Finance
Tech Tip: How Much Should You Spend On IT?
Performance
The Play, ‘Ink,’ Reveals How Murdoch Got Ink
Education
Symposium Presents ‘The White House in Popular Culture’
Featured
Journalists’ Fun Fest Also Gets Serious
Arts & Society
Where to Be This White House Correspondents’ Dinner Weekend
Tech Tip: What to Do Before You Go to Starbucks
February 3, 2020
•An ounce of prevention is worth a pound of cure. So make sure you’re engaging your IT people to encrypt and back up your data.
2 Losses We Can Ill Afford: Lehrer and Wootten
January 27, 2020
•This past week, we lost two men we recognize as part of the city’s history and daily life; we lost the coach and we lost the newsman.
Kobe Bryant’s Journey, Cut Short
•
A restless imagination allowed him to write children’s books, create foundations and schools and support women’s basketball with the same exuberance that he showed on the court.
Tech Tip: Remove That Unwanted Freeware
•
Clutter is the enemy of a speedy PC. If you’re not using a particular software on a regular basis, it’s best to remove it completely.
Tech Tip: If You Installed It, You Must Update It
January 21, 2020
•Once a known vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.
Democratic Women: Following Debates, Ready to March
January 16, 2020
•While watching the debate, many at the Woman’s National Democratic Club drew and colored-in large posters that they planned to take to the third annual Women’s March on Saturday.
Politics, Impeachment Are Heating Up
•
The looming impeachment process slowly swallowed up everything else. Formally, that occurred with the delivery, on Thursday, of the two articles of impeachment against President Trump.
Tech Tip: Bookmark the Websites You Frequently Visit
January 13, 2020
•Here’s a sneaky trick used by many hackers. They purchase and set up a fraudulent website that is a close misspelling of a legitimate one.
Tech Tip: Never Use Personal Devices to Connect to Company Data
January 6, 2020
•Since most malware is designed to operate in total stealth mode, undetected, you won’t know that some hacker is watching you log in to your company’s file server or key cloud application.
Tech Tip: How to Spot a Phishing Email
December 30, 2019
•Often these emails look 100-percent legitimate. They show up in the form of a PDF, a UPS or FedEx tracking number, a bank letter, a Facebook alert, a bank notification, etc.