METHOD LATEST NEWS


  • HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS

    EST Nov 2004

CISCO MERAKI NEWS


MICROSOFT 365 NEWS AND ROADMAP


APPLE NEWS


  • Have a 3D Printer? You Can Make Your Own iPhone Fold Dummy

    Apple is working on a foldable iPhone that’s set to come out in September 2026, and rumors suggest that it will have a display that’s around 5.4 inches when closed and 7.6 inches when open. Exact measurements vary based on rumors, but one 3D designer has created a mockup based on what we’ve heard so far. On MakerWorld, a user named Subsy has uploaded a 1:1 ‌iPhone‌ Fold replica (via Macworld), which can be 3D printed […]

  • Texas App Store Age Verification Law Blocked by Federal Judge

    A Texas federal judge today blocked an App Store age verification law that was set to go into effect on January 1, 2026, which means Apple may not have to support the changes after all. The Texas ‌App Store‌ Accountability Act (SB2420) requires Apple and other app marketplaces to confirm user age when a person creates an Apple Account. Apple Accounts for users under 18 would need to join a Family Sharing group, with […]

DELL NEWS


HP NEWS


  • HPE and Chunghwa Telecom collaborate to build a disaster recovery center

    Taipei, Taiwan – December 18, 2025 – HPE (NYSE: HPE) and Chunghwa Telecom Enterprise Business Group jointly announce plans to establish an international disaster recovery center. This center utilizes HPE’s Cyber Resilience Vault, featuring advanced ransomware protection and cyber and disaster recovery technologies. The purpose is to help local businesses build a global off-site backup mechanism with a second-level […]

  • Shaping the future: How HPE is evolving its telco strategy

    With HPE’s acquisition of Juniper Networks, we have united two of the industry’s most dynamic players to create a new powerhouse of innovation. The Networking business at HPE is more than a combination of portfolios; we are building a new generation of networks. As digital landscapes become more dynamic and complex, we have everything customers need to harness the power of AI to transform their networks, streamline […]

IT SECURITY NEWS


  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites

    Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials. The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download as of

  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

    A law enforcement operation coordinated by INTERPOL has led to the recovery of $3 million and the arrest of 574 suspects by authorities from 19 countries, amidst a continued crackdown on cybercrime networks in Africa. The coordinated effort, named Operation Sentinel, took place between October 27 and November 27, 2025, and mainly focused on business email compromise (BEC), digital extortion, and

AI NEWS


  • This AI Can Beat You At Rock-Paper-Scissors

    Rock-paper-scissors is often a game of psychology, reverse psychology, reverse-reverse psychology, and chance. But what if a computer could understand you well enough to win every time? A team at Hokkaido University and the TDK Corp. (of cassette-tape fame), both based in Japan, has designed a chip that can do just that.Okay, the chip does not read your mind. It uses an acceleration sensor placed on your thumb to measure your […]

  • Why Vision AI Models Fail

    Prevent costly AI failures in production by mastering data-centric approaches to detect bias, classimbalance, and data leakage before deployment impacts your business.The four most common model failure modes that jeopardize production vision systemsReal-world case studies from Tesla, Walmart, and TSMC showing how failures translate to business lossesData-centric failure modes including insufficient data, class imbalance, […]

JAPAN IT NEWS


Loading…