There are organizations who have a social media strategy, and then there are organizations who have built social media into their strategy. These startups have taken a long hard look under the hood of the social scene and come up with inventive and exciting ideas on how to harness it, use it and even disrupt it completely.

IT industry analysts are typically gung-ho about the potential of the Internet of Things to transform business and society, with lofty predictions of exponential growth.

The majority of the tasks that you will find yourself performing on a computer will usually involve files. Whether it be creating, moving, copying, editing or deleting files, ultimately files will be involved somewhere.  

Not so much the nerd in the corner as the ace in the hole, a bona fide games developer can bring a wealth of talent, experience and agility to any software development environment. We list eight ways they can enhance any business involved in software creation and distribution:

Servers generally log a great deal of information about what they are doing, what applications are running and other system management activities. One set of logging in particular is performed by dmesg, or driver messages. If you’ve ever watched a Linux system boot up without a splash screen and wondered what all the text that scrolled up the screen too fast to see was, those were the messages that were logged to dmes


Previously, in our Hosting 101 series, we looked at using Nginx as a replacement web server for Apache in a LAMP stack for web hosting. At the end of our last article we had Nginx configured, but only able to serve static files such as HTML files and images. In this article, we are going to look at the changes needed to configure PHP and Nginx to work together in order to serve dynamic content to your users.

Informative Monday mornings with 100TB’s Technology News Roundup: Google skips three generations of Moore’s Law; Blockchain keeps data safe; EU adopts cybersecurity rules; Amazon open sources DSSTNE; Yubiko accused of security through obscurity.

IT departments used to call their colleagues in other functions ‘end users’. Now they more typically refer to them as ‘customers’ (or sometimes ‘internal customers’, to differentiate them from the organization’s real customers).