New Incubator: Black Girl Ventures x Halcyon

February 25, 2021

Starting in a few weeks, the 10 new fellows will participate in remote skill-building programming. Over the summer, they’ll meet for a weeklong residency at Halcyon’s headquarters.

Tech Tip: Your Firewall Is Useless, Unless …

February 22, 2021

A firewall is a device that acts like a security cop, watching over your computer network to detect unauthorized access and activity.

Tech Tip: Don’t Just Close Your Browser

February 15, 2021

If you simply close your browser, some of the session information that a hacker can use to gain entry is still running in the background.

Business Ins & Outs: Hungry for Tacos or Lobster?

February 12, 2021

Among the “ins” are a Ray-Ban sunglasses shop, Amigo Mio and Mason’s Famous Lobster Rolls, in the former Paul Bakery space on Wisconsin Avenue.

Tech Tip: Make This Password Unlike All the Rest

February 8, 2021

You know you’re guilty of it: using the same password for everything. And yes, it’s annoying to try and remember all those passwords. But read on.

Happy Days Are Here Again … in the Next Georgetowner

February 4, 2021

The Georgetowner’s next print issue, appearing Feb. 10, will celebrate the new administration, as well as Black History Month and Valentine’s Day.

ANC Revs Up Over Speed Limit Issue


At ANC 2E’s monthly meeting last Monday, a lively discussion broke out about two longstanding issues: speed limits and large truck traffic in residential areas.

BID Proposes 5,000 Feet of Streatery Decking

February 1, 2021

The pilot project will come under review of the Old Georgetown Board, as well as the District Department of Transportation’s public space committee, on Feb. 4.   

Tech Tip: Set Up Bank Alerts Now!


Many banks will send you an email alert whenever money is withdrawn from your account via check, debit card or transfer.

Tech Tip: Work Computers and Devices Are Only for One Thing …

January 25, 2021

If you’re using a company device to access a compromised account, you’re opening up a door to a hacker — who can then get into your company’s network via your email or PC.