<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[AI Engineering]]></title><description><![CDATA[AI Engineering]]></description><link>https://blog.ai.gixo.in</link><image><url>https://cloudmate-test.s3.us-east-1.amazonaws.com/uploads/logos/6980a4b13e205fb04cec3074/568adaed-1e94-46ea-b0ce-d05088e2f3b7.jpg</url><title>AI Engineering</title><link>https://blog.ai.gixo.in</link></image><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 08:04:34 GMT</lastBuildDate><atom:link href="https://blog.ai.gixo.in/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[AI + Dependencies = The Next Big Security Problem]]></title><description><![CDATA[The New Reality of AI-Assisted Development
Modern developers increasingly rely on AI coding assistants to generate code and suggest dependencies.
Typical workflow:
Developer Prompt
      │
      
AI G]]></description><link>https://blog.ai.gixo.in/ai-dependencies-the-next-big-security-problem</link><guid isPermaLink="true">https://blog.ai.gixo.in/ai-dependencies-the-next-big-security-problem</guid><dc:creator><![CDATA[Abhishek Kumar Chaubey]]></dc:creator><pubDate>Wed, 01 Apr 2026 19:35:54 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/6980a4b13e205fb04cec3074/81c43514-31f8-4ee3-9f80-f6704f5b1953.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<img src="https://cdn.hashnode.com/uploads/covers/6980a4b13e205fb04cec3074/6478a16e-a5ac-487e-a696-db1a90d4e3d7.png" alt="" style="display:block;margin:0 auto" />

<h2>The New Reality of AI-Assisted Development</h2>
<p>Modern developers increasingly rely on AI coding assistants to generate code and suggest dependencies.</p>
<p>Typical workflow:</p>
<pre><code class="language-plaintext">Developer Prompt
      │
      
AI Generates Code
      │
      
Suggested Dependency Installation
      │
      
Developer Executes pip / npm install
</code></pre>
<p>The problem is that <strong>AI does not validate security of the dependencies it suggests.</strong></p>
<p>This creates a new attack surface in the <strong>software supply chain</strong>.</p>
<p>A supply-chain attack occurs when attackers compromise a trusted third-party component such as a dependency or library to inject malicious code into downstream software.</p>
<hr />
<h1>Where the Attack Happens</h1>
<pre><code class="language-plaintext">AI Generated Code
        │
        
Dependency Suggestion
        │
        
Package Registry (PyPI / NPM)
        │
        
Malicious Package Installed
        │
        
Post-Install Script Executes
        │
        
Data Exfiltration / Backdoor
</code></pre>
<p>Attackers exploit the <strong>trust developers place in open-source libraries</strong>, inserting malicious code that executes once installed.</p>
<hr />
<h1>The Most Common Attack Technique: Typosquatting</h1>
<p>Example visualization:</p>
<pre><code class="language-plaintext">Legitimate Package:
requests

Malicious Package:
requestss
reqeusts
requsets
</code></pre>
<p>Attackers publish packages with <strong>names very similar to legitimate libraries</strong> hoping developers install them accidentally.</p>
<p>Once installed, the malicious package may:</p>
<ul>
<li><p>steal environment variables<br />extract SSH keys</p>
</li>
<li><p>capture cloud credentials</p>
</li>
<li><p>download remote malware</p>
</li>
</ul>
<hr />
<h1>Real-World Supply Chain Incidents</h1>
<h3>Compromised AI-related Python package</h3>
<p>A compromised version of the AI library LiteLLM included a backdoor capable of stealing sensitive data such as SSH keys, Kubernetes secrets, and cloud credentials.</p>
<hr />
<h3>Malicious dependency injection</h3>
<p>Attackers compromised versions of a popular JavaScript library and inserted a dependency that installed a remote access trojan during installation.</p>
<hr />
<h3>Malicious packages in public registries</h3>
<p>Security researchers regularly discover packages in repositories like PyPI and npm that execute malware during installation or steal developer data.</p>
<hr />
<h1>What Happens After Installation</h1>
<p>Typical malicious package behavior:</p>
<pre><code class="language-plaintext">pip install malicious_package
        │
        
