Featured Post
GraphSummit Europe 2024: Actionable Insights From Industry Leaders and Innovators
Sep 18 2 mins read
Join us in London on October 16 and 17 for GraphSummit Europe 2024! With a focus on graph technology, connected data, and GenAI, this year’s event features presentations on the most complex data challenges modern organizations face — and how solving them can unlock new growth... read more
Neo4j + Cassandra: Transferring Data from a Column Store to a Property Graph
Feb 08, 2016 5 mins read
This Neo4j Lab has been deprecated. The code is available in our GitHub project, but is no longer actively maintained. We've previously talked about the concept of polyglot persistence and why it can make sense to use multiple database technologies together. Today, we will examine a possible... read more
The 5-Minute Interview: Brad Brech, CTO of Solutions, IBM
Feb 05, 2016 6 mins read
This week’s 5-minute interview is with Brad Brech, the CTO of Solutions at IBM. I caught up with Brad for a video interview at GraphConnect San Francisco. https://www.youtube.com/watch?v=GlJQh_yzstc Q: Please tell us what you do at IBM and a little bit about your favorite... read more
From Idea to App Store: The Neo4j Story of Traverse Mobile [Community Post]
Feb 04, 2016 6 mins read
Where We Got the Idea for Traverse Our co-founder was inspired to build Traverse Mobile while on a backpacking trip to Thailand in 2011. After spending two nights in the elephant jungles of Chiang Mai with a strange – but inspiring and contagiously fun – group of tourists and locals,... read more
Query Your World with Cypher: Focus on Data Relationships
Feb 03, 2016 3 mins read
Editor’s Note: Last October at GraphConnect San Francisco, Nicole White – Data Scientist at Neo Technology – delivered this presentation on how to write Cypher queries for your most common connected-data questions. For more videos from GraphConnect SF and to register for GraphConnect... read more
Neo4j Data Encryption with OGM [Community Post]
Feb 02, 2016 5 mins read
Intro Security is a fact of modern life and, as a direct result, a fact of modern software. While all non-trivial systems require at least some basic level of functional protection, how much security is appropriate is typically driven by the system's actors and use cases as well as the value... read more
Neolytics: Analyzing Ruby Code with Neo4j
Feb 01, 2016 4 mins read
For a long time I’ve been wanting to use Neo4j as a tool to analyze Ruby code. Using Ruby for almost a decade, I have a lot of experience with effectively finding my way around Ruby code. Still, Ruby programs can be very dynamic and thus tools are always welcome. As I’ve begun to use... read more