Tony Bradley

Tony is principal analyst with the Bradley Strategy Group, providing analysis and insight on tech trends. He is a prolific writer on a range of technology topics, has authored a number of books, and is a frequent speaker at industry events.

6 disaster recovery do’s and don’ts from Hurricane Katrina survivors

Office Online vs. Office 365: What’s free, what’s not, and what you really need

Office Online vs. Office 365: What’s free, what’s not, and what you really need

Free Office Online is a great deal, but paying for an Office 365 subscription gives you some hard-to-beat perks. We’ll help you decide which way to go.

Virtual servers still face real security threats

Don't let the word "virtual" in virtual servers fool you. You're the only one who knows it's virtual. From the perspective of the virtual server itself, the devices connected to it, applications running on it, end-users connecting to...

What you need to know about Heartbleed and OpenSSL

You know that little padlock icon you look for to ensure your Web traffic is encrypted and secure? It turns out that you might not be as secure as you think thanks to a vulnerability that was accidentally introduced into the code of...

Alert: Your password is probably compromised...again

Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password...

Google Keep vs. OneNote vs. Evernote: We name the note-app winner

Google shook things up last week when it dusted off its old Notebook service and relaunched it as Keep. Google's new software muscles in on the space currently dominated by Microsoft OneNote and Evernote, two note-taking apps that...

Out-of-date, vulnerable browsers put users at risk

Is your browser up to date? According to the results of a new survey from security software vendor Kaspersky, nearly a quarter of the browsers currently in use are out of date. Surfing the Web with a vulnerable browser is a recipe for...

Leap Motion is overwhelmed by developer response

It seems like we can expect amazing things from the Leap when it launches next year. Leap Motion reports that it has been flooded with requests for developer units, and an impressive assortment of unique and innovative applications...

Power Pwn outlet strip doubles as stealthy hacking tool

Normally if you find a rogue outlet strip, or a user happens to bring his or her own surge protector to use you might not think much of it. Thanks to a new device called the Power Pwn, though, it might soon be cause for concern.

802.11ac 'Gigabit Wi-Fi': What you need to know

Your 802.11n wireless network and devices are about to become passA(c). Although the official 802.11ac specification won't be finalized until sometime in 2013, wireless equipment will soon appear on store shelves sporting the faster...

Why Switching OS Platforms Is Not a Security Fix

It has been a rallying cry against Microsoft Windows for years: to avoid malware and security issues, just stop using Windows. The mantra has traditionally been embraced by both Mac and Linux users, but as Mac OS X users deal with the...

Apple Flashback Malware Removal Includes Innovative Approach to Reducing Risk for Macs

Better late than never? Apple has released the third Java update in a week for Mac OS X, and this one contains the tool to remove the Flashback malware from infected systems. Beneath the belated fix to help users eradicate the threat,...

Load More