Operations | Monitoring | ITSM | DevOps | Cloud

Aiven

Introducing Aiven for Valkey

Aiven offers managed Valkey, an open source NoSQL database compatible with legacy OSS Redis* perfect for caching, message queues, and more. Today ‍Aiven is launching Aiven for Valkey to give customers a fully open source Redis alternative. Aiven for Caching will remain available to existing customers, but due to recent Redis licensing changes, it will remain on Redis 7.2.4. Valkey is a fork of OSS Redis, version 7.2.5, maintained by the Linux Foundation and is fully backwards compatible with Redis.

What's Happening in the Caching World: Redis, Valkey and DragonFly

In the world of software development, caching is a crucial yet complex component. What happens when one of the most popular caching systems, Redis, changes its license, sending shockwaves through the community? And how does a company pivot to not one but two solutions to ensure high-performance data management? Today's discussion dives deep into one of the most critical and often-overlooked components of the software industry—caching.

Building smart data platforms with AI to drive business innovation

Imagine a world where databases not only store vast amounts of data but autonomously optimize themselves, predict future trends, and seamlessly integrate with AI. In this Data (R)evolution episode, we share a fascinating conversation with Soumya Bijjal, the VP of Product at Aiven, and John Joseph Kennedy, the Head of Databases at Aiven, about the future of AI, databases, and data platforms. They dissect the current AI landscape, the challenges companies face, and the transformative potential of integrating AI with data systems.

Aiven workshop: Preparing and Using Data for AI with LangChain and OpenSearch

In this workshop we’ll work together to generate embeddings for podcast transcriptions and load that data into OpenSearch. Then we’ll search the documents using similarity search and use those results to improve our responses from an LLM (Large Language Model). Along the way we’ll explain the Retrieval Augmented Generation (RAG) pattern and show how it’s possible to try different LLMs without having to completely rewrite your code.

Build to scale with Aiven!

In this session, we will show how to leverage Aiven for Dragonfly and Aiven for AI. First, we’ll discuss how to increase your throughput and reduce memory usage by 25% compared to open-source Redis. Then explore scalability, efficiency, and advanced capabilities ideal for caching, gaming leaderboards, messaging, AI applications, and more. After that, we’ll jump into Aiven’s latest AI use cases and cover.

Aiven for Dragonfly vs Aiven for Caching benchmarking

Aiven offers two powerful in-memory data stores - Aiven for Dragonfly and Aiven for Caching. In this post we help you make the optimal choice for your project. Speed is essential in the world of data access. When milliseconds matter, choosing the right in-memory data store can make or break your application's performance. This article delves into a head-to-head comparison of two prominent contenders that Aiven offers: Aiven for Dragonfly and Aiven for Caching.

Data Security and Compliance in 2024 and Beyond - OSDI Toronto May 2024

Jamie Arlen explores some of the guidance he gave over 5000 days ago to see if it still tracks. Jamie is the CISO of Aiven. He brings over 30 years of tech security experience to the conversation and provides a wealth of guidance to security team members future CISOs and tech-security-aware professionals. The following is a talk given at the Open Source Data Infrastructure Meetup in Toronto recorded 22 May 2024.

In Support of Anti-Abuse Operations - Allan Stojanovic - OSDI Toronto 22 May 2024

Allan Stojanovic gives us a look into the concerns of a Security Analysis and Response Engineer. In this talk, Allan shares how to think about abuse from day one and to understand the Who, What, When, Where, and Why, and How your platforms are susceptible to abuse.` Allan is a Staff Security Analysis and Response Engineer at Aiven. He has survived IT for over 30 years working in nearly every vertical doing may different roles, mostly in the Information Security field.