Note that with the introduction of Sierra, Apple has changed its naming conventions from “OS X” to “macOS”, similar to their mobile operating system “iOS.”]

New Features in Sierra
Sierra has several new features, but nothing that we have found to be essential:

  • Siri, Apple’ voice-command system, is a part of macOS Sierra. This allows you to talk to your Mac instead of typing in search commands or using menus for basic commands. Apple does tout several other ways to use Siri, but we haven’t integrated those into our workflow. Being able to talk to our phones seems like a really useful feature, but we aren’t sure how helpful it is to be able to talk to our computers, even in a home environment; in an office environment we have not found Siri to be appropriate or useful.
  • You can copy and paste between your iOS devices and your Mac. We haven’t even wrapped our minds around that one, let alone found a use for it.
  • There is support for iCloud storage for all of your Mac desktop and Documents folder files–the idea being that most of the files you use can be synced with iCloud and accessed on your phone or iPad. We do not recommend you use this feature for reasons that are explained below.
  • “Memories” is a feature of Photos that automatically creates albums from your photos. This was admittedly stunning in some instances–family vacations, for instance–but it was absurd in others (we have an awful lot of pictures of computers in our photos that we use to document inventory numbers, damage, repair processes, etc., and Memories includes them right along with our personal photos).
  • There are other enhancements if you use Apple Pay or an Apple Watch, but we haven’t explored those.

Problems We are Aware Of

  • We have read of a serious issue that arose when a user attempted to use the iCloud storage sync feature with two Mac’s and an iOS device: he ended up losing all of the files on one of the computers. Luckily he had a backup of the files, but this tale convinces us that this feature is not ready for prime time, and you should not enable it. Please also note that work-related files of a sensitive nature must never be saved on non-Hampshire devices; see the Hampshire College Data Security Policy.
  • We have not done broad testing of printers, but we have found that some Cannon PIXMA printers do not work with the new system without going through a multi-step work-around every time a document is printed. Hampshire Xerox and HP printers on campus appear to work just fine.
  • Adobe InDesign may have some graphical issues when dragging items around. This problem is purely visual, and other Adobe Creative Cloud applications reportedly work fine.

Our Recommendations

  • We do not find the new features compelling enough to recommend an upgrade. If you do have a strong desire to upgrade, there are no show-stoppers that we have found except for the iCloud syncing feature–use that at your own risk on personal computers, and please do not use it on Hampshire-owned computers.
  • As with any upgrade, you should do a full backup of your computer before you do the upgrade. Our recommendation is to use Time Machine, but if you have another full backup solution that you use, go ahead and use that.
  • Be aware that there may be compatibility issues with applications or printers. It’s always a good idea to do a Google search to see if anyone else has reported issues with key applications or printers and the new operating system.

What to do About a Wet Computer

Accidents happen, and unfortunately often involve liquids and computers. Your best chances include shutting it down immediately and tenting it upside down. Read on for more suggestions, plus what to do with a wet phone.

If your computer does get wet you need to act quickly for the best chance of its survival. So even though your computer isn’t wet right now (right?), read this so you’re ready if disaster strikes:

  1. Unplug it. Electricity and liquid are not something you want to mess with, and having power course through your computer while liquids are there is a recipe for short circuits, which cause further damage.
  2. Do not remove the battery if it involves taking the case apart with a screwdriver. If the battery is intended to be removable by consumers it will be removable without taking the case off, but most computers these days have batteries integrated inside the case. Batteries are dangerous if handled incorrectly.
  3. Tent the computer upside-down. This will help the computer drain the water away from the electronic components, and allow air to circulate to dry.
  4. Don’t take the computer apart unless you are an experienced technician. You can cause more damage than you do good.
  5. Bring it in to us as soon as you can (still keeping it tented upside down if possible). We will be able to take it apart so that it dries more quickly. We will work with you to make a plan to try to recover your data if your computer does not survive. Our hours are M-F 8:30-4:30, except holidays.
  6. Do not turn on your computer until at least 48 hours have passed and the computer appears dry. The temptation is to test whether it still works, the iron is that if it is still working you can render it inoperable by turning it on too soon. Do not yield to this temptation.

If your phone gets wet:

  1. Turn it off immediately.
  2. Put it in a bin of rice to help draw out the moisture. We don’t generally recommend this for computers because they have vents where the rice could enter, but it’s great for phones.
  3. Wait 48 hours before trying the phone I know this is unfathomable, but a new phone is expensive so (at least for me) it’s worth the precaution.

Other things to know about electronics and liquids:

  • Spill damage is not covered by standard or extended warranties, it is covered in special accidental damage warranties if it is offered at all. Apple does not have that sort of warranty
  • Computer manufacturers may put spill detection points in the computer. These will change color if they come in contact with a liquid, and will likely void your warranty in case of a spill.
  • No liquid is good for your computer, but water is better than anything else. Sugary drinks leave a sticky residue, acidic drinks will corrode the components more.
  • Even if your computer is ok after it dries out, there may be follow-on damage from corrosion.
  • It’s heartbreaking to lose a computer to water damage, but for most of us it’s truly a disaster to lose all of our data. We can often recover data from a liquid-damaged computer, but the safest bet is to regularly back up your data, just in case.