Expert Contributors Articles

Sorted By: Most Recent
Alex Vakulov Alex Vakulov
Updated on May 07, 2024

How to Use Nmap to Scan for Open Ports

This article explains the process of using Nmap for port scanning, an essential cybersecurity skill for identifying open ports and potential vulnerabilities on network hosts.

Image: Shutterstock / Built In
Anna Niess Anna Niess
Updated on May 07, 2024

6 Ways to Reintroduce Joy Into Your B2B Software

It’s no secret that work tech can get boring quickly. Here’s how to design products that make your users excited to accomplish their tasks.

Image: Shutterstock / Built In
Richmond Alake Richmond Alake
Updated on May 07, 2024

How to Build Your Own RAG System With LlamaIndex and MongoDB

Retrieval augmented generation systems improve LLM responses by extracting semantically relevant information from a database to add context to the user input. Here’s how to build your own.

Image: Shutterstock / Built In
Cliff Jurkiewicz and Mike Zarro Cliff Jurkiewicz and Mike Zarro
Updated on May 06, 2024

3 Reasons to Use Systems Mapping for Your IT Ecosystem

Don’t know what you don’t know? Map out everything that makes up your organization — and then take action to make it even better.

Image: Shutterstock / Built In
Hailley Griffis Hailley Griffis
Updated on May 03, 2024

Hybrid Work Schedule: What It Is, Examples and How to Implement

A hybrid work schedule may be the best way for companies to go about office spaces, but it can also present challenges for businesses to confront.

Image: Shutterstock / Built In
Anais Osipova Anais Osipova
Updated on May 03, 2024

How Robo-Advisors Can Help You Manage Your Wealth

Fintech is simplifying the complex world of investing. Could robo-adivsors be the right choice for handling your finances?

Image: Shutterstock / Built In
Sara A. Metwalli Sara A. Metwalli
Updated on May 02, 2024

What Is Superposition?

Superposition describes a quantum system’s ability to be in multiple states at the same time until it is measured.

Image: Shutterstock / Built In
Bhavesh Rawat Bhavesh Rawat
Updated on May 02, 2024

Meta Charset UTF 8 in HTML Explained

Meta charset=“utf-8” is an HTML tag that makes it possible to use emojis and other characters outside of the ASCII character set on your webpage. Here’s how it works.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is SQL Injection?

SQL injection is a type of cyberattack that lets a criminal execute their own SQL queries on a database. Here are some examples.

Image: Shutterstock / Built In
Zak Edwards Zak Edwards
Updated on May 02, 2024

What Is Smishing?

Smishing is when an attacker uses text messages to trick victims into giving up money, personal information or installing malware. Here’s how you can protect yourself.

Image: Shutterstock / Built In