NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-

HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- The ultimate Microsoft 365 community event returns—your front‑row seat to the future of intelligent work
This event is your front-row seat to everything new and next across Microsoft 365—with hundreds of opportunities to learn directly from product makers and connect with the best community in tech. […]
- The 6 pillars that will define agent readiness in 2026
Learn six practical ways to build and scale agents with Microsoft Copilot Studio while supporting enterprise adoption and governance. The post The 6 pillars that will define agent readiness in 2026 […]
APPLE NEWS
- MacRumors Turns 26: Here’s What Our Readers Thought About the iPod, iPhone, and More
MacRumors turns 26 today, and we want to take the opportunity to thank everyone who has read and supported our website over the years. MacRumors was founded by Arnold Kim on February 24, 2000, while he was a medical student, and it has since become one of the world’s most popular Apple news websites. Kim was profiled in The New York Times in 2008. Coincidentally, we share our birthday with Steve Jobs, who would have […]
- Xiaomi’s Rumored ‘iOS Bridge’ to Bring Better Apple Device Connectivity
Xiaomi will introduce a new software update at this year’s Mobile World Congress (MWC) that will reportedly improve connectivity between its own devices and Apple products. Alongside the debut of the Xiaomi 17 series, its HyperOS 3.1 update is said to include a new “iOS Bridge” for smoother connectivity between the two platforms. According to GizChina, the features tipped include the following: iPhone call alerts: […]
DELL NEWS
- Your AI Needs an Open Road — Not a Dead End
AI is transforming business, but scaling it needs a fast data foundation. Dell and VAST Data take very different approaches.
- McLaren Racing Turns Race Data into an Edge with Dell Technologies Storage
See how McLaren Racing uses Dell PowerStore and PowerScale to capture telemetry data and video each Formula 1 race weekend and turns them into a real competitive advantage.
HP NEWS
- HPE accelerates service provider modernization with AI infrastructure innovations at MWC 2026
HOUSTON – February 24, 2026 – HPE (NYSE: HPE) today unveiled new solutions across networking and compute in advance of Mobile World Congress 2026 that accelerate modernization for service providers. With the new products and enhanced capabilities, HPE’s customers can build and operate their own AI infrastructure with low-latency, high-capacity, AI-native solutions from the core to the edge. “AI infrastructure is a […]
- The next bottleneck in Enterprise AI isn’t compute. It’s context.
February 19, 2026 – For the past two years, enterprise AI infrastructure conversations have centered on compute. More GPUs. Larger clusters. Faster interconnects. That focus was necessary — and it helped move generative AI from curiosity to capability. But as organizations shift from pilots to production, many are running into a different limiter: not the ability to generate tokens, but the ability to manage the context […]
IT SECURITY NEWS
- Identity Prioritization isn’t a Backlog Problem – It’s a Risk Math Problem
Most identity programs still prioritize work the way they prioritize IT tickets: by volume, loudness, or “what failed a control check.” That approach breaks the moment your environment stops being mostly-human and mostly-onboarded. In modern enterprises, identity risk is created by a compound of factors: control posture, hygiene, business context, and intent. Any one of these can perhaps be
- Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team. Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful attack against a healthcare
AI NEWS
- AI’s Math Tricks Don’t Work for Scientific Computing
AI has driven an explosion of new number formats—the ways in which numbers are represented digitally. Engineers are looking at every possible way to save computation time and energy, including shortening the number of bits used to represent data. But what works for AI doesn’t necessarily work for scientific computing, be it for computational physics, biology, fluid dynamics, or engineering simulations. IEEE Spectrum spoke […]
- AI for Cybersecurity: Promise, Practice, and Pitfalls
AI is revolutionizing the cybersecurity landscape. From accelerating threat detection to enabling real-time automated responses, artificial intelligence is reshaping how organizations defend against increasingly sophisticated attacks.But with these advancements come new and complex risks—AI systems themselves can be exploited, manipulated, or biased, creating fresh vulnerabilities. In this session, we’ll explore how AI is […]