setup.py or install script runs
        │
        
Collect system information
        │
        
Send credentials to attacker server
        │
        
Download secondary malware
</code></pre>
<p>Many malicious packages hide code in <strong>setup scripts that run automatically during installation</strong>.</p>
<hr />
<h1>Why AI Makes This Risk Worse</h1>
<p>AI assistants can:</p>
<ul>
<li><p>hallucinate non-existent libraries</p>
</li>
<li><p>suggest outdated dependencies</p>
</li>
<li><p>recommend vulnerable packages  </p>
<p>Some studies show LLMs may generate <strong>fictitious dependencies that attackers could later publish</strong>, creating a new attack vector.</p>
</li>
</ul>
<hr />
<h1>Secure Workflow for AI-Generated Code</h1>
<p>Recommended developer workflow:</p>
<pre><code class="language-plaintext">AI Generated Code
        │
        
Verify Dependency Source
        │
        
Run Vulnerability Scan
(pip-audit / npm audit)
        │
        
Static Code Security Scan
(Semgrep / SAST)
        │
        
Secret Detection
(Gitleaks)
        │
        
Run Code in Sandbox
(Docker / isolated environment)
</code></pre>
<p>This significantly reduces the risk of supply chain compromise.</p>
<hr />
<h1>The Key Insight</h1>
<p>AI tools accelerate development.</p>
<p>But they also introduce <strong>automated trust in external dependencies</strong>.</p>
<p>And attackers exploit exactly that trust.</p>
<p>The most dangerous line of code today might simply be:</p>
<pre><code class="language-plaintext">pip install &lt;unknown package&gt;
</code></pre>
<hr />
<h1>Takeaway for AI Engineers</h1>
<p>When using AI-generated code:</p>
<ul>
<li><p>Never blindly trust dependencies</p>
</li>
<li><p>Validate libraries before installation</p>
</li>
<li><p>Implement security scanning in CI/CD</p>
</li>
<li><p>Run AI-generated code in sandbox environments</p>
</li>
</ul>
<p>AI is transforming software development.</p>
<p>But <strong>secure development practices must evolve with it.</strong></p>
]]></content:encoded></item><item><title><![CDATA[The New Reality of AI-Assisted Development]]></title><description><![CDATA[Modern developers increasingly rely on AI coding assistants to generate code and suggest dependencies.
Typical workflow:
Developer Prompt
      │
AI Generates Code
      │
Suggested Dependency Install]]></description><link>https://blog.ai.gixo.in/the-new-reality-of-ai-assisted-development</link><guid isPermaLink="true">https://blog.ai.gixo.in/the-new-reality-of-ai-assisted-development</guid><dc:creator><![CDATA[Abhishek Kumar Chaubey]]></dc:creator><pubDate>Wed, 01 Apr 2026 19:26:26 GMT</pubDate><enclosure url="https://cdn.hashnode.com/uploads/covers/6980a4b13e205fb04cec3074/1362fb2f-94e0-467c-a93c-7ac98bd85777.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Modern developers increasingly rely on AI coding assistants to generate code and suggest dependencies.</p>
<p>Typical workflow:</p>
<pre><code class="language-plaintext">Developer Prompt
      │
AI Generates Code
      │
Suggested Dependency Installation
      │
Developer Executes pip / npm install
</code></pre>
<p>The problem is that <strong>AI does not validate security of the dependencies it suggests.</strong></p>
<p>This creates a new attack surface in the <strong>software supply chain</strong>.</p>
<p>A supply-chain attack occurs when attackers compromise a trusted third-party component such as a dependency or library to inject malicious code into downstream software.</p>
<hr />
<h1>Where the Attack Happens</h1>
<pre><code class="language-plaintext">AI Generated Code
        │
        
Dependency Suggestion
        │
        
Package Registry (PyPI / NPM)
        │
        
Malicious Package Installed
        │
        
Post-Install Script Executes
        │
        
Data Exfiltration / Backdoor
</code></pre>
<p>Attackers exploit the <strong>trust developers place in open-source libraries</strong>, inserting malicious code that executes once installed.</p>
<hr />
<h1>The Most Common Attack Technique: Typosquatting</h1>
<p>Example visualization:</p>
<pre><code class="language-plaintext">Legitimate Package:
requests

