Neo4j has long been distributed with a dataset of movies – showing how movies, actors, actresses, directors and more relate to each other. We’ve also recently added Northwind organizational data for those developers who are more business minded. Nonetheless, these… Learn More →

It’s no secret that Neo Technology is an American company with a Swedish soul, but the power of the Neo4j graph database is for everyone – including the blossoming Neo4j community in Japan. In the past, there has been quite… Learn More →

[As community content, this post reflects the views and opinions of the particular author and does not necessarily reflect the official stance of Neo4j.] Introduction This article explores time travel in the Back to the Future universe, and how we… Learn More →

Identity and access management (IAM) solutions store information about parties (e.g., administrators, business units, end-users) and resources (e.g., files, shares, network devices, products, agreements), along with the rules governing access to those resources. Identity management solutions then apply these rules… Learn More →

When building scalable applications, developers have a myriad of technologies to choose from, especially when choosing a database technology. We want to choose the right piece of technology that offers optimal enhancement of functionality or performance boost. However, when adding… Learn More →

[As community content, this post reflects the views and opinions of the particular author and does not necessarily reflect the official stance of Neo4j.The GIIN did not share data or collaborate on this research. The data utilized for this work… Learn More →

Autumn is in full swing and as we continue to gather all the slides and videos from GraphConnect San Francisco (coming soon!), it’s time to look back at all of the amazing contributions from the Neo4j community this past September.… Learn More →

Graph databases are, therefore, an excellent fit for modeling, storing and querying network and IT operational data no matter which side of the firewall your business is on – whether it’s a communications network or a data center.

If you didn’t hear the news from Emil Eifrem’s keynote presentation at GraphConnect San Francisco yesterday: The Neo4j team is pleased to announce the general availability of Neo4j 2.3.0. Everyone from across Neo Technology has worked hard to make sure… Learn More →

If you haven’t just heard the news from my keynote presentation at GraphConnect San Francisco, you missed what I believe is going to be a defining moment not only for Neo4j but the entire world of graph technologies. Setting aside… Learn More →

Editor’s Note: Tom Sawyer Software is a Gold sponsor of GraphConnect San Francisco. Register for GraphConnect to meet the Tom Sawyer team and other sponsors in person. Figure 1. Crime Network Data Visualization showing Offenders, Offenses and their Relationships Figure… Learn More →

Editor’s Note: Pitney Bowes is a Bronze sponsor of GraphConnect San Francisco. Register for GraphConnect to meet Paul and other sponsors in person. One of the exciting applications for graph is master data management (MDM). By incorporating a graph database… Learn More →

The world of offshore finance is a murky one. In order to conceal the private lives and fortunes of the world’s most rich and powerful, ownership of cash and assets are deliberately obscured. It’s a world driven by vast networks… Learn More →

Editor’s Note: Graph Story is a Bronze sponsor of GraphConnect San Francisco. Register for GraphConnect to meet Ed and other sponsors in person. When the topic of graph databases — specifically Neo4j — has come up in the IRC chatrooms… Learn More →

We already know you’re excited to attend GraphConnect San Francisco (did we mention there’s only five days left to register?), and you’ve already checked out the amazing agenda and star-studded speaker lineup. But while long, in-depth talks are certainly helpful… Learn More →

Preventing and reacting to attacks in cyberspace involves a complex and rapidly changing milieu of factors, requiring a flexible architecture for advanced analytics, queries and graph visualization. Information Overload in Security Analytics Cyber warfare is conducted in complex environments, with… Learn More →