Latest Articles

Hongke Sharing

How Redis, used by both ChatGPT and OpenAI, was upgraded to a vector database.

Companies across industries are increasingly recognizing that making data-driven decisions is a necessity to compete now, in the next 5 years, in the next 20 years and beyond. With the explosion of big language modeling, vector databases have become a hot topic. With just a few lines of simple Python code, vector databases can act as inexpensive but efficient "external brains" for big language models.

Read more
Hongke Sharing

Customizing AI Agents for LangChain with Redis - OpenGPTs

LangChain founder Harrison Chase said, "We use Redis in OpenGPTs to store all of our long-term content, including vector storage for its use in retrieval and a database for storing message and agent configurations.The fact that Redis integrates all of this functionality into a single database is very appealing! Redis integrates all of these capabilities in one database, which is very attractive."

Read more
Hongke Case

The Five Best Redis Use Cases

Redis has a great reputation and is widely recognized. Developers rely on Redis Enterprise to address key use cases across multiple industries, including gaming, retail, IoT, and travel application development.

Read more
Hongke Case

New PCAN driver for Linux environment is released! CAN/CAN FD communication experience is fully upgraded!

The new version 8.17.0 of the PCAN-Linux driver has been released, specifically designed for CAN and CAN FD interfaces. Both CAN 2.0 a/b and CAN FD PCAN hardware products are "at home" with our new driver. Do you want to experience the convenience of a character mode device driver (chardev) or the efficiency of a socketCAN device driver (netdev)? It's up to you!

Read more
Hongke Dry Goods

What is the nature of network intrusion? How to deal with it

In the age of digitalization, cyber security has become an increasingly serious challenge. Organizations not only need to be aware of potential cyber threats, but also need to take effective measures to prevent and respond to these threats. As cyber attacks continue to evolve, how to effectively protect an organization's network security and prevent potential data leakage has become an important issue that every organization cannot avoid.

Read more

Contact Hongke to help you solve your problems.

Let's have a chat