Malicious Package:
requestss
reqeusts
requsets
</code></pre>
<p>Attackers publish packages with <strong>names very similar to legitimate libraries</strong> hoping developers install them accidentally.</p>
<p>Once installed, the malicious package may:</p>
<ul>
<li><p>steal environment variables</p>
</li>
<li><p>extract SSH keys</p>
</li>
<li><p>capture cloud credentials</p>
</li>
<li><p>download remote malware</p>
</li>
</ul>
<hr />
<h1>Real-World Supply Chain Incidents</h1>
<h3>Compromised AI-related Python package</h3>
<p>A compromised version of the AI library LiteLLM included a backdoor capable of stealing sensitive data such as SSH keys, Kubernetes secrets, and cloud credentials.</p>
<hr />
<h3>Malicious dependency injection</h3>
<p>Attackers compromised versions of a popular JavaScript library and inserted a dependency that installed a remote access trojan during installation.</p>
<hr />
<h3>Malicious packages in public registries</h3>
<p>Security researchers regularly discover packages in repositories like PyPI and npm that execute malware during installation or steal developer data.</p>
<hr />
<h1>Lets deep dive after installation</h1>
<p>Typical malicious package behavior:</p>
<pre><code class="language-plaintext">pip install malicious_package
        │
        
setup.py or install script runs
        │
        
Collect system information
        │
        
Send credentials to attacker server
        │
        
Download secondary malware
</code></pre>
<p>Many malicious packages hide code in <strong>setup scripts that run automatically during installation</strong>.</p>
<hr />
<h1>Why AI Makes This Risk Worse</h1>
<p>AI assistants can:</p>
<ul>
<li><p>hallucinate non-existent libraries</p>
</li>
<li><p>suggest outdated dependencies</p>
</li>
<li><p>recommend vulnerable packages</p>
</li>
</ul>
<p>Some studies show LLMs may generate <strong>fictitious dependencies that attackers could later publish</strong>, creating a new attack vector.</p>
<hr />
<h1>Secure Workflow for AI-Generated Code</h1>
<p>Recommended developer workflow:</p>
<pre><code class="language-plaintext">AI Generated Code
        │
        
Verify Dependency Source
        │
        
Run Vulnerability Scan
(pip-audit / npm audit)
        │
        
Static Code Security Scan
(Semgrep / SAST)
        │
        
Secret Detection
(Gitleaks)
        │
        
Run Code in Sandbox
(Docker / isolated environment)
</code></pre>
<p>This significantly reduces the risk of supply chain compromise.</p>
<hr />
<h1>Key takeaway for us</h1>
<p>AI tools accelerate development.</p>
<p>But they also introduce <strong>automated trust in external dependencies</strong>.</p>
<p>And attackers exploit exactly that trust.</p>
<p>The most dangerous line of code today might simply be:</p>
<pre><code class="language-plaintext">pip install &lt;unknown package&gt;
</code></pre>
<p>When using AI-generated code:</p>
<ul>
<li><p>Never blindly trust dependencies</p>
</li>
<li><p>Validate libraries before installation</p>
</li>
<li><p>Implement security scanning in CI/CD</p>
</li>
<li><p>Run AI-generated code in sandbox environments</p>
</li>
</ul>
<p>AI is transforming software development.</p>
<p>But <strong>secure development practices must evolve with it.</strong></p>
]]></content:encoded></item><item><title><![CDATA[Ai Model's Benchmarking]]></title><description><![CDATA[You must have heard or seen benchmarking of LLM when they released on some standards aspects.

Why Benchmarking is Important?

