The document discusses using graphs and graph databases to model social network data. It provides an example of a social graph for a person named Emil and his friends. It introduces the concept of a property graph and discusses how Neo4j is a graph database optimized for querying connected data. Cypher is introduced as the graph query language used for Neo4j, which uses pattern matching to query graph structures and relationships.
10-15 511 genetic algorithms and machine learning (alan nochenson)Alan Nochenson
This document discusses machine learning and genetic programming. It defines machine learning as a branch of artificial intelligence that uses data to capture uncertainty in probability distributions in order to yield patterns or predictions. Genetic programming is described as a machine learning technique inspired by biological evolution that uses populations of individuals that are evolved using the Darwinian processes of selection, crossover, and mutation. Examples are given of how genetic programming could be used to evolve a mathematical expression to equal a target number.
Machine Learning, Data Mining, Genetic Algorithms, Neural ...butest
The document discusses various machine learning concepts including concept learning, decision trees, genetic algorithms, and neural networks. It provides details on each concept, such as how concept learning uses positive and negative examples to learn concepts, how decision trees use nodes and branches to classify data, and how genetic algorithms and neural networks are modeled after biological processes. It also gives examples of applications for each concept, such as using decision trees for classification and neural networks for tasks like handwriting recognition where explicit rules are difficult to define.
Finding the insights hidden in your graph dataDataStax
Linkurious is a graph visualization startup that helps companies understand graph data through its product Linkurious Enterprise. Linkurious Enterprise is a web app and API that allows non-technical users to explore relationships and uncover hidden insights in graph databases. It is compatible with DataStax DSE Graph and has been used by over 200 customers, including NASA, for applications such as anti-money laundering investigations, knowledge management, and network management.
20141015 how graphs revolutionize access managementRik Van Bruggen
This document discusses how graph databases can revolutionize access and identity management. It begins with an introduction to graphs and graph databases, explaining how they are well-suited for complex querying of connected data. The document then argues that graph databases allow for a more accurate representation of real-world identity relationships, which are often multi-dimensional, and enable real-time queries that eliminate the need for integration between different systems. A demonstration of a graph database is provided, followed by examples, licensing information and a question and answer section.
Graphgen aims at helping people prototyping a graph database, by providing a visual tool that ease the generation of nodes and relationships with a Cypher DSL.
Many people struggle with not only creating a good graph model of their domain but also with creating sensible example data to test hypotheses or use-cases.
Graphgen aims at helping people with no time but a good enough understanding of their domain model, by providing a visual dsl for data model generation which borrows heavily on Neo4j Cypher graph query language.
The ascii art allows even non-technical users to write and read model descriptions/configurations as concise as plain english but formal enough to be parseable. The underlying generator combines the DSL inputs (structure, cardinalities and amount-ranges) and combines them with a comprehensive fake data generation library to create real-world-like datasets of medium/arbitrary size and complexity.
Users can create their own models combining the basic building blocks of the dsl and share their data-descriptions with others with a simple link.
Algorithmic trading involves using computer algorithms to automate and execute trades electronically. It began in the 1970s with the introduction of electronic trading systems and has grown significantly, making up over 70% of US equity trading by 2009. Algorithmic trading allows for dividing large orders into many smaller trades to minimize market impact and risk. It provides benefits like lower costs and more control over the trading process, but also raises concerns about its role in increased volatility and events like the 2010 Flash Crash.
Bringing graph technologies to data analysis : the case of Azerbaijan in th...Linkurious
This document discusses using graph technologies to analyze data from the Offshore Leaks dataset regarding offshore accounts. It focuses on investigating the offshore accounts and connections of Azerbaijan's President Ilham Aliyev and his family. The analysis finds that President Aliyev controls offshore companies through his family that could be used to collect funds from businessmen awarded construction contracts. A direct connection is also found between President Aliyev and a businessman through one of the offshore accounts.
10-15 511 genetic algorithms and machine learning (alan nochenson)Alan Nochenson
This document discusses machine learning and genetic programming. It defines machine learning as a branch of artificial intelligence that uses data to capture uncertainty in probability distributions in order to yield patterns or predictions. Genetic programming is described as a machine learning technique inspired by biological evolution that uses populations of individuals that are evolved using the Darwinian processes of selection, crossover, and mutation. Examples are given of how genetic programming could be used to evolve a mathematical expression to equal a target number.
