FinTech Alpian using Data Streaming and Agentic AI with Apache Kafka in Switzerland Regulated Market
Read More

Agentic AI and RAG in Regulated FinTech with Apache Kafka at Alpian Bank

Regulated FinTech is transforming financial services by combining compliance with innovation. This post explores how real-time data streaming with Apache Kafka and Flink enables modern architecture, personalization, and AI integration—while maintaining strict governance. Alpian, a fully licensed Swiss digital bank, showcases how Agentic AI, RAG, and domain-driven design work together in a compliant, cloud-only environment.
Read More
Tiered Storage for Apache Kafka - Use Cases Architecture Benefits.png
Read More

Why Tiered Storage for Apache Kafka is a BIG THING…

Apache Kafka added Tiered Storage to separate compute and storage. The capability enables more scalable, reliable and cost-efficient enterprise architectures. This blog post explores the architecture, use cases, benefits, and a case study for storing Petabytes of data in the Kafka commit log. The end discusses why Tiered Storage does NOT replace other databases and how Apache Iceberg might change future Kafka architectures even more.
Read More
Disaster Recovery and Resiliency with Apache Kafka Data Streaming
Read More

Disaster Recovery with Kafka across the Edge and Hybrid Cloud (QCon Talk)

I spoke at QCon London in April 2022 about building disaster recovery and resilient real-time enterprise architectures with Apache Kafka. This blog post summarizes the use cases, architectures, and real-world examples. The slide deck and video recording of the presentation is included as well.
Read More
Cyber Threat Intelligence with Apache Kafka and SIEM SOAR Machine Learning
Read More

Kafka for Cybersecurity (Part 3 of 6) – Cyber Threat Intelligence

This blog series explores use cases and architectures for Apache Kafka in the cybersecurity space, including situational awareness, threat intelligence, forensics, air-gapped and zero trust environments, and SIEM / SOAR modernization. This post is part three: Cyber Threat Intelligence.
Read More