Architect's Guide
Author

Architect's Guide

Dedicated to sharing programmer-architect skills—Java backend, system, microservice, and distributed architectures—to help you become a senior architect.

629
Articles
0
Likes
1.8k
Views
0
Comments
Recent Articles

Latest from Architect's Guide

100 recent articles max
Architect's Guide
Architect's Guide
Jan 24, 2026 · Fundamentals

Why Our Custom Snowflake ID Generator Failed and How to Fix It

A recent production incident revealed duplicate order IDs caused by a flawed custom Snowflake algorithm; this article reviews the standard Snowflake structure, dissects the custom implementation’s critical mistakes—short timestamp, IP‑based business ID, zeroed worker and data‑center IDs—and offers best‑practice recommendations, including using mature libraries and proper worker‑ID strategies.

ID generationJavaSnowflake
0 likes · 7 min read
Why Our Custom Snowflake ID Generator Failed and How to Fix It
Architect's Guide
Architect's Guide
Jan 22, 2026 · Big Data

Unlock Kafka’s Power: Core Concepts, High‑Performance Architecture & Real‑World Scaling Tips

This comprehensive guide explores Kafka’s core value as a message queue, explains producers, consumers, topics, partitions, and replication, dives into cluster architecture, zero‑copy I/O, resource planning for disks, memory, CPU and network, and provides practical configuration, consumer‑group management, and operational tooling tips for building high‑throughput, highly available Kafka deployments.

KafkaMessage QueuePerformance Tuning
0 likes · 31 min read
Unlock Kafka’s Power: Core Concepts, High‑Performance Architecture & Real‑World Scaling Tips
Architect's Guide
Architect's Guide
Jan 21, 2026 · Backend Development

Designing a High‑Performance Flash Sale System: 7 Key Architecture Strategies

This article outlines a comprehensive backend architecture for flash‑sale (秒杀) systems, covering traffic control, Nginx and CDN setup, gateway rate‑limiting, Redis caching and distributed locks, message‑queue throttling, async order processing, hotspot isolation, and security measures to handle massive concurrent requests.

CaptchaFlash SaleHigh Concurrency
0 likes · 12 min read
Designing a High‑Performance Flash Sale System: 7 Key Architecture Strategies
Architect's Guide
Architect's Guide
Jan 19, 2026 · Artificial Intelligence

Mastering Prompt Engineering: From Blind Prompting to Reliable LLM Solutions

This article explains how to treat prompt engineering as a systematic, experiment‑driven practice—distinguishing it from blind prompting—by defining problems, building demo sets, crafting and testing prompt candidates, evaluating accuracy versus cost, and establishing verification loops for reliable large language model applications.

LLM testingVerificationcost‑accuracy tradeoff
0 likes · 16 min read
Mastering Prompt Engineering: From Blind Prompting to Reliable LLM Solutions
Architect's Guide
Architect's Guide
Jan 17, 2026 · Backend Development

How We Split a 500M‑Row MySQL Table: Lessons and Strategies

Facing a 50‑million‑row financial transaction table that grew 600,000 rows each month, the team designed a sharding solution using sharding‑jdbc, tackled multi‑datasource transaction and pagination challenges, and executed a staged migration that kept the system stable while eliminating MySQL performance bottlenecks.

Paginationdata-migrationsharding
0 likes · 13 min read
How We Split a 500M‑Row MySQL Table: Lessons and Strategies
Architect's Guide
Architect's Guide
Jan 16, 2026 · Databases

How to Safely Update Billions of MySQL Rows Without Overloading Binlog

This article explains why a naïve full‑table UPDATE on massive MySQL tables can cripple replication, explores deep‑pagination and IN‑clause inefficiencies, and presents a batch‑processing strategy using NO_CACHE, FORCE INDEX, and rate‑controlled scripts to perform safe, high‑performance updates.

Batch ProcessingFull Table UpdateMySQL
0 likes · 8 min read
How to Safely Update Billions of MySQL Rows Without Overloading Binlog
Architect's Guide
Architect's Guide
Jan 11, 2026 · Information Security

10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login

This article systematically introduces ten widely used authentication methods—including HTTP Basic Auth, Session‑Cookie, Token, JWT, Single Sign‑On, OAuth 2.0, federated login, unique‑device login, QR‑code login, and one‑click mobile login—explaining their principles, workflows, advantages, drawbacks, and typical implementation libraries.

AuthenticationJWTOAuth
0 likes · 45 min read
10 Common Authentication Techniques Explained: From Basic Auth to OAuth and QR‑Login
Architect's Guide
Architect's Guide
Jan 9, 2026 · Fundamentals

Master Git: From Basics to Advanced Workflows in One Guide

This comprehensive guide walks you through Git fundamentals, core concepts, installation, configuration, common commands, branching, merging, rebasing, tagging, remote repository handling, GUI tools, undoing changes, stash, and cherry‑pick techniques, providing clear examples and code snippets for effective version control.

Gitbranchingmerge
0 likes · 43 min read
Master Git: From Basics to Advanced Workflows in One Guide