SlideShare a Scribd company logo
1 of 21
Download to read offline
Database popularity changes per category, February 2017 - DB
Engines ranking.
Cyber-security
Servers, switches, routers,
applications, etc.
Suspicious activity patterns,
identify impact of a compromised
asset.
IT Operations
Servers, switches, routers,
applications, etc.
Impact analysis, root cause
analysis.
Intelligence
People, emails, transactions,
phone call records, social.
Detecting and investigating
criminal or terrorist networks.
AML
People, transactions, watch-lists,
companies, organizations.
Detecting suspicious
transactions, identify beneficiary
owners.
Fraud
Claims, people, financial records,
personal data.
Detecting and investigating
criminal networks.
Life Sciences
Proteins, publications,
researchers, patents, topics.
Understanding protein
interactions, new drugs.
Enterprise
Architecture
Servers, applications, metadata,
business objectives.
Data lineage, curating enterprise
architecture.
Bibliography :
●
●
●
●
●
●
●
●
●

More Related Content

What's hot

Generating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&DGenerating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&D
Merlien Institute
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
CompTIA
 
Digital Data Layer
Digital Data LayerDigital Data Layer
Digital Data Layer
Aaron Fossum
 

What's hot (20)

Graph Database
Graph Database  Graph Database
Graph Database
 
Data Mining Projects Research Ideas
Data Mining Projects Research IdeasData Mining Projects Research Ideas
Data Mining Projects Research Ideas
 
Enterprise data architecture of complex distributed applications & services
Enterprise data architecture of complex distributed applications & servicesEnterprise data architecture of complex distributed applications & services
Enterprise data architecture of complex distributed applications & services
 
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial FraudGraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
GraphDay Stockholm - Levaraging Graph-Technology to fight Financial Fraud
 
GraphDay Stockholm - Fraud Prevention
GraphDay Stockholm - Fraud PreventionGraphDay Stockholm - Fraud Prevention
GraphDay Stockholm - Fraud Prevention
 
Data Science, Personalisation & Product management
Data Science, Personalisation & Product managementData Science, Personalisation & Product management
Data Science, Personalisation & Product management
 
Fraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph LearningFraud Detection and Compliance with Graph Learning
Fraud Detection and Compliance with Graph Learning
 
Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017Knowledge Graphs Webinar- 11/7/2017
Knowledge Graphs Webinar- 11/7/2017
 
Social review
Social reviewSocial review
Social review
 
Generating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&DGenerating actionable consumer insights from analytics - Telekom R&D
Generating actionable consumer insights from analytics - Telekom R&D
 
Meaningful User Experience
Meaningful User ExperienceMeaningful User Experience
Meaningful User Experience
 
EVOLVING PATTERNS IN BIG DATA - NEIL AVERY
EVOLVING PATTERNS IN BIG DATA - NEIL AVERYEVOLVING PATTERNS IN BIG DATA - NEIL AVERY
EVOLVING PATTERNS IN BIG DATA - NEIL AVERY
 
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
Anti-Fraud and eDiscovery using Graph Databases and Graph Visualization - Cor...
 
Ijda
IjdaIjda
Ijda
 
GraphTour - How to Build Next-Generation Solutions using Graph Databases
GraphTour - How to Build Next-Generation Solutions using Graph DatabasesGraphTour - How to Build Next-Generation Solutions using Graph Databases
GraphTour - How to Build Next-Generation Solutions using Graph Databases
 
Top Uses of Twitter Data
Top Uses of Twitter DataTop Uses of Twitter Data
Top Uses of Twitter Data
 
Ijda
IjdaIjda
Ijda
 
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
Is Your Staff Big Data Ready? 5 Things to Know About What It Will Take to Suc...
 
Smart Data Webinar: Knowledge as a Service
Smart Data Webinar: Knowledge as a ServiceSmart Data Webinar: Knowledge as a Service
Smart Data Webinar: Knowledge as a Service
 
Digital Data Layer
Digital Data LayerDigital Data Layer
Digital Data Layer
 

Viewers also liked

Scott Chacon - Cuento de tres árboles
Scott Chacon - Cuento de tres árbolesScott Chacon - Cuento de tres árboles
Scott Chacon - Cuento de tres árboles
StarTech Conference
 

Viewers also liked (13)

Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis. Using graphs technologies for intelligence analysis.
Using graphs technologies for intelligence analysis.
 
Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.Reinforcing AML systems with graph technologies.
Reinforcing AML systems with graph technologies.
 
Scott Chacon - Cuento de tres árboles
Scott Chacon - Cuento de tres árbolesScott Chacon - Cuento de tres árboles
Scott Chacon - Cuento de tres árboles
 
サービスデザインのエンジンとしての“わたしの体験“ワークショップ
サービスデザインのエンジンとしての“わたしの体験“ワークショップサービスデザインのエンジンとしての“わたしの体験“ワークショップ
サービスデザインのエンジンとしての“わたしの体験“ワークショップ
 
Vincit Dev Talk
Vincit Dev TalkVincit Dev Talk
Vincit Dev Talk
 
FDW-based Sharding Update and Future
FDW-based Sharding Update and FutureFDW-based Sharding Update and Future
FDW-based Sharding Update and Future
 
Dynamics PSA demo
Dynamics PSA demoDynamics PSA demo
Dynamics PSA demo
 
TwitterのOAuth脆弱性
TwitterのOAuth脆弱性TwitterのOAuth脆弱性
TwitterのOAuth脆弱性
 
Foreign exchange market in india
Foreign  exchange market in indiaForeign  exchange market in india
Foreign exchange market in india
 
BaaSでゲームサーバを作る話
BaaSでゲームサーバを作る話BaaSでゲームサーバを作る話
BaaSでゲームサーバを作る話
 
Fases de un proyecto de desarrollo de software
Fases de un proyecto de desarrollo de softwareFases de un proyecto de desarrollo de software
Fases de un proyecto de desarrollo de software
 
2時間で変わるお助けパワポ術
2時間で変わるお助けパワポ術2時間で変わるお助けパワポ術
2時間で変わるお助けパワポ術
 
microprofile
microprofilemicroprofile
microprofile
 

Similar to Linkurious SDK: Build enterprise-ready graph applications faster

Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
rosemariebrayshaw
 

Similar to Linkurious SDK: Build enterprise-ready graph applications faster (20)

Big data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-businessBig data-analytics-changing-way-organizations-conducting-business
Big data-analytics-changing-way-organizations-conducting-business
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security
 
new.pptx
new.pptxnew.pptx
new.pptx
 
Southwestern Business Administration JournalVolume 16 Is.docx
Southwestern Business Administration JournalVolume 16  Is.docxSouthwestern Business Administration JournalVolume 16  Is.docx
Southwestern Business Administration JournalVolume 16 Is.docx
 
Text mining and data mining
Text mining and data mining Text mining and data mining
Text mining and data mining
 
What exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptxWhat exactly is big data? What exactly is big data? .pptx
What exactly is big data? What exactly is big data? .pptx
 
IRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth EnhancementIRJET- Big Data Management and Growth Enhancement
IRJET- Big Data Management and Growth Enhancement
 
Big Data and Massive Analytics
Big Data and Massive AnalyticsBig Data and Massive Analytics
Big Data and Massive Analytics
 
Big Data Architecture Intro and its implementation in the insutry.pptx
Big Data Architecture Intro and its implementation in the insutry.pptxBig Data Architecture Intro and its implementation in the insutry.pptx
Big Data Architecture Intro and its implementation in the insutry.pptx
 
Data Mining
Data MiningData Mining
Data Mining
 
Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016Aujas incident management webinar deck 08162016
Aujas incident management webinar deck 08162016
 
DATA, TEXT, AND WEB MINING FOR BUSINESS INTELLIGENCE: A SURVEY
DATA, TEXT, AND WEB MINING FOR BUSINESS INTELLIGENCE: A SURVEYDATA, TEXT, AND WEB MINING FOR BUSINESS INTELLIGENCE: A SURVEY
DATA, TEXT, AND WEB MINING FOR BUSINESS INTELLIGENCE: A SURVEY
 
Metadata and Analytics
Metadata and AnalyticsMetadata and Analytics
Metadata and Analytics
 
