NEWS | LATEST SOLUTIONS
METHOD LATEST NEWS
-

HAPPY BIRTHDAY TO US as we just turned 20 in Japan, and THANK YOU to all METHOD CREW AND CLIENTS
EST Nov 2004
CISCO MERAKI NEWS
- Build Physical Security Superpowers with Smart Bullet Cameras and Multi-Imagers
Physical security breaches are of top concern for CSOs. Protecting your organization requires an approach as proactive and advanced as cybersecurity. But with the latest smart cameras, it doesn’t […]
- Cisco Meraki for Government Achieves FedRAMP® Moderate Authorization
Cisco Meraki is excited to announce that we have achieved FedRAMP® Moderate and StateRAMP® Moderate Authorization. Built on our reliable and scalable Cisco Meraki cloud networking platform, trusted […]
MICROSOFT 365 NEWS AND ROADMAP
- Bring your everyday business apps into the flow of work with agents in Microsoft 365 Copilot
Microsoft 365 Copilot can now bring your go-to apps directly into the conversation, which closes the gap between AI-powered insight and real, in-app action. The post Bring your everyday business […]
- New and improved: Multi-agent orchestration, connected experiences, and faster prompt iteration
Learn what’s new in Copilot Studio: Multi-agent systems are now generally available, plus recent updates to the Prompt Editor and governance controls. The post New and improved: Multi-agent […]
APPLE NEWS
- iOS 26.4.2 Patches Flaw That Let FBI Extract Deleted Signal Messages
The iOS 26.4.2, iPadOS 26.4.2, iOS 18.7.8, and iPadOS 18.7.8 updates that Apple released today address a security vulnerability that the FBI recently used to extract Signal message previews from an iPhone even after the app was deleted. A flaw with notification services allowed notifications that were supposed to be deleted to be retained on an iPhone or iPad. Apple says it fixed the logging issue with improved data […]
- Google Confirms Gemini-Powered Siri Coming Later This Year
Google today commented on its partnership with Apple, confirming that Gemini will power a new, more personalized version of Siri that’s set to be released later in 2026. Google Cloud chief Thomas Kurian mentioned the Apple partnership during Google Cloud Next 2026, a conference that’s taking place in Las Vegas, Nevada today. Earlier this year, we announced a monumental partnership with one of the most iconic brands that […]
DELL NEWS
- When Every Millisecond Is a Business Decision: How ZyBiSys Built Infrastructure That Never Blinks
ZyBiSys built an end-to-end Dell infrastructure to deliver 99.99% uptime for real-time trading—across six data centers, AI-ready.
- Dell Private Cloud with PowerStore: The Smartest Way to Run VMware
How you run VCF matters. See why Dell Private Cloud with PowerStore is the easiest, and most efficient way to run VMware.
HP NEWS
- Southern Sun rises with self-driving SD-WAN, wired and wireless networks from HPE
Johannesburg, South Africa – April 22, 2026 – HPE (NYSE: HPE) today announced that Southern Sun, one of South Africa’s leading hospitality groups is elevating guest experiences and operational efficiencies by modernizing its network infrastructure with the HPE self-driving network. Built on an AI-native, cloud-native network architecture with integral security, the intelligent network delivers exceptional wireless […]
- The elephant in the server room: The overlooked energy cost of mainstream compute
If you only followed the headlines, you’d think AI is about to single-handedly crash the power grid with its ravenous energy appetite. However, scrutinizing the numbers actually reveals a surprising reality: the lion’s share of the current and near-term future data center energy use isn’t from AI at all. It’s from everything else; the so-called “mainstream IT” found in corporate IT estates, colocation data […]
IT SECURITY NEWS
- Malicious KICS Docker Images and VS Code Extensions Hit Checkmarx Supply Chain
Cybersecurity researchers have warned of malicious images pushed to the official “checkmarx/kics” Docker Hub repository. In an alert published today, software supply chain security company Socket revealed that unknown threat actors managed to have overwritten existing tags, including v2.1.20 and alpine, while also introducing a new v2.1.21 tag that does not correspond to an official release. The
- Self-Propagating Supply Chain Worm Hijacks npm Packages to Steal Developer Tokens
Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen developer npm tokens. The supply chain worm has been detected by both Socket and StepSecurity, with the companies tracking the activity under the name CanisterSprawl owing to the use of an ICP canister to exfiltrate the stolen data
AI NEWS
- AI Agent Designs a RISC-V CPU Core From Scratch
In 2020, researchers fine-tuned a GPT-2 model to design fragments of logic circuits; in 2023, researchers used GPT-4 to help design an 8-bit processor with a novel instruction set; by 2024, a variety of LLMs could design and test chips with basic functionality, like dice rolls (though often these were flawed).Now Verkor.io, an AI chip design startup, claims a bigger milestone: a RISC-V CPU core designed entirely by an agentic […]
- Optical Fiber Networks Can Keep Rail Networks Safe
This article is part of our exclusive IEEE Journal Watch series in partnership with IEEE Xplore. Rail networks are vast, which makes it difficult to conduct comprehensive, continuous safety monitoring. Researchers in China have suggested analyzing the vibrations of existing fiber cables buried underground alongside railway tracks to detect problems. In a study published 5 March in the Journal of Optical Communications and […]