Computer scientist discovered various way to measure intelligence, capaci]]></description><link>https://blog.ai.gixo.in/ai-model-s-benchmarking</link><guid isPermaLink="true">https://blog.ai.gixo.in/ai-model-s-benchmarking</guid><dc:creator><![CDATA[Abhishek Kumar Chaubey]]></dc:creator><pubDate>Fri, 20 Feb 2026 09:49:53 GMT</pubDate><enclosure url="https://cloudmate-test.s3.us-east-1.amazonaws.com/uploads/covers/6980a4b13e205fb04cec3074/f4d69d22-0e7f-4ee1-8611-acb9df597036.jpg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>You must have heard or seen benchmarking of LLM when they released on some standards aspects.</p>
<blockquote>
<p>Why Benchmarking is Important?</p>
</blockquote>
<p>Computer scientist discovered various way to measure intelligence, capacity, capability, using various checks for LLM model and standardized them.</p>
<p>you will have seen some models when given update like gemini, grok, Qwen, Deepseek, Sarvam etc.<br />below is one snippet which is released recently.</p>
<p>Below is the benchmark report of the <a href="https://t.co/2gZqWRrAiX">Gemini 3.1 Pro Preview released by Google</a> yesterday</p>
<img src="https://cloudmate-test.s3.us-east-1.amazonaws.com/uploads/covers/6980a4b13e205fb04cec3074/a7550ec1-f2d8-4210-9474-7b4d0f0a154e.jpg" alt="" />

<p>Now as you can see their multiple Benchmarks each one has specific things which validates.</p>
<p>You can also see for one of popular opensource model developed by <a href="https://qwen.ai/blog?id=qwen3">qwen</a></p>
<img src="https://cloudmate-test.s3.us-east-1.amazonaws.com/uploads/covers/6980a4b13e205fb04cec3074/37fc2b06-7bf0-4612-a22b-3b9e3808e703.jpg" alt="" style="display:block;margin:0 auto" />

