Featured Post
Learn about a New Neo4j-Cassandra Data Import Tool That Helps You with Polyglot Persistence

Neo4j + Cassandra: Transferring Data from a Column Store to a Property Graph

This Neo4j Lab has been deprecated. The code is available in our GitHub project, but is no longer actively maintained. We've previously talked about the concept of polyglot persistence and why it can make sense to use multiple database technologies together. Today, we will examine a possible... read more


Catch This Week’s 5-Minute Interview with Brad Brech, the CTO of Solutions at IBM

The 5-Minute Interview: Brad Brech, CTO of Solutions, IBM

This week’s 5-minute interview is with Brad Brech, the CTO of Solutions at IBM. I caught up with Brad for a video interview at GraphConnect San Francisco. https://www.youtube.com/watch?v=GlJQh_yzstc Q: Please tell us what you do at IBM and a little bit about your favorite... read more


Learn How Traverse Mobile Went from Idea to Beta Release in the App Store Using Neo4j

From Idea to App Store: The Neo4j Story of Traverse Mobile [Community Post]

Where We Got the Idea for Traverse Our co-founder was inspired to build Traverse Mobile while on a backpacking trip to Thailand in 2011. After spending two nights in the elephant jungles of Chiang Mai with a strange – but inspiring and contagiously fun – group of tourists and locals,... read more


Watch Nicole White Present on How to Query Your World with Cypher: Neo4j’s Graph Query Language

Query Your World with Cypher: Focus on Data Relationships

Editor’s Note: Last October at GraphConnect San Francisco, Nicole White – Data Scientist at Neo Technology – delivered this presentation on how to write Cypher queries for your most common connected-data questions. For more videos from GraphConnect SF and to register for GraphConnect... read more


Learn about Data Encryption for Neo4j using the Object Graph Mapping (OGM) Library

Neo4j Data Encryption with OGM [Community Post]

Intro Security is a fact of modern life and, as a direct result, a fact of modern software. While all non-trivial systems require at least some basic level of functional protection, how much security is appropriate is typically driven by the system's actors and use cases as well as the value... read more