NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-

HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- Powering Frontier Transformation with Copilot and agents
Wave 3 marks a new version of Microsoft 365 Copilot, moving beyond assistance to embedded agentic capabilities. The post Powering Frontier Transformation with Copilot and agents appeared first on […]
- Copilot Cowork: A new way of getting work done
We’re excited to announce Copilot Cowork, the execution layer for Microsoft 365—delegate tasks, coordinate workflows, and stay in control. The post Copilot Cowork: A new way of getting work done […]
APPLE NEWS
- Perplexity Can Now Access Your Apple Health Data to Answer Medical Questions
AI company Perplexity today introduced Perplexity Health, a suite of connectors that allow Perplexity to access your health data. Perplexity suggests that the feature is useful for aggregating health data from across different portals, apps, and devices. It is able to track metrics and trends over time across biomarkers, with information shown on a personalized dashboard. When asked a health-related question, […]
- Hermès Now Sells $1,250+ MagSafe Chargers Wrapped in Calfskin Leather
Luxury brand Hermès has a new series of MagSafe-compatible chargers for the iPhone and Apple Watch, with prices that are higher than the cost of an iPhone 17 Pro Max. The $1,250 Paddock Solo Charger is a magnetic charger that works with a single device, while the $1,750 Paddock Duo can charge an Apple Watch and iPhone at the same time. The $1,750 Paddock Yoyo is also a dual charger, but it has a USB-C cable that wraps […]
DELL NEWS
- Professional vs. Consumer GPUs: The Card for Your Workflow
Everything you need to know about what professional and consumer GPUs deliver for CAD, DCC, local AI, and your most common workflows.
- Cut costs, not performance with single-socket PowerEdge
Discover how to cut IT costs and complexity with single-socket Dell PowerEdge built for small teams under big pressure.
HP NEWS
- HPE transforms distributed AI factories into intelligent AI grid powered by NVIDIA
SAN JOSE, Calif. – NVIDIA GTC 2026 – March 17, 2026 – HPE (NYSE: HPE) today announced the HPE AI Grid, an end-to-end solution built on the NVIDIA reference architecture to securely connect AI factories and distributed inference clusters across regional and far‑edge sites. The HPE AI Grid enables service providers to deploy and operate thousands of distributed inference sites, turning AI installations into a single […]
- HPE Threat Labs report reveals cyber adversaries are morphing their business model to scale and accelerate attacks
HOUSTON – March 17, 2026 – HPE (NYSE: HPE) today unveiled the results of its inaugural cyberthreat research report, In the Wild, showing a striking shift in how modern cyber adversaries operate at scale across global industries and critical public sectors. Based on HPE’s analysis of live threat activity observed globally throughout 2025, the report shows that cybercrime has gone industrial, with attackers using […]
IT SECURITY NEWS
- Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
Cybersecurity researchers have flagged a new malware dubbed Speagle that hijacks the functionality and infrastructure of a legitimate program called Cobra DocGuard. “Speagle is designed to surreptitiously harvest sensitive information from infected computers and transmit it to a Cobra DocGuard server that has been compromised by the attackers, masking the data exfiltration process as legitimate
- 54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 34 vulnerable drivers. EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security software before deploying file-encrypting malware. This
AI NEWS
- Startups Bring Optical Metamaterials to AI Data Centers
Light-warping physics made “invisibility cloaks” a possibility. Now two startups hope to harness the science underlying this advance to boost the bandwidth of data centers and speed artificial intelligence.Roughly 20 years ago, scientists developed the first structures capable of curving light around objects to conceal them. These are composed of optical metamaterials—materials with structures smaller than the […]
- How Your Virtual Twin Could One Day Save Your Life
One morning in May 2019, a cardiac surgeon stepped into the operating room at Boston Children’s Hospital more prepared than ever before to perform a high-risk procedure to rebuild a child’s heart. The surgeon was experienced, but he had an additional advantage: He had already performed the procedure on this child dozens of times—virtually. He knew exactly what to do before the first cut was made. Even more important, he […]
