Open in app

Sign In

Write

Sign In

Kenneth Reilly
Kenneth Reilly

1.6K Followers

Home

About

Published in

ITNEXT

·Pinned

Building a Social Network: Part III

Creating a REST API Framework with Dart and PostgreSQL — Introduction This article expands on Part I and Part II of this series (covering schema, security, and type definitions) with the creation of a REST API framework that will facilitate development of REST endpoints. The framework is designed to reduce boilerplate code, allow for ease of maintenance and feature development, and…

Dart

5 min read

Building a Social Network — Part III
Building a Social Network — Part III
Dart

5 min read


Published in

ITNEXT

·Pinned

Building a Beat Machine in Flutter

How to build a beat machine with sequencer in Dart / Flutter — Introduction Flutter has been rising in popularity since the initial release of 1.0 back in late 2018. As companies and entrepreneurs struggle to keep development costs low, the search continues for better and more efficient ways to build mobile apps and cross-platform software in general. …

Flutter

7 min read

Building a Beat Machine in Flutter
Building a Beat Machine in Flutter
Flutter

7 min read


Published in

ITNEXT

·Pinned

Building a Social Network: Part I

Defining concepts, models, and security in PostgreSQL — Introduction Social networks have become a part of daily life for many people around the world today. In this article, we will check out the first step in the design of a very basic social network: creating the database schema. A social network is a perfect use case for bottom-up design…

Programming

4 min read

Building a Social Network — Part I
Building a Social Network — Part I
Programming

4 min read


1 day ago

Building Success Habits Today

How to start changing your habits and mindset now — What does it mean to be successful? That’s a question that can be answered in many ways by many people. Truly, it means something different for each of us, but one thing remains the same: overcoming obstacles and challenges by learning how to think in terms of the outcome that…

Success

5 min read

Building Success Habits Today
Building Success Habits Today
Success

5 min read


2 days ago

Escaping Toxic Corporate Culture

Why getting away from toxic mindsets is important for success — Life in the 21st century is often seen as the pinnacle of civilization. We have self-driving cars, computers that talk, and the world’s information always available on a whim. Is this really true, or does society on Earth have a long way to go to reach stability? Where I live…

Work Life Balance

6 min read

Escaping Toxic Corporate Culture
Escaping Toxic Corporate Culture
Work Life Balance

6 min read


Published in

ITNEXT

·Sep 15

Build a Server in Node From Scratch

Building a dependency-free Node and WebSocket app server — Introduction This article walks the reader through the process of building a simple web server with example client from scratch using Node, TypeScript, the WebSocket protocol, and basic elements of OOP and FP. Overview While there are many libraries that can assist the developer with building client-server application with TypeScript and Node…

Programming

4 min read

Build a Server in Node From Scratch
Build a Server in Node From Scratch
Programming

4 min read


Published in

FAUN — Developer Community 🐾

·Sep 7

What is a Memory Safe Language?

An introduction to memory safety in cybersecurity — Introduction A common topic in cybersecurity is memory safety, which is the prevention of unauthorized access or undefined behavior caused by reading from areas of memory that should really be protected. Microsoft reported in 2019 that 70% of their security patches for the previous 12 years were related to memory safety…

Cybersecurity

3 min read

What is a Memory Safe Language?
What is a Memory Safe Language?
Cybersecurity

3 min read


Jul 20

What is Neurosecurity?

An Introduction to Security of the Mind — Introduction Neurosecurity is a field of study and practice which involves the securing of neural devices — including the brain itself — from tampering or invasion of privacy by external actors or forces. The advent of brain-computer interfaces has increased the attention on the security of brain-connected hardware, exposing risks such…

Neurosecurity

3 min read

What is Neurosecurity?
What is Neurosecurity?
Neurosecurity

3 min read


Jul 7

What is Parental Alienation?

Understanding the Dynamics of Parental Alienation Syndrome — Introduction What exactly is parental alienation? Referencing Psychology Today, we find the definition: Parental alienation occurs when a child refuses to have a relationship with a parent due to manipulation, such as the conveying of exaggerated or false information, by the other parent. This summarizes the consequences of parental alienation well…

Parental Alienation

8 min read

What is Parental Alienation?
What is Parental Alienation?
Parental Alienation

8 min read


May 27

Common Risks within AI and ML

Artificial Intelligence through the Lens of Cybersecurity — Introduction While many advancements in the modern age are simply improvements over basic processes (like cooking or keeping your home warm and safe), some of them have brought about radical changes in our daily work and family lives, especially in areas such as production and communication. Few technologies are likely as…

Security

4 min read

Common Risks within AI and ML
Common Risks within AI and ML
Security

4 min read

Kenneth Reilly

Kenneth Reilly

1.6K Followers

Hyperdyne 💫

Following
  • Etelligens Technologies

    Etelligens Technologies

  • James Garside

    James Garside

  • Dr. ADAM TABRIZ

    Dr. ADAM TABRIZ

  • Scott Galloway

    Scott Galloway

  • The Secret Developer

    The Secret Developer

See all (1,666)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams