Expert Contributors Articles

Sorted By: Most Recent
Mrinal Tyagi Mrinal Tyagi
Updated on April 02, 2024

Histogram of Oriented Gradients: An Overview

Histogram of oriented gradients (HOG) is a feature descriptor used in computer vision and image processing for object detection. Learn how it works.

Image: Shutterstock / Built In
Brennan Nevada Johnson Brennan Nevada Johnson
Updated on April 02, 2024

Black Women, Here’s What You Must Do to Get to the Top

Our expert talked to five successful Black women to get their advice on careers. Here’s what they said.

Image: Shutterstock / Built In
K. Jagathish K. Jagathish
Updated on April 01, 2024

How to Use URLSearchParams in JavaScript

URLSearchParams is a JavaScript API that allows users to retrieve and work with data in the URL query parameters. Learn how to use it.

Image: Shutterstock / Built In
Yashant Bikram Gyawali Yashant Bikram Gyawali
Updated on April 01, 2024

What Is Neumorphism and Why Should Designers Care?

Is neumorphism still a thing? Here are the origins and limitations of this widespread design trend.

Image: Shutterstock / Built In
Leyinska Soto Leyinska Soto
Updated on April 01, 2024

What Is Intercultural Competence?

As companies expand globally and diversify their workforces, intercultural competence becomes a must-have for employees.

Image: Shutterstock / Built In
Lukas Oppermann Lukas Oppermann
Updated on April 01, 2024

The Gestalt Principle of Proximity for Designers, Explained

Including illustrated examples of the proximity principle in action.

Young Entrepreneur Council Young Entrepreneur Council
Updated on April 01, 2024

14 Qualities of Excellent Advertising Copy — and How to Write It

Members of Young Entrepreneur Council share their insights on what makes effective ad copy.

Image: Shutterstock / Built In
Vanessa Gennarelli Vanessa Gennarelli
Updated on April 01, 2024

What to Do If the Company You Work For Is Acquired

View it as an opportunity and prepare for some degree of change.

Image: Shutterstock / Built In
Shree Mijarguttu Shree Mijarguttu
Updated on April 01, 2024

Top Security Risks of Cloud Computing

Cloud computing’s widespread adoption by businesses in recent years makes it a tempting target for cyberattackers. Our expert details some of the top risks you need to know and how to stay safe.

Image: Shutterstock / Built In
Young Entrepreneur Council Young Entrepreneur Council
Updated on April 01, 2024

14 Major Tech Issues — and the Innovations That Will Resolve Them

Members of the Young Entrepreneur Council discuss some of the past year’s most pressing technology concerns and how we should address them.