Expert Contributors Articles

Sorted By: Most Recent
Rob Chamberlin Rob Chamberlin
Updated on December 06, 2024

Why Physical Security Is Still Critical for Tech Companies

Physical security breaches can be just as costly as cyberattacks. Follow these steps to mitigate the risks and protect your data.

Image: Shutterstock / Built In
Chris Stephenson Chris Stephenson
Updated on December 06, 2024

Why AI Explorers Are the Next Critical Hire for Your Business

AI integrations often stall because there isn’t a clear use case for the tool. Hiring a multidisciplinary team of AI explorers can change that. Here’s how.

Image: Shutterstock / Built In
William Baptist William Baptist
Updated on December 06, 2024

How to Create a VPN for Free

A virtual private network (VPN) is a privacy tool that disguises user IP addresses and encrypts their browsing data. Learn how to build your own.

Image: Shutterstock / Built In
Cliff Jurkiewicz Cliff Jurkiewicz
Updated on December 06, 2024

3 Tech Predictions You Can Actually Measure

Most predictions don’t pan out because they’re not quantifiable. These three things are.

Image: Shutterstock / Built In
Reza Lavarian Reza Lavarian
Updated on December 05, 2024

Error: Cannot Find Module in Node Solved

Error: cannot find module most commonly occurs when a non-existent module is attempting to be loaded in Node. Here’s how to fix it.

Image: Shutterstock / Built In
Richmond Alake Richmond Alake
Updated on December 05, 2024

Heap Sort, Explained

Heap sort is a sorting algorithm that organizes elements in an array into a binary heap, and then sorts that heap by moving the largest element in the array. Here’s how to implement it in Python.

Image: Shutterstock / Built In
Tomas Sirio Tomas Sirio
Updated on December 05, 2024

How to Write Hello World! in ASM

Assembler (ASM) is a program that converts code into machine language. Learn how to use ASM to write Hello World! in x86_64. 

Image: Shutterstock / Built In
Kausik Chaudhuri Kausik Chaudhuri
Updated on December 05, 2024

6 Ways AI Can Supercharge IT Service Management

AI technology can add tremendous efficiency to ITSM processes, leading to better user experiences. Here’s how.

Image: Shutterstock / Built In
Emily Crose Emily Crose
Updated on December 05, 2024

4 Defining Characteristics of a Hacker

Why do hackers do it? Here’s a look at some of the core personality traits hackers tend to share.

Image: Shutterstock / Built In
Joe Procopio Joe Procopio
Updated on December 05, 2024

4 Massive Minimum Viable Product Mistakes You’re Inevitably Going to Make

You can’t stop these mistakes from blowing up your MVP, but you can contain them.

Image: Shutterstock / Built In