Machine Learning, Data Mining, Genetic Algorithms, Neural ...butest
The document discusses various machine learning concepts including concept learning, decision trees, genetic algorithms, and neural networks. It provides details on each concept, such as how concept learning uses positive and negative examples to learn concepts, how decision trees use nodes and branches to classify data, and how genetic algorithms and neural networks are modeled after biological processes. It also gives examples of applications for each concept, such as using decision trees for classification and neural networks for tasks like handwriting recognition where explicit rules are difficult to define.
Finding the insights hidden in your graph dataDataStax
Linkurious is a graph visualization startup that helps companies understand graph data through its product Linkurious Enterprise. Linkurious Enterprise is a web app and API that allows non-technical users to explore relationships and uncover hidden insights in graph databases. It is compatible with DataStax DSE Graph and has been used by over 200 customers, including NASA, for applications such as anti-money laundering investigations, knowledge management, and network management.
20141015 how graphs revolutionize access managementRik Van Bruggen
This document discusses how graph databases can revolutionize access and identity management. It begins with an introduction to graphs and graph databases, explaining how they are well-suited for complex querying of connected data. The document then argues that graph databases allow for a more accurate representation of real-world identity relationships, which are often multi-dimensional, and enable real-time queries that eliminate the need for integration between different systems. A demonstration of a graph database is provided, followed by examples, licensing information and a question and answer section.
Graphgen aims at helping people prototyping a graph database, by providing a visual tool that ease the generation of nodes and relationships with a Cypher DSL.
Many people struggle with not only creating a good graph model of their domain but also with creating sensible example data to test hypotheses or use-cases.
Graphgen aims at helping people with no time but a good enough understanding of their domain model, by providing a visual dsl for data model generation which borrows heavily on Neo4j Cypher graph query language.
The ascii art allows even non-technical users to write and read model descriptions/configurations as concise as plain english but formal enough to be parseable. The underlying generator combines the DSL inputs (structure, cardinalities and amount-ranges) and combines them with a comprehensive fake data generation library to create real-world-like datasets of medium/arbitrary size and complexity.
Users can create their own models combining the basic building blocks of the dsl and share their data-descriptions with others with a simple link.
Algorithmic trading involves using computer algorithms to automate and execute trades electronically. It began in the 1970s with the introduction of electronic trading systems and has grown significantly, making up over 70% of US equity trading by 2009. Algorithmic trading allows for dividing large orders into many smaller trades to minimize market impact and risk. It provides benefits like lower costs and more control over the trading process, but also raises concerns about its role in increased volatility and events like the 2010 Flash Crash.
Bringing graph technologies to data analysis : the case of Azerbaijan in th...Linkurious
This document discusses using graph technologies to analyze data from the Offshore Leaks dataset regarding offshore accounts. It focuses on investigating the offshore accounts and connections of Azerbaijan's President Ilham Aliyev and his family. The analysis finds that President Aliyev controls offshore companies through his family that could be used to collect funds from businessmen awarded construction contracts. A direct connection is also found between President Aliyev and a businessman through one of the offshore accounts.
This document discusses link analysis and summarizes key points in the following 3 sentences:
The document outlines link analysis techniques such as bibliometrics, measures of similarity, ranking algorithms like PageRank and HITS, and characterization of the web graph structure. Hyperlinks provide valuable information for link-based ranking, structure analysis, detection of communities, and spam detection. Quantitative bibliometric laws and statistics are described to analyze patterns of publication citations.
An Introduction to Neural Networks and Machine LearningChris Nicholls
A nontechnical introduction to neural networks, with many examples and pictures. The first talk given at the Balliol College machine learning reading group.
Reinforcing AML systems with graph technologies.Linkurious
Anti-money laundering (AML) has become complex and costly for institutions and enterprises. Nowadays, to thwart criminal intricate strategies, financial crime units have to gather, monitor and investigate large amounts of connected data.
Graph analysis and visualization technologies can provide an holistic view of the various entities and their relationships to unveil wrongdoings.
Anti-money laundering (AML) has become complex and costly for institutions and enterprises. Graph analysis and visualization technologies like Linkurious are a great fit to help AML analysts fight money laundering.
