Avatar photo

Craig Anderson

Craig Anderson focuses on Digital Transformation, with articles exploring Cybersecurity and DevOps. Craig's work has benefited industry professionals with key strategic pivots like migrating to the cloud, adopting agile practices, and successfully implementing automation. 
First VoNB Call in NTN Mode by Mavenir and Terrestar
IT Digital Transformation
First VoNB Call in NTN Mode by Mavenir and Terrestar

In a significant technological breakthrough, Mavenir, in partnership with mobile satellite operator Terrestar, successfully completed the first Voice over NB-IoT (Narrowband Internet of Things) call in Non-Terrestrial Networks (NTN) mode in January 2025. This remarkable achievement utilized the 3GPP-standardized NTN S-band spectrum to avoid interference that commonly affects terrestrial networks. This is a critical step towards integrating satellite and terrestrial

Read More
How Is Apple’s Vision Pro Transforming Enterprise Productivity?
IT Digital Transformation
How Is Apple’s Vision Pro Transforming Enterprise Productivity?

Apple’s Vision Pro, an advanced augmented reality (AR) headset, is creating significant buzz in the enterprise space by significantly enhancing business productivity and driving innovation. As organizations increasingly recognize the transformative potential of AR technology, Vision Pro is being positioned as a cutting-edge solution for a variety of complex enterprise applications. Seamless Integration with IT Infrastructure To ensure these cutting-edge

Read More
Boomi Tackles API Chaos with Holistic Management for Generative AI Age
IT Digital Transformation
Boomi Tackles API Chaos with Holistic Management for Generative AI Age

In today’s rapidly evolving technological landscape, Application Programming Interfaces (APIs) have become indispensable. Originating from the early days of ARPANET in 1969, the quest for connectivity has only intensified. Modern digital operations rely heavily on APIs to integrate diverse software applications, databases, and services, transforming how data and intelligence are channeled across platforms. The Rise of API Complexity The Digital

Read More
UK Launches Digital Inclusion Plan to Boost Online Skills for Millions
IT Digital Transformation
UK Launches Digital Inclusion Plan to Boost Online Skills for Millions

The UK government has announced a new Digital Inclusion Action Plan aimed at equipping millions of people with essential online skills. Spearheaded by Members of Parliament Sir Chris Bryant and Peter Kyle of the Department for Science, Innovation and Technology, the initiative seeks to tackle digital exclusion and bridge the gap in digital access among UK residents. Driven by alarming

Read More
Samsung and Hyundai Pioneer RedCap 5G for Smart Factory Innovation
IT Digital Transformation
Samsung and Hyundai Pioneer RedCap 5G for Smart Factory Innovation

Samsung Electronics made a significant breakthrough by successfully testing reduced-capability 5G technology (5G RedCap) on a private 5G network at Hyundai Motor Company’s plant in Ulsan, South Korea. This development marks a critical advancement as it is the first instance of RedCap deployment in an Industry 4.0 context. This pioneering test will be showcased at the upcoming Mobile World Congress

Read More
Are Mid-Size Organizations Ready for Ransomware Threats in 2025?
Cyber Security
Are Mid-Size Organizations Ready for Ransomware Threats in 2025?

As we approach 2025, the landscape of ransomware threats is evolving rapidly, posing significant challenges for mid-size organizations. These entities, often perceived as holding valuable data but lacking robust defenses, are increasingly targeted by cybercriminals. This article delves into the preparedness of mid-size organizations to combat these sophisticated ransomware threats. The Rising Threat to Mid-Size Organizations Increasing Target Frequency Mid-size

Read More
How Did Major Cyber Attacks Shape the Week in Cybersecurity?
Cyber Security
How Did Major Cyber Attacks Shape the Week in Cybersecurity?

The past week has exhibited a series of critical cyber incidents that have had a significant impact on global cybersecurity perspectives and practices. The events ranged from high-profile cryptocurrency thefts to the alarming misuse of cutting-edge AI tools, reflecting both the sophistication and the diversity of modern cyber threats. As these occurrences unfolded, they emphasized the ever-evolving nature of the

Read More
Is Silver Fox Targeting Healthcare with New ValleyRAT Malware Campaign?
Cyber Security
Is Silver Fox Targeting Healthcare with New ValleyRAT Malware Campaign?

The alarming rise in cyberattacks targeting healthcare networks has reached new heights, as highlighted by a recent campaign orchestrated by a Chinese-backed cyber threat group known as Silver Fox. These malicious actors have made significant inroads by infiltrating patient medical imaging software, thereby compromising sensitive medical information and jeopardizing patient care systems on a large scale. The Threat Unveiled Exploiting

Read More
Is AI in Software Development Compromising Code Quality for Speed?
DevOps
Is AI in Software Development Compromising Code Quality for Speed?

The integration of AI coding assistants like GitHub Copilot has revolutionized software development, enabling rapid code generation. However, recent findings suggest that this speed may come at the cost of code quality, raising concerns about long-term maintainability and technical debt. The Rise of AI Coding Tools Popularity Among Development Teams AI coding tools have gained significant traction among software development

Read More
How Will Qualcomm’s Dragonwing Revolutionize Industrial IoT Markets?
IT Digital Transformation
How Will Qualcomm’s Dragonwing Revolutionize Industrial IoT Markets?

In a significant stride towards revolutionizing the industrial IoT markets, Qualcomm has launched its latest brand, Qualcomm Dragonwing, aiming to empower various sectors through advanced technology solutions. Don McGuire, Qualcomm’s Chief Marketing Officer, has emphasized that Dragonwing will be instrumental in achieving unprecedented growth for industries by providing custom hardware, software, and services designed for business transformation. This new initiative

Read More
Chinese Botnet Bypassing MFA Targets Microsoft 365 Accounts Globally
Cyber Security
Chinese Botnet Bypassing MFA Targets Microsoft 365 Accounts Globally

In a concerning new development in the cybersecurity landscape, a massive Chinese botnet is currently targeting Microsoft 365 (M365) accounts through sophisticated password spraying attacks, effectively bypassing Multifactor Authentication (MFA). The botnet, which SecurityScorecard has identified as comprising over 130,000 compromised devices, is using stolen credentials from infostealer accounts to gain access to sensitive data, emails, and collaboration tools. These

Read More
Digital Transformation: AI, Blockchain, and Cybersecurity Evolution
IT Digital Transformation
Digital Transformation: AI, Blockchain, and Cybersecurity Evolution

In a landscape that is increasingly driven by technology, the rapid integration of new digital tools has reshaped how businesses and societies operate, propelling them towards a transformative future. From artificial intelligence (AI) altering traditional workflows to the significant advancements in blockchain technology, the contemporary tech sector is evolving at a pace that necessitates a continuous reevaluation of strategies by

Read More