NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-

HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- Microsoft offers in-country data processing to 15 countries to strengthen sovereign controls for Microsoft 365 Copilot
Microsoft is pleased to announce that we are making in-country data processing for customers’ Microsoft 365 Copilot interactions available in 15 countries around the world. The post […]
- Microsoft 365 Copilot now enables you to build apps and workflows
We’re bringing AI-powered building to employees across the organization, with new Frontier agents for Microsoft 365 Copilot customers: App Builder and Workflows. The post Microsoft 365 Copilot now […]
APPLE NEWS
- What’s New With Multitasking in iPadOS 26.2
With the third beta of iPadOS 26.2 that came out yesterday, Apple made some useful updates to the way that multitasking works on the iPad. Subscribe to the MacRumors YouTube channel for more videos. iPadOS 26.1 brought back Slide Over, one of the main multitasking views from iPadOS 18 that was removed in iPadOS 26. In iPadOS 26.2, Slide Over works more like it did before, and there are also useful new options for […]
- Apple Releases New Firmware for 140W USB-C Power Adapter, Magic Keyboard and Magic Trackpad
Apple today released updated firmware for several accessories, including the 140W USB-C Power Adapter, the Magic Trackpad 2, the Magic Trackpad USB-C, the Magic Keyboard with Touch ID, and the Magic Keyboard with Touch ID and Numeric Keypad. There is no word on what’s included in the updated firmware at this time, but it could offer performance improvements and security updates. Accessory firmware updates are […]
DELL NEWS
- The Augmented Advisor: How Dell and Cohere are Powering an AI Co-Pilot for Wealth Management
Automate data tasks and free wealth managers to focus on clients and deliver strategic guidance with the Augmented Advisor.
- Built for Breakthroughs: Dell PowerScale for Microsoft Azure
Don’t compromise between on-premises control and cloud agility.
HP NEWS
- Strengthening supply chain security to meet evolving global cybersecurity standards for our customers and partners
In today’s digital-first world, trust and security remain critical to every organization. At HPE, we recognize that our customers and partners rely on us not only for cutting-edge technology but also for the assurance that our solutions are secure, compliant, and resilient. As global cybersecurity regulations evolve—particularly with the introduction of the European Union’s Cyber Resilience Act (CRA)—HPE is advancing […]
- Three HPE-built exascale systems sweep list of world’s fastest for the third time, reconfirming HPE’s supercomputing leadership
The world’s three fastest exascale supercomputers were built and delivered by HPE according to the recent TOP500 list, reflecting HPE’s global leadership in delivering high performance computing (HPC) systems built for the artificial intelligence (AI) era. HPE also continues to deliver industry-leading power efficiency with innovative direct liquid-cooling featured in 10 of the world’s top 20 most energy-efficient […]
IT SECURITY NEWS
- Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar
The malware authors associated with a Phishing-as-a-Service (PhaaS) kit known as Sneaky 2FA have incorporated Browser-in-the-Browser (BitB) functionality into their arsenal, underscoring the continued evolution of such offerings and further making it easier for less-skilled threat actors to mount attacks at scale. Push Security, in a report shared with The Hacker News, said it observed the use
- Meta Expands WhatsApp Security Research with New Proxy Tool and $4M in Bounties This Year
Meta on Tuesday said it has made available a tool called WhatsApp Research Proxy to some of its long-time bug bounty researchers to help improve the program and more effectively research the messaging platform’s network protocol. The idea is to make it easier to delve into WhatsApp-specific technologies as the application continues to be a lucrative attack surface for state-sponsored actors and
AI NEWS
- Microfluidics Could Be the Answer to Cooling AI Chips
Data center rack density has risen rapidly in recent years. Operators are cramming more computing power into each server rack to meet the needs of AI and other high-performance computing applications. That means that each rack needs more kilowatts of energy, and ultimately generates more heat. Cooling infrastructure has struggled to keep pace.“Rack densities have gone from an average of 6 kilowatts per rack eight years ago […]
- Your Laptop Isn’t Ready for LLMs. That’s About to Change
Odds are the PC in your office today isn’t ready to run AI large language models (LLMs).Today, most users interact with LLMs via an online, browser-based interface. The more technically inclined might use an application programming interface or command line interface. In either case, the queries are sent to a data center, where the model is hosted and run. It works well, until it doesn’t; a data-center outage can take a […]
