2 Losses We Can Ill Afford: Lehrer and Wootten

January 27, 2020

This past week, we lost two men we recognize as part of the city’s history and daily life; we lost the coach and we lost the newsman.   

Kobe Bryant’s Journey, Cut Short


A restless imagination allowed him to write children’s books, create foundations and schools and support women’s basketball with the same exuberance that he showed on the court.       

Tech Tip: Remove That Unwanted Freeware


Clutter is the enemy of a speedy PC. If you’re not using a particular software on a regular basis, it’s best to remove it completely.

Tech Tip: If You Installed It, You Must Update It

January 21, 2020

Once a known vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.

Democratic Women: Following Debates, Ready to March

January 16, 2020

While watching the debate, many at the Woman’s National Democratic Club drew and colored-in large posters that they planned to take to the third annual Women’s March on Saturday.

Politics, Impeachment Are Heating Up


The looming impeachment process slowly swallowed up everything else. Formally, that occurred with the delivery, on Thursday, of the two articles of impeachment against President Trump.

Tech Tip: Bookmark the Websites You Frequently Visit

January 13, 2020

Here’s a sneaky trick used by many hackers. They purchase and set up a fraudulent website that is a close misspelling of a legitimate one.

Tech Tip: Never Use Personal Devices to Connect to Company Data

January 6, 2020

Since most malware is designed to operate in total stealth mode, undetected, you won’t know that some hacker is watching you log in to your company’s file server or key cloud application.

Tech Tip: How to Spot a Phishing Email

December 30, 2019

Often these emails look 100-percent legitimate. They show up in the form of a PDF, a UPS or FedEx tracking number, a bank letter, a Facebook alert, a bank notification, etc.

Tech Tip: How to Foil Ransomware

December 23, 2019

After your files are compromised, the hackers behind the attack pop up a demand screen asking for payment within a set time frame in order to get the key to decrypt your files.