Advance analytics -concepts related to drive into next wave of BI
Advance analytics -concepts related to drive into next wave of BIAdvance analytics -concepts related to drive into next wave of BI
Advance analytics -concepts related to drive into next wave of BI
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 

More from Linkurious

Linkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4jLinkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4j
Linkurious
 

More from Linkurious (20)

Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8Webinar: What's new in Linkurious Enterprise 2.8
Webinar: What's new in Linkurious Enterprise 2.8
 
What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7What's new in Linkurious Enterprise 2.7
What's new in Linkurious Enterprise 2.7
 
How to visualize Cosmos DB graph data
How to visualize Cosmos DB graph dataHow to visualize Cosmos DB graph data
How to visualize Cosmos DB graph data
 
GraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph VisualizationGraphTech Ecosystem - part 3: Graph Visualization
GraphTech Ecosystem - part 3: Graph Visualization
 
Getting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious EnterpriseGetting started with Cosmos DB + Linkurious Enterprise
Getting started with Cosmos DB + Linkurious Enterprise
 
GraphTech Ecosystem - part 2: Graph Analytics
 GraphTech Ecosystem - part 2: Graph Analytics GraphTech Ecosystem - part 2: Graph Analytics
GraphTech Ecosystem - part 2: Graph Analytics
 
GraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph DatabasesGraphTech Ecosystem - part 1: Graph Databases
GraphTech Ecosystem - part 1: Graph Databases
 
3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat3 types of fraud graph analytics can help defeat
3 types of fraud graph analytics can help defeat
 
Graph analytics in Linkurious Enterprise
Graph analytics in Linkurious EnterpriseGraph analytics in Linkurious Enterprise
Graph analytics in Linkurious Enterprise
 
Visualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your DataVisualize the Knowledge Graph and Unleash Your Data
Visualize the Knowledge Graph and Unleash Your Data
 
Graph-based Product Lifecycle Management
Graph-based Product Lifecycle ManagementGraph-based Product Lifecycle Management
Graph-based Product Lifecycle Management
 
Detecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and LinkuriousDetecting eCommerce Fraud with Neo4j and Linkurious
Detecting eCommerce Fraud with Neo4j and Linkurious
 
Graph-based Network & IT Management.
Graph-based Network & IT Management.Graph-based Network & IT Management.
Graph-based Network & IT Management.
 
Graph-powered data lineage in Finance
Graph-powered data lineage in FinanceGraph-powered data lineage in Finance
Graph-powered data lineage in Finance
 
The 8 most common graph visualization mistakes
The 8 most common graph visualization mistakesThe 8 most common graph visualization mistakes
The 8 most common graph visualization mistakes
 
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaksPanama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
Panama papers: how ICIJ used Linkurious to investigate the Mossack Fonseca leaks
 
La visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraudeLa visualisation au service de la lutte contre la fraude
La visualisation au service de la lutte contre la fraude
 
Graph analysis of the European public tenders
Graph analysis of the European public tendersGraph analysis of the European public tenders
Graph analysis of the European public tenders
 
Using graph technologies to fight fraud
Using graph technologies to fight fraudUsing graph technologies to fight fraud
Using graph technologies to fight fraud
 
Linkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4jLinkurious Enterprise: graph visualization platform neo4j
Linkurious Enterprise: graph visualization platform neo4j
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 

Linkurious SDK: Build enterprise-ready graph applications faster

  • 1.
  • 2.
  • 3. Database popularity changes per category, February 2017 - DB Engines ranking.
  • 4. Cyber-security Servers, switches, routers, applications, etc. Suspicious activity patterns, identify impact of a compromised asset. IT Operations Servers, switches, routers, applications, etc. Impact analysis, root cause analysis. Intelligence People, emails, transactions, phone call records, social. Detecting and investigating criminal or terrorist networks. AML People, transactions, watch-lists, companies, organizations. Detecting suspicious transactions, identify beneficiary owners. Fraud Claims, people, financial records, personal data. Detecting and investigating criminal networks. Life Sciences Proteins, publications, researchers, patents, topics. Understanding protein interactions, new drugs. Enterprise Architecture Servers, applications, metadata, business objectives. Data lineage, curating enterprise architecture.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.