<blockquote>
<p>Now you would have observed there are multiple ways of benchmarking, and every model have to go through these tests.</p>
<p>So, a question arises here why you should you be bothered about these bench marking methodologies.?</p>
</blockquote>
<p>Now let's take analogy of buying any product, you should have purchased any items for instance take example of buying a laptop what you do.</p>
<p>You research and take note of</p>
<ol>
<li><p>you gather what you want (like what work you want to do example gaming, video-editing)</p>
</li>
<li><p>you check what are the criteria that laptop should have like higher Ram, must have external Graphics card, higher CPU model other aspects too.</p>
</li>
</ol>
<p>So, idea behind this analogy is to see what the things are required for your requirement it gives you a all idea about choosing a product which suits you.</p>
<p>That is why it is required to understand the benchmarking and model attributes, that will help you to choose models for your specific work or requirement when you build any product.</p>
<blockquote>
<p>Now wrapping it up for now dropping you a question here</p>
<p><mark class="bg-yellow-200 dark:bg-yellow-500/30">As you know these benchmarks are standardized then any model trainer would train them to pass those particular benchmarks then how the credibility of the model is met in large context?</mark></p>
<p>Leaving you with that.<br />Comment your thoughts on that.<br />In the upcoming blogs we will go through each popular benchmarking models one by one with their evolution</p>
</blockquote>
<p><a href="https://www.youtube.com/watch?v=bz1duiyesEw">Subscribe on youtube</a></p>
<p><a href="https://drive.google.com/file/d/1jexiJxxwDXKvuwz5qn9atdGm_Mnm516G/view?usp=sharing">Tune into podcast</a></p>
]]></content:encoded></item><item><title><![CDATA[Vector in ML]]></title><description><![CDATA[Vector is an ordered array of numbers (or data point) representing features of object like text, image, or audio.  
These high dimensional numerical representations, or embeddings, captures semantic meaning, allowing algos to measure similarities, an...]]></description><link>https://blog.ai.gixo.in/vector-in-ml</link><guid isPermaLink="true">https://blog.ai.gixo.in/vector-in-ml</guid><category><![CDATA[vector]]></category><category><![CDATA[vector database]]></category><category><![CDATA[vector embeddings]]></category><dc:creator><![CDATA[Abhishek Kumar Chaubey]]></dc:creator><pubDate>Wed, 04 Feb 2026 12:37:05 GMT</pubDate><content:encoded><![CDATA[<p><strong>Vector</strong> is an ordered array of numbers (or data point) representing features of object like text, image, or audio.  </p>
<p>These high dimensional numerical representations, or embeddings, captures semantic meaning, allowing algos to measure similarities, and identifying relationships.<br />It helps basically to process unstructured data for examples like recommendation systems and LLMs</p>
<p> Now let’s understand what above definition means.  </p>
<p><strong>How vector is represented?  
</strong><br />example like tables length and breadth (in inch) might be:<br />V = (48,16)<br />in higher dimensions vector will have large components such as:</p>
<p>V = (x<sub>1</sub>,x<sub>2</sub>,x<sub>3</sub>,x<sub>4</sub>,…….x<sub>N</sub>)</p>
<p>Now you can simply create a vector in python using NumPy</p>
<p><code>Import numpy as np</code></p>
<p><code>V = np.array([48,16])</code></p>
<p><code>Print(“Vectors:”,v)</code>  </p>
<p># Similarly, a matrix is also an example of a vector.  </p>
<p><strong>Types of Vectors in Machine Learning.  
</strong><br /><strong>Row and Column Vectors  
</strong>row vector is v = (x<sub>1</sub>, x<sub>2</sub>,x<sub>3 </sub> ) it is one-dimensional array</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770207695765/18582ad9-68a2-4f0a-b5cd-d2f8f82ef8c4.png" alt /></p>
<p><strong>Zero Vector</strong></p>
<p>A vector with all elements is 0. It is useful in optimization and denote origin in vector space.</p>
<p>v = (0,0,0)</p>
<p><strong>Unit Vector</strong></p>
<p>A vector of magnitude 1. It is majorly used for direction</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770207741379/57cc0177-5950-4b9c-a49b-b452a95a7e9b.png" alt /></p>
<p><strong>Sparse Vector</strong></p>
<p> In this vector it majorly consists of zeros and used in text analysis and recommendation system</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770207781622/5e5d47ee-3298-47ae-a3d4-e5a60fb7deaa.png" alt /></p>
<p><strong>Dense Vector  
</strong><br />In this vector it consists of non-zero elements and used in image processing and deep learning  </p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770207803192/ef6b80d1-504e-47b2-a31d-495f1340cbce.png" alt /></p>
<p><strong>Key operations</strong> are performed using <a target="_blank" href="https://pypi.org/project/numpy/">NumPy</a> or <a target="_blank" href="https://pytorch.org/">PyTorch</a> to perform core mathematical operations in python<br />these operations are dot product, scalar multiplication, vector addition/subtraction, Normalization. we will deep dive in coming blogs.</p>
<p><strong>Why vectors are used in Ml.</strong></p>
<p>Because of its properties which can be utilised to create</p>
<p><strong>Feature Representation</strong><br />As we learned vectors represents data point in numerical forms.  Like in Natural language processing words are translated into word vectors using library in python you can also achieve using <a target="_blank" href="https://www.geeksforgeeks.org/python/python-word-embedding-using-word2vec/">word2vec</a></p>
<p><strong>Similarity Measurement  
