Architect's Guide
Author

Architect's Guide

Dedicated to sharing programmer-architect skills—Java backend, system, microservice, and distributed architectures—to help you become a senior architect.

629
Articles
0
Likes
1.8k
Views
0
Comments
Recent Articles

Latest from Architect's Guide

100 recent articles max
Architect's Guide
Architect's Guide
Nov 23, 2025 · Backend Development

Master Maven Plugins: From Basics to Custom Plugin Development

This guide explains Maven's core plugin architecture, demonstrates practical configurations for flatten‑maven‑plugin and exec‑maven‑plugin, details the MOJO concept behind plugins, and walks through creating, installing, and binding a custom Maven plugin to the build lifecycle.

Flatten PluginJavaMOJO
0 likes · 17 min read
Master Maven Plugins: From Basics to Custom Plugin Development
Architect's Guide
Architect's Guide
Nov 22, 2025 · Backend Development

Why Treating "null" as Empty Causes Silent Registration Bugs

The article explains how confusing the literal string "null" with a true null value in user registration requests can let invalid accounts slip through validation, leading to downstream errors and highlighting the need for proper input checks.

JSONinput validationnull bug
0 likes · 3 min read
Why Treating "null" as Empty Causes Silent Registration Bugs
Architect's Guide
Architect's Guide
Nov 19, 2025 · Operations

Master Hyper-V: Core Concepts, Benefits, and Step‑by‑Step Windows 11 VM Setup

This guide explains the fundamental concepts of virtualization, outlines Hyper‑V’s advantages, details system requirements, shows how to enable Hyper‑V via PowerShell, DISM or Windows settings, and provides a complete step‑by‑step process for creating and installing a Windows 11 virtual machine, including screenshots and download links.

Dism++Hyper-VPowerShell
0 likes · 9 min read
Master Hyper-V: Core Concepts, Benefits, and Step‑by‑Step Windows 11 VM Setup
Architect's Guide
Architect's Guide
Nov 12, 2025 · Backend Development

Four Practical Ways to Ensure Idempotency in High‑Traffic APIs

To prevent duplicate operations caused by network glitches, user errors, or retries, this article explains four common idempotency strategies—token, database unique index, distributed lock, and request payload hashing—providing clear concepts, key considerations, and ready‑to‑copy Java/Spring code examples.

Database Indexdistributed-lockidempotency
0 likes · 9 min read
Four Practical Ways to Ensure Idempotency in High‑Traffic APIs
Architect's Guide
Architect's Guide
Nov 10, 2025 · Artificial Intelligence

Build a Scalable, High‑Performance OCR Invoice Pipeline with Spring Boot & Tesseract

This article details a complete, production‑grade OCR invoice processing pipeline that combines a distributed Spring Boot microservice architecture, deep Tesseract optimizations, ML‑based data validation, GPU acceleration, Kubernetes deployment, and extensive performance and security strategies to achieve million‑scale daily throughput with high accuracy.

OCRPerformance optimizationSpring Boot
0 likes · 16 min read
Build a Scalable, High‑Performance OCR Invoice Pipeline with Spring Boot & Tesseract
Architect's Guide
Architect's Guide
Nov 9, 2025 · Information Security

Understanding Authentication, Authorization, and Tokens: From Cookies to JWT

This article explains the fundamentals of authentication, authorization, and credentials, compares cookies, sessions, and tokens, introduces JWT structure and usage, discusses common security concerns, and outlines practical solutions for distributed systems and modern web applications.

AuthenticationAuthorizationJWT
0 likes · 36 min read
Understanding Authentication, Authorization, and Tokens: From Cookies to JWT