We’ve previously talked about the concept of polyglot persistence and why it can make sense to use multiple database technologies together. Today, we will examine a possible use case for using Neo4j (a graph database) and Cassandra (a column store)… Learn More →

As our lives become increasingly digital, a growing number of financial transactions are conducted online. Fraudsters have been quick to adapt to this trend, and to devise clever ways to defraud online payment systems. While this type of activity can… Learn More →

The impact of fraud on the insurance industry is estimated to be $80 billion annually in the US, a number that has been growing in recent years. From 2010 to 2012, questionable claims in the U.S. jumped 27 percent, to… Learn More →

First-party bank fraud involves fraudsters who apply for credit cards, loans, overdrafts and unsecured banking credit lines, with no intention of paying them back. It is a serious problem for banking institutions. U.S. banks lose tens of billions of dollars… Learn More →

Banks and insurance companies lose billions of dollars every year to fraud. Traditional methods of fraud detection play an important role in minimizing these losses. However increasingly sophisticated fraudsters have developed a variety of ways to elude discovery – both… Learn More →

Editor’s Note: Last October at GraphConnect San Francisco, Karen Lopez – Senior Project Manager at InfoAdvisors – delivered a presentation on how to tell when your data will be best served by a graph database. For more videos from GraphConnect… Learn More →

Gamesys is the largest cash and social gaming operator in UK and Europe, created the world’s first cash gaming application on Facebook. With games like Jackpotjoy, Instant Slots and Here Be Monsters, the company features online bingo, slots and casino… Learn More →

Good news for developers in the Lion City: The Neo4j ecosystem now includes a budding new community in Singapore! While Neo Technology will always have a Swedish soul, we’ve already welcomed a number of nations to the worldwide graph of… Learn More →

For this week’s 5-minute interview, I sat down with Hamish Boland-Rudder, the Online Editor for the International Consortium of Investigative Journalists (ICIJ). Hamish and I got to chat at GraphConnect San Francisco. Q: Can you tell me about how you… Learn More →

[As community content, this post reflects the views and opinions of the particular author and does not necessarily reflect the official stance of Neo4j.] Graph Commons is a platform for collaborative network mapping to connect partial information and explore complex… Learn More →

“Big data” grows bigger every year, but today’s enterprise leaders don’t only need to manage larger volumes of data – they critically need to generate insight from their existing data. So how should CIOs and CTOs generate those insights? To… Learn More →

The Neo4j community has had a very busy October! Besides the three major announcements at GraphConnect San Francisco, community members have been abuzz about everything from real-time databases to competitive benchmarks. Below are some of our top picks from our… Learn More →

Identity and access management (IAM) solutions store information about parties (e.g., administrators, business units, end-users) and resources (e.g., files, shares, network devices, products, agreements), along with the rules governing access to those resources. Identity management solutions then apply these rules… Learn More →

Editor’s Note: Tom Sawyer Software is a Gold sponsor of GraphConnect San Francisco. Register for GraphConnect to meet the Tom Sawyer team and other sponsors in person. Figure 1. Crime Network Data Visualization showing Offenders, Offenses and their Relationships Figure… Learn More →

The world of offshore finance is a murky one. In order to conceal the private lives and fortunes of the world’s most rich and powerful, ownership of cash and assets are deliberately obscured. It’s a world driven by vast networks… Learn More →

Preventing and reacting to attacks in cyberspace involves a complex and rapidly changing milieu of factors, requiring a flexible architecture for advanced analytics, queries and graph visualization. Information Overload in Security Analytics Cyber warfare is conducted in complex environments, with… Learn More →