Expert Contributors Articles

Sorted By: Most Recent
Christoph Senn & Mehak Gandhi Christoph Senn & Mehak Gandhi
Updated on November 20, 2024

Why It’s Time to Ditch the Product-Centric Mindset 

A product-centric mindset may help drive innovation, but it can also end up creating a disconnect between buyers and the product. Here’s why it’s time to try a customer-centric approach.

Image: Shutterstock / Built In
Jordan Gal Jordan Gal
Updated on November 20, 2024

Why Creativity Is the Key to a Successful Workplace

Providing opportunities for employees to be creative can build emotional intelligence and psychological safety, two critical traits for navigating times of economic uncertainty. 

Image: Shutterstock / Built In
Sanskar Wagavkar Sanskar Wagavkar
Updated on November 20, 2024

Introduction to the Correlation Matrix

A correlation matrix is a matrix that shows the correlation between variables. It gives the correlation between all the possible pairs of values in a matrix format.

Image: Shutterstock / Built In
Akshay Kumar Akshay Kumar
Updated on November 20, 2024

A Guide to Callback Functions in JavaScript

A callback function in JavaScript is a function that’s called after the first function has completed its task. Learn more about how they’re used and when to use them.

Image: Shutterstock / Built In
Sharon Harrison Sharon Harrison
Updated on November 20, 2024

How to Navigate Leadership as a Woman in Tech

In tech, women leaders face unique challenges. Here are four tips for overcoming them.

Image: Shutterstock / Built In
T.K. Keanini T.K. Keanini
Updated on November 19, 2024

Cybersecurity Tools Are Too Complicated. Here’s Why That’s a Problem.

There’s a growing gap in the cybersecurity market as tools become too complex and expensive for smaller businesses to implement. Here’s how to solve it. 

Image: Shutterstock / Built In
Nenad Zaric Nenad Zaric
Updated on November 19, 2024

How to Prepare Your Engineers for the Wave of Incoming AI-Powered Cyberattacks

AI has given threat actors more options for attacking your systems than ever before. Fortunately, it’s not too late to prepare your engineers for meeting these challenges head-on.

Image: Shutterstock / Built In
Scott Wheeler Scott Wheeler
Updated on November 19, 2024

Automations Are Great, But Cloud Security Still Requires Hard Work

These seven cloud security best practices are most effective when handled by humans.

Image: Shutterstock / Built In
Cliff Jurkiewicz Cliff Jurkiewicz
Updated on November 19, 2024

After Gov. Newsom’s Veto, Is an AI Law in California Still Possible?

The AI safety bill, which California Governor Gavin Newson vetoed, failed to solve the serious problems AI brings. Here’s what he needs to do now.

Image: Shutterstock / Built In
Mohamed Khey Mohamed Khey
Updated on November 19, 2024

How to Connect to SSH Without a Password

Secure shell protocol (SSH) enables secure data connection and remote command execution. Here’s how to configure SSH for passwordless logins.

Image: Shutterstock / Built In