</strong>Now feature representation of word vectors enables us to measure distance of vectors using <a target="_blank" href="https://www.geeksforgeeks.org/maths/euclidean-distance/">Euclidean Distance</a> or <a target="_blank" href="https://www.geeksforgeeks.org/dbms/cosine-similarity/">Cosine Similarity</a> Algorithms in Ml.  </p>
<p><strong>Transformations and Projections.</strong><br />Vectors enable mathematical operations such as rotation, scaling and translation.<br />example used in <a target="_blank" href="https://www.ibm.com/think/topics/principal-component-analysis">principal component</a> analysis.  </p>
<h3 id="heading-application-of-vectors">Application of vectors</h3>
<p><a target="_blank" href="https://www.ibm.com/think/topics/linear-regression">Linear Regression</a></p>
<p><a target="_blank" href="https://www.ibm.com/think/topics/neural-networks">Neural Networks</a></p>
<p><a target="_blank" href="https://www.pinecone.io/learn/vector-embeddings/">Embeddings</a></p>
<p><em>Ask questions and what do you think about Vectors in comment X</em>  </p>
<p><strong>What’s Next</strong> .... we will deep dive into <strong>how word2Vec library works</strong> and helps in finding feature representation Stay Tuned and Subscribe</p>
]]></content:encoded></item><item><title><![CDATA[Vector Database]]></title><description><![CDATA[What is Vector database.?
A vector database is a specialized storage system designed to store, index, and search vector embeddings.
**How it works?
1. Vectorization:**
Raw data (text, image, audio) is processed by ml model to create a digital fingerp...]]></description><link>https://blog.ai.gixo.in/vector-database</link><guid isPermaLink="true">https://blog.ai.gixo.in/vector-database</guid><category><![CDATA[AI]]></category><category><![CDATA[vector database]]></category><category><![CDATA[vector embeddings]]></category><category><![CDATA[VectorSearch]]></category><dc:creator><![CDATA[Abhishek Kumar Chaubey]]></dc:creator><pubDate>Mon, 02 Feb 2026 14:40:18 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1770041667647/4f496359-257e-4137-b9e9-3989d940ff95.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><strong>What is Vector database.?</strong></p>
<p>A vector database is a specialized storage system designed to store, index, and search vector embeddings.</p>
<p>**<strong>How it works?</strong></p>
<p>1. <strong>Vectorization</strong>:**</p>
<p>Raw data (text, image, audio) is processed by ml model to create a digital fingerprint (<a target="_blank" href="https://www.ibm.com/think/topics/vector-embedding"><strong>vector embedding</strong></a>) a large list of numbers which represents the item’s features.</p>
<p><strong>2. Indexing</strong></p>
<p>Organizes these vectors in multi-dimensional space. Related items are positioned mathematically closer to each other</p>
<p><strong>3. Similarity Search</strong></p>
<p>When a query is made, search is converted to vector and then database identifies nearest neighbours</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1770042503997/8e0ef006-901f-4606-b8df-617debcedbec.png" alt class="image--center mx-auto" /></p>
<p>Flow depicting the use of vector embedding</p>
<p><strong>Why Vector Database?</strong></p>
<p>Question comes in mind when there are already so many databases like <em>(MySQL, Oracle, NoSQL, influx)</em> available why need of vector database.</p>
<p>The selection and use of these databases depend on the data structure which we want to store in them.</p>
<p>As we know the data which we want to store are unstructured like text, images, audio. We required create or use database which can handle high-dimensional vector embeddings.<br />other aspects which lead to use is vector database allows <strong>semantic</strong> search or similarity search.</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Features</strong></td><td><strong>SQL/NoSQL</strong></td><td><strong>Vector Database</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Data Types</td><td>Structured (integers, strings, dates)</td><td>Unstructured (embeddings, audio, visual)</td></tr>
<tr>
<td>Search Type</td><td>Exact Matches/logical query</td><td>Similarity/contextual searches</td></tr>
<tr>
<td>Indexing</td><td>B-Trees, Hash maps</td><td>Hierarchical Navigable Small World</td></tr>
<tr>
<td>Use Case</td><td>Transactions, inventory, CRM</td><td>Recommendations, chatbots, image retrievals</td></tr>
</tbody>
</table>
</div><p>Majorly used vector databases by popular AI Models</p>
<div class="hn-table">
<table>
<thead>
<tr>
<td><strong>Models</strong></td><td><strong>Vector Databases</strong></td></tr>
</thead>
<tbody>
<tr>
<td>Open AI(ChatGPT)</td><td><a target="_blank" href="https://www.pinecone.io/">Pinecone</a>, <a target="_blank" href="https://milvus.io/">Milvus</a>, <a target="_blank" href="https://weaviate.io/">Weaviate</a> and <a target="_blank" href="https://qdrant.tech/">Qdrant</a></td></tr>
<tr>
<td>Gemini</td><td><a target="_blank" href="https://cloud.google.com/discover/what-is-a-vector-database">Vertex AI Vector</a>, <a target="_blank" href="https://github.com/GoogleCloudPlatform/terraform-google-alloy-db">Alloy DB</a> and <a target="_blank" href="https://www.postgresql.org/about/news/pgvector-070-released-2852/">pgvector</a></td></tr>
<tr>
<td>DeepSeek</td><td><a target="_blank" href="https://milvus.io/">Milvus</a>, <a target="_blank" href="https://qdrant.tech/">Qdrant</a> and <a target="_blank" href="https://docs.trychroma.com/docs/overview/getting-started">ChromaDB</a></td></tr>
</tbody>
</table>
</div><p><strong>What’s next</strong> … <em>which vector database to choose and comparison of popular vector databases</em></p>
]]></content:encoded></item></channel></rss>