Expert Contributors Articles

Sorted By: Most Recent
Ankit Malik Ankit Malik
Updated on August 09, 2024

Pascal Case vs. Camel Case Explained

Pascal case and camel case are two different casing styles used in programming for naming variables, class and type names. Learn the differences and other casing styles. 

Image: Shutterstock / Built In
Trung Thanh Le Trung Thanh Le
Updated on August 09, 2024

How to Kill a Process in Linux

When errors occur in Linux or the system misbehaves, it’s important to understand the various ways to kill processes — here’s how to do it from the Linux command line.

Image: Shutterstock / Built In
Lawrence Snapp Lawrence Snapp
Updated on August 09, 2024

What Do People Want in a Mobile App?

Consumers increasingly want an app to interact with your brand. Our expert explains what they’re looking for from that experience.

Image: Shutterstock / Built In
Mohammad-Ali A’RÂBI Mohammad-Ali A’RÂBI
Updated on August 08, 2024

How to Exit Vim: A Beginner’s Guide

Vim is a powerful text editor that can be difficult to exit once it’s been opened. Learn different techniques to save your work or just exit the text editor. 

Image: Shutterstock / Built In
Peter Evans Peter Evans
Updated on August 08, 2024

Why Google’s Programming Language Is Worth Your Time

Despite initial skepticism, Built In CTO Peter Evans has learned to love Go’s greatest virtue: simplicity.

Joshua Summers Joshua Summers
Updated on August 08, 2024

I’ve Exited 3 Companies. Here Are the Mistakes I’m Avoiding for My 4th Startup.

Our expert explores pitfalls he’s fallen into with his past startups and how you can steer clear of them.

Image: Shutterstock / Built In
Joe Procopio Joe Procopio
Updated on August 08, 2024

Agile Gave Us Tech Bloat. Now What Should We Do?

Somewhere along the way, the process became way more important than the product.

Image: Shutterstock / Built In
Shrav Mehta Shrav Mehta
Updated on August 08, 2024

8 Ways to Protect Your Company Against Ransomware Right Now

Cyber attacks are on the rise and only getting more sophisticated thanks to AI. But there are steps you can take to defend your company against ransomware attacks. Here’s how.

Image: Shutterstock / Built In
K. Jagathish K. Jagathish
Updated on August 08, 2024

grep Command in Linux and Unix: A Tutorial

The grep command is a tool in Linux and Unix that’s used to search for specific text within files, such as words, phrases or patterns. Learn the code.

Image: Shutterstock / Built In
Anmolika Singh Anmolika Singh
Updated on August 08, 2024

Guide to Power Analysis and Statistical Power

Power analysis is a process that involves evaluating a test’s statistical power to determine the necessary sample size for a hypothesis test. Learn more.

Image: Shutterstock / Built In