NODES 2022 Best of! Day 1

21 Dec, 2022



Watch the top rated sessions from NODES during our re-runs! More videos from NODES: https://neo4j.com/video/nodes-2022/

1) Playing With State Machines - Pierre Halftermeyer
In this talk, we'll play with finite state machines. We'll demonstrate (in a radical Cypher-and-APOC-only way) how Automata can be used in Neo4J to build a compiler, to orchestrate a game or even solve AI classical problems.
Speakers: Pierre Halftermeyer
Slides: https://dist.neo4j.com/nodes-20202-slides/066%20Playing%20With%20State%20Machines%20-%20NODES2022%20APAC%20Beginner%2012%20-%20Pierre%20Halftermeyer.pdf

2) Hidden in the Clouds Using Graph Technology to Understand Your Cloud Estate - Rhys Evans

The modern cloud infrastructure we use to deploy our applications put lots of information at our fingertips: consoles, APIs, dashboards, metrics, etc. But despite all this data, at the FT it was hard to feel confident that we had a good grasp of what we were actually running.

So the Financial Times turned to graph technologies – Neo4j and GraphQL – to build a user-friendly picture of multiple AWS accounts. This is helping keep their data more secure, saving them money, improving engineering efficiency, and providing instant insights that would previously have taken hours or days of research.

In this session, Rhys Evans will share the things that graph allows them to do and outline how you can do something similar using a largely open source set of tools.

Speakers: Rhys Evans
Slides: https://dist.neo4j.com/nodes-20202-slides/085%20Hidden%20in%20the%20Clouds%20Using%20Graph%20Technology%20to%20Understand%20Your%20Cloud%20Estate%20-%20NODES2022%20EMEA%20Intermediate%205%20-%20Rhys%20Evans.pdf

3) Using Graph Embeddings for Suspicious Bitcoin Transactions - Adam Turner

This lightning talk describes how to find features of ransomware Bitcoin transactions from graph embeddings using Neo4j Graph Data Science.

Speakers: Adam Turner
Slides: https://dist.neo4j.com/nodes-20202-slides/063%20Using%20Graph%20Embeddings%20for%20Suspicious%20Bitcoin%20Transactions%20-%20NODES2022%20APAC%20Advanced%2010%20-%20Adam%20Turner.pdf

Related Videos