...

Jonathan Adler to Close April 21

Easter Sunday is the last day in Georgetown for the maker and purveyor of ceramics, pillows, accessories and furniture, which opened on Wisconsin Avenue in 2012.

Tech Tip: Work Computers and Devices Are Only for One Thing

If you’re using a company device to access a compromised account, you’re opening up a door to a hacker, who can then get into your company’s network.

31st St. Bridge to Be Closed, Replaced

Plans now include closing off 31 Street from the bridge south to South Street and north to M Street. Only residential parking will be available on the rest of 31st Street during the closure period.

Tech Tip: Don’t Use Public WiFi Until You Read This

It’s not uncommon for hackers to set up fake clones of public WiFi access points to try and get you to connect to their WiFi over the legitimate, safe one being made available for public use.

Ward 2 Council Member Jack Evans Reprimanded

A Council reprimand is not without precedent; the late longtime mayor and Ward 8 Council member Marion Barry and Ward 1 Council member Jim Graham were both reprimanded.

Tech Tip: The Dangers of Dropbox and Other File-Sync Apps

Without central oversight of what information is being shared with whom, your company’s data can be spread far and wide.

Tech Tip: What to Do Before You Go to Starbucks

An ounce of prevention is worth a pound of cure. Here's how to protect your data in advance of loss or theft of your device.

Evans Under Scrutiny by Federal Grand Jury

Early in 2018, the D.C. Board of Ethics and Government Accountability opened an investigation. The inquiry was suspended midyear “because of an ongoing law enforcement investigation.”

Tech Tip: Remove That Unwanted ‘Freeware’

Clutter is the enemy of a speedy PC. Unused software sucks up processing speed and — even worse — leaves the door open to hackers and malware. 

Tech Tip: If You Installed It, You Must Update It

Once a known vulnerability is announced via a patch, hackers get to work like crazy, trying to figure out how to use that vulnerability to gain access to users who are lazy about installing updates.