Discover in this presentation how to automate the monitoring of high risk customers with patterns alerts and how to assess risk-levels by visually investigating suspicious cases.
More information on www.linkurio.us
Introduction to the graph technologies landscapeLinkurious
Graph technologies allow modeling of complex relationships and connections through nodes and edges. There are three main layers of graph technologies: graph databases to store graph data, graph analysis frameworks to analyze large graphs, and graph visualization solutions to interact with graphs. Popular tools in each layer include Neo4j and Titan for databases, Giraph and GraphX for analysis, and Gephi and Cytoscape for visualization. Graph technologies are gaining more attention due to their ability to extract insights from connected data.
This document discusses building a scalable data science platform with R. It describes R as a popular statistical programming language with over 2.5 million users. It notes that while R is widely used, its open source nature means it lacks enterprise capabilities for large-scale use. The document then introduces Microsoft R Server as a way to bring enterprise capabilities like scalability, efficiency, and support to R in order to make it suitable for production use on big data problems. It provides examples of using R Server with Hadoop and HDInsight on the Azure cloud to operationalize advanced analytics workflows from data cleaning and modeling to deployment as web services at scale.
GraphGen: Conducting Graph Analytics over Relational DatabasesPyData
This document discusses GraphGen, a tool for conducting graph analytics over relational databases. It begins by introducing graph analytics and its applications. It then discusses the current state of graph analytics, which is fragmented with no single solution. Most organizations store data relationally and have "hidden" graphs that can be extracted. GraphGen provides a declarative language to define nodes and edges to extract these graphs without ETL. It supports various interfaces like Java, Python, and a web application to enable graph analytics over relational data in an intuitive way.
Who am I and why do I feel that the world is not infinitely perfect? Which technologies should I use to rectify this situation? Enter the graph and the graph traversal.
This presentation introduces the graph model as obvious choice for rich and connected data. Graph Databases are a category of open-source NoSQL datastores which are specialized in storing, handling and querying graph structures efficiently.
Use cases represent the applicability of the graph model across many domains.
Neo4j as the most widely used graph database supports the property graph model, which is explained in detail.
To query a graph database a powerful and expressive but also friendly and easily understandable query language that is tailored for graph patterns is key. Neo4j's Cypher is such a query language developed from the ground up to support expressing challenging use-cases in a comprehensive way.
A series of examples rounds up the presentation to apply the lessons learned.
Link Analysis
A technique that use the graph structure in order to determine the relative importance of the nodes (web pages). One of the biggest changes in our lives in the decade following the turn of the century was the availability of efficient and accurate Web search, through search engines such as Google. While Google was not the first search engine, it was the first able to defeat the spammers who had made search almost useless.
Moreover, the innovation provided by Google was a nontrivial technological advance, called “PageRank.” When PageRank was established as an essential technique for a search engine, spammers invented ways to manipulate the PageRank of a Web page, often called link spam. That development led to the response of TrustRank and other techniques for preventing spammers from attacking PageRank.
Business Intelligence For Anti-Money LaunderingKartik Mehta
The document discusses anti-money laundering compliance software implementation following the 2001 enactment of the USA PATRIOT Act. Key points include:
- The Patriot Act delegated responsibility to FinCEN to set requirements for financial institutions to establish anti-money laundering compliance programs.
- Section 352(a) of the Patriot Act amended the Bank Secrecy Act to require financial institutions to establish anti-money laundering programs, including internal policies, a compliance officer, ongoing training, and independent audits.
- The objectives are to help businesses implement Patriot Act directives regarding information sharing about clients with suspicious activity and investigating client accounts and transactions for money laundering or terrorist funding possibilities.
1. Machine learning involves developing algorithms that can learn from data and improve their performance over time without being explicitly programmed. 2. Neural networks are a type of machine learning algorithm inspired by the human brain that can perform both supervised and unsupervised learning tasks. 3. Supervised learning involves using labeled training data to infer a function that maps inputs to outputs, while unsupervised learning involves discovering hidden patterns in unlabeled data through techniques like clustering.
Aanswers · Aanswers ◦ n(I) π
etc...15
15
I is the identity matrix.
The Multi-Relational Path Algebra:
- Allows single-relational algorithms to be applied to multi-relational graphs
- Provides a universal framework for defining paths through a multi-relational
graph
- Enables the computation of multiple primary eigenvectors, each
corresponding to a different path definition
- In effect, provides multiple definitions of centrality for a multi-relational
network
- Is Turing complete—any computable path can be expressed
- Is a general framework—applies to any multi-relational data model
A graph is a structure composed of a set of vertices (i.e.~nodes, dots) connected to one another by a set of edges (i.e.~links, lines). The concept of a graph has been around since the late 19th century, however, only in recent decades has there been a strong resurgence in the development of both graph theories and applications. In applied computing, since the late 1960s, the interlinked table structure of the relational database has been the predominant information storage and retrieval paradigm. With the growth of graph/network-based data and the need to efficiently process such data, new data management systems have been developed. In contrast to the index-intensive, set-theoretic operations of relational databases, graph databases make use of index-free traversals. This presentation will discuss the graph traversal programming pattern and its application to problem-solving with graph databases.
Relational databases power most applications, but new use-cases have requirements that they are not well suited for.
That's why new approaches like graph databases are used to handle join-heavy, highly-connected and realtime aspects of your applications.
This talk compares relational and graph databases, show similarities and important differences.
We do a hands-on, deep-dive into ease of data modeling and structural evolution, massive data import and high performance querying with Neo4j, the most popular graph database.
I demonstrate a useful tool which makes data import from existing relational databases with a non-denormalized ER-model a "one click"-experience.
Which leaves biggest challenge for people coming from a relational background is to adapt some of their existing database experience to new ways of thinking.
Graph Database Management Systems provide an effective
and efficient solution to data storage in current scenarios
where data are more and more connected, graph models are
widely used, and systems need to scale to large data sets.
In this framework, the conversion of the persistent layer of
an application from a relational to a graph data store can
be convenient but it is usually an hard task for database
administrators. In this paper we propose a methodology
to convert a relational to a graph database by exploiting
the schema and the constraints of the source. The approach
supports the translation of conjunctive SQL queries over the
source into graph traversal operations over the target. We
provide experimental results that show the feasibility of our
solution and the efficiency of query answering over the target
database.
Big Graph Analytics on Neo4j with Apache SparkKenny Bastani
In this talk I will introduce you to a Docker container that provides you an easy way to do distributed graph processing using Apache Spark GraphX and a Neo4j graph database. You'll learn how to analyze big data graphs that are exported from Neo4j and consequently updated from the results of a Spark GraphX analysis. The types of analysis I will be talking about are PageRank, connected components, triangle counting, and community detection.
Database technologies have evolved to be able to store big data, but are largely inflexible. For complex graph data models stored in a relational database there may be tedious transformations and shuffling around of data to perform large scale analysis.
Fast and scalable analysis of big data has become a critical competitive advantage for companies. There are open source tools like Apache Hadoop and Apache Spark that are providing opportunities for companies to solve these big data problems in a scalable way. Platforms like these have become the foundation of the big data analysis movement.
Speakers
Designing and Building a Graph Database Application – Architectural Choices, ...Neo4j
Ian closely looks at design and implementation strategies you can employ when building a Neo4j-based graph database solution, including architectural choices, data modelling, and testing.g
Max De Marzi gave an introduction to graph databases using Neo4j as an example. He discussed trends in big, connected data and how NoSQL databases like key-value stores, column families, and document databases address these trends. However, graph databases are optimized for interconnected data by modeling it as nodes and relationships. Neo4j is a graph database that uses a property graph data model and allows querying and traversal through its Cypher query language and Gremlin scripting language. It is well-suited for domains involving highly connected data like social networks.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
This document discusses link analysis and summarizes key points in the following 3 sentences:
The document outlines link analysis techniques such as bibliometrics, measures of similarity, ranking algorithms like PageRank and HITS, and characterization of the web graph structure. Hyperlinks provide valuable information for link-based ranking, structure analysis, detection of communities, and spam detection. Quantitative bibliometric laws and statistics are described to analyze patterns of publication citations.
An Introduction to Neural Networks and Machine LearningChris Nicholls
A nontechnical introduction to neural networks, with many examples and pictures. The first talk given at the Balliol College machine learning reading group.
Reinforcing AML systems with graph technologies.Linkurious
Anti-money laundering (AML) has become complex and costly for institutions and enterprises. Nowadays, to thwart criminal intricate strategies, financial crime units have to gather, monitor and investigate large amounts of connected data.
Graph analysis and visualization technologies can provide an holistic view of the various entities and their relationships to unveil wrongdoings.
Anti-money laundering (AML) has become complex and costly for institutions and enterprises. Graph analysis and visualization technologies like Linkurious are a great fit to help AML analysts fight money laundering.
Discover in this presentation how to automate the monitoring of high risk customers with patterns alerts and how to assess risk-levels by visually investigating suspicious cases.
More information on www.linkurio.us
Introduction to the graph technologies landscapeLinkurious
Graph technologies allow modeling of complex relationships and connections through nodes and edges. There are three main layers of graph technologies: graph databases to store graph data, graph analysis frameworks to analyze large graphs, and graph visualization solutions to interact with graphs. Popular tools in each layer include Neo4j and Titan for databases, Giraph and GraphX for analysis, and Gephi and Cytoscape for visualization. Graph technologies are gaining more attention due to their ability to extract insights from connected data.
This document discusses building a scalable data science platform with R. It describes R as a popular statistical programming language with over 2.5 million users. It notes that while R is widely used, its open source nature means it lacks enterprise capabilities for large-scale use. The document then introduces Microsoft R Server as a way to bring enterprise capabilities like scalability, efficiency, and support to R in order to make it suitable for production use on big data problems. It provides examples of using R Server with Hadoop and HDInsight on the Azure cloud to operationalize advanced analytics workflows from data cleaning and modeling to deployment as web services at scale.
GraphGen: Conducting Graph Analytics over Relational DatabasesPyData
This document discusses GraphGen, a tool for conducting graph analytics over relational databases. It begins by introducing graph analytics and its applications. It then discusses the current state of graph analytics, which is fragmented with no single solution. Most organizations store data relationally and have "hidden" graphs that can be extracted. GraphGen provides a declarative language to define nodes and edges to extract these graphs without ETL. It supports various interfaces like Java, Python, and a web application to enable graph analytics over relational data in an intuitive way.
Who am I and why do I feel that the world is not infinitely perfect? Which technologies should I use to rectify this situation? Enter the graph and the graph traversal.
This presentation introduces the graph model as obvious choice for rich and connected data. Graph Databases are a category of open-source NoSQL datastores which are specialized in storing, handling and querying graph structures efficiently.
Use cases represent the applicability of the graph model across many domains.
Neo4j as the most widely used graph database supports the property graph model, which is explained in detail.
To query a graph database a powerful and expressive but also friendly and easily understandable query language that is tailored for graph patterns is key. Neo4j's Cypher is such a query language developed from the ground up to support expressing challenging use-cases in a comprehensive way.
A series of examples rounds up the presentation to apply the lessons learned.
Link Analysis
A technique that use the graph structure in order to determine the relative importance of the nodes (web pages). One of the biggest changes in our lives in the decade following the turn of the century was the availability of efficient and accurate Web search, through search engines such as Google. While Google was not the first search engine, it was the first able to defeat the spammers who had made search almost useless.
Moreover, the innovation provided by Google was a nontrivial technological advance, called “PageRank.” When PageRank was established as an essential technique for a search engine, spammers invented ways to manipulate the PageRank of a Web page, often called link spam. That development led to the response of TrustRank and other techniques for preventing spammers from attacking PageRank.
Business Intelligence For Anti-Money LaunderingKartik Mehta
The document discusses anti-money laundering compliance software implementation following the 2001 enactment of the USA PATRIOT Act. Key points include:
- The Patriot Act delegated responsibility to FinCEN to set requirements for financial institutions to establish anti-money laundering compliance programs.
- Section 352(a) of the Patriot Act amended the Bank Secrecy Act to require financial institutions to establish anti-money laundering programs, including internal policies, a compliance officer, ongoing training, and independent audits.
- The objectives are to help businesses implement Patriot Act directives regarding information sharing about clients with suspicious activity and investigating client accounts and transactions for money laundering or terrorist funding possibilities.
1. Machine learning involves developing algