NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-
HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- What’s new in Copilot Studio: May 2025
In this edition of our monthly roundup, we’re recapping the biggest news from Microsoft Build 2025 and announcing new resources for Copilot Studio adoption and training. The post What’s new in […]
- Researcher and Analyst are now generally available in Microsoft 365 Copilot
We’re excited to announce the general availability of Researcher and Analyst, two first-of-their-kind reasoning agents designed specifically for work. The post Researcher and Analyst are now […]
APPLE NEWS
- Apple Joins Threads
Apple appears to have joined Meta-owned social media site Threads, two years after Threads first launched. Apple has a verified Threads profile and the @apple handle, but has yet to make any posts. Apple’s account has 4.8 million followers, because of its existing followers on Instagram. It’s not clear why Apple has opted to make a Threads account, and there’s no word on whether it will actually see use. Apple also has […]
- iOS 26: New Lock Screen Features
When you’re not using your iPhone, the Lock Screen is what you see most often. Liquid Glass is everywhere in iOS 26, and it starts right when you pick up your device. The Lock Screen got a Liquid Glass overhaul, plus a few other new features. Here’s what you’ll see first when you upgrade to iOS 26. Liquid Glass The two customizable control buttons on the Lock Screen are larger and have a floating, glass-like […]
DELL NEWS
- Shaping the Future with AI: Dell’s Vision in Action
Discover how Dell Technologies is driving AI innovation in government, energy and education to empower a brighter future.
- Secure the Future with Dell Commercial AI PCs
Security is in Dell’s DNA. Learn how we set the benchmark for AI PC design with adaptive security.
HP NEWS
- Hewlett Packard Enterprise closes acquisition of Juniper Networks to offer industry-leading comprehensive, cloud-native, AI-driven portfolio
HOUSTON – July 2, 2025 – HPE (NYSE: HPE) today announced the successful completion of its previously announced acquisition of Juniper Networks, Inc., a leader in AI-native networks. The combination positions HPE to capture the growing AI and hybrid cloud market opportunity by creating an industry-leading cloud-native and AI-driven IT portfolio, including a full, modern networking stack. The transaction doubles the size of […]
- Changing the game for customers: HPE’s acquisition of Juniper Networks offers compelling network alternative
I am thrilled to announce the successful close of HPE’s acquisition of Juniper Networks, creating a powerful combination of two best-in-class networking portfolios. Together, we will now deliver a truly comprehensive cloud-native IT portfolio supported by agentic AI operations – including a modern, secure and AI-native network – that delivers on the promise of hybrid cloud and AI. Networking’s role as the connective […]
IT SECURITY NEWS
- North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics. “Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,”
- That Network Traffic Looks Legit, But it Could be Hiding a Serious Threat
With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s legitimate traffic and what is potentially dangerous? Where do you turn when firewalls and endpoint detection and response (EDR) fall short at detecting the most important threats to your organization? Breaches at edge devices and VPN gateways have risen from 3% to 22%, according to
AI NEWS
- LLM Benchmarking Shows Capabilities Doubling Every 7 Months
The main purpose of many large language models (LLMs) is providing compelling text that’s as close as possible to being indistinguishable from human writing. And therein lies a major reason why it’s so hard to gauge the relative performance of LLMs using traditional benchmarks: Quality of writing doesn’t necessarily correlate with metrics traditionally used to measure processor performance, such as instruction execution […]
- Transform Complexity into Opportunity with Digital Engineering
In a literal sense, digital engineering is as old as the first back-of-the-napkin sketch that was shoved in a pocket before being modeled in a computer-aided design program. Those pencil marks became data points, and they were soon joined by millions more as product complexity exploded. We’re now awash in engineering data coming from all corners of the enterprise, as well as from partners, suppliers, and vendors. Product […]