The First Cry of Atom
  • About Me
Navigation bar avatar

The First Cry of Atom

  • Inspect Presto connection with Charles

    Posted on July 25, 2019

    Seeing the unseen is the fundamental principle in debugging for software. The exchange of data between processes through the network is not visible literally. We often encountered the case when we need to inspect the data transmitted between multiple processes for debugging. [Read More]
    Tags:
    • Presto
    • SSL
    • TLS
    • Procotol
  • Bitshift to 64 bit in Java

    Posted on May 11, 2019

    Bitwise operation sometimes looks like magic. There is a bunch of sophisticated techniques to manipulate the value at the bit level. Bit shift operation is one of these operations. You can shift the bit sequence of the given value by using shift operators which are commonly described as >> or... [Read More]
    Tags:
    • Java
    • Programming
    • Algorithm
  • How to construct LL(1) grammar of arithmetic operations

    Posted on May 3, 2019

    While I read a compiler book, I have struggled to understand the reason why the arithmetic operations are expressed as follows. [Read More]
    Tags:
    • Compiler
    • Programming
    • C
    • ComputerScience
    • Language
  • Idempotency key in the Stripe Ruby SDK

    Posted on April 30, 2019

    A system may fail anytime even while doing something should not fail. The common pattern to recover that sort of failure is retrying. While retrying is simple, it’s a powerful way to make a system reliable and worth considering. Actually, many operations across the network which can fail temporarily are... [Read More]
    Tags:
    • Ruby
    • Stripe
    • Idempotency
    • SDK
    • DistributedSystem
  • Protect Your Application by AWS WAF

    Posted on April 27, 2019

    Have you ever heard about WAF before? You may but no, it’s not web application FRAMEWORK I’m going to talk about today. It’s web application FIREWALL. You may have a time when you struggle to deal with many accesses from scrapers or attackers to your web application. These requests look... [Read More]
    Tags:
    • AWS
    • Application
    • Security
    • Application
  • ← Newer Posts
  • Older Posts →
  • Email me
  • RSS
  • GitHub
  • Twitter

Kai Sasaki  •  2024  •  www.lewuathe.com

Powered by Beautiful Jekyll