NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-

HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- SharePoint at 25: How Microsoft is putting knowledge to work in the AI era
Twenty-five years ago, SharePoint set out to help people share knowledge and work better together, a mission that today operates at extraordinary scale. The post SharePoint at 25: How Microsoft is […]
- Microsoft Sovereign Cloud adds governance, productivity, and support for large AI models securely running even when completely disconnected
Microsoft Sovereign Cloud’s expansion of capabilities includes Azure Local disconnected operations, Microsoft 365 Local disconnected, and Microsoft Foundry addition of large model and modern […]
APPLE NEWS
- Why Apple Rejected a Clamshell-Style Foldable iPhone
Apple considered but abandoned plans for a flip-style foldable iPhone because it didn’t create compelling new use cases, according to Weibo leaker Instant Digital. Apple reportedly felt that it was an “unnecessary” design because the biggest selling point would have been its smaller size when folded. The split at the middle also caused issues with internal space, limiting battery capacity and leaving less space for […]
- Apple’s Low-Cost iPhone 17e is Faster Than the Low-Cost MacBook Neo
Apple is set to launch two new low-cost devices tomorrow, the iPhone 17e and the MacBook Neo. Both devices use A-series chips, which have historically been limited to the iPhone and iPad. The MacBook Neo has Apple’s A18 Pro chip inside, which was first used in the iPhone 16 Pro models, while the iPhone 17e has a newer A19 chip. Unsurprisingly, thanks to the newer chip, Apple’s $599 iPhone outperforms […]
DELL NEWS
- ThinOS: A Smarter Path to Extending Endpoint Lifecycles
Experience enhanced security, streamlined management and seamless access to virtual environments with ThinOS.
- Powering the Future: AI Workstations, Agentic AI and What to Buy
NPUs are transforming everyday experiences, but they aren’t the whole story.
HP NEWS
- HPE reports fiscal 2026 first quarter results
HOUSTON – March 9, 2026 – HPE (NYSE: HPE) today announced financial results for the first quarter ended January 31, 2026. “HPE delivered a strong first quarter, outperforming in our networking business and posting one of our most profitable quarters on record,” said Antonio Neri, president and CEO of HPE. “Our Q1 results reflect our newly combined networking innovation, and effective operational discipline in a […]
- HPE is a Leader for SAP-certified servers, according to the IDC MarketScape report
In-memory processing helps enterprises automate tasks and improve efficiency for their most fundamental business functions: from accounting and HR to inventory and supply chain. The capability works by processing large data sets at the source, significantly accelerating insights while ensuring high availability of mission-critical applications. But to power in-memory processing efficiently and with minimal risk to avoid […]
IT SECURITY NEWS
- FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials
Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. The activity involves the exploitation of recently disclosed security vulnerabilities or weak credentials to extract configuration files containing service account credentials and network topology
- How to Stop AI Data Leaks: A Webinar Guide to Auditing Modern Agentic Workflows
Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their own. But there is a problem. While these agents make work faster, they also open a new “back door” for hackers. The Problem: “The Invisible Employee” Think of an AI Agent like a new employee who has
AI NEWS
- An AI Agent Blackmailed a Developer. Now What?
On 12 February, a Github contributor going by MJ Rathbun posted a personal attack against Scott Shambaugh, a volunteer maintainer for an open-source project. Shambaugh had rejected Rathbun’s code earlier in the day. Rathbun meticulously researched Shambaugh’s activity on Github, in order to write a lengthy takedown post that criticized the maintainer’s code as inferior to Rathbun’s, and ominously warned that […]
- Military AI Policy Needs Democratic Oversight
A simmering dispute between the United States Department of Defense (DOD) and Anthropic has now escalated into a full-blown confrontation, raising an uncomfortable but important question: who gets to set the guardrails for military use of artificial intelligence — the executive branch, private companies or Congress and the broader democratic process?The conflict began when Defense Secretary Pete Hegseth reportedly gave […]
