From 6d8983589945fc5890fec19519d0d16439ce7665 Mon Sep 17 00:00:00 2001 From: moshix Date: Mon, 15 Jul 2024 04:00:58 -0500 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 6cd0ac3b7d..e616e06adb 100644 --- a/README.md +++ b/README.md @@ -23,7 +23,7 @@ custom_edit_url: https://github.com/codenotary/immudb/edit/master/README.md Don't forget to ⭐ this repo if you like immudb! -[:tada: 23M pulls from docker hub!](https://hub.docker.com/r/codenotary) +[:tada: 27M pulls from docker hub!](https://hub.docker.com/r/codenotary) --- @@ -40,7 +40,7 @@ Traditional database transactions and logs are mutable, and therefore there is n Data stored in immudb is cryptographically coherent and verifiable. Unlike blockchains, immudb can handle millions of transactions per second, and can be used both as a lightweight service or embedded in your application as a library. immudb runs everywhere, on an IoT device, your notebook, a server, on-premise or in the cloud. -immudb can be used as a key-value store or relational data structure and supports both transactions and blobs, so there are no limits to the use cases. Companies use immudb to secure and tamper-evident log data, sensor data, sensitive data, transactions, software build recipes, rule-base data, even artifacts and even video streams. [Examples of organizations using immudb today.](https://www.immudb.io) +When used as a relational data database, it supports both transactions and blobs, so there are no limits to the use cases. Developers and organizations use immudb to secure and tamper-evident log data, sensor data, sensitive data, transactions, software build recipes, rule-base data, artifacts and even video streams. [Examples of organizations using immudb today.](https://www.immudb.io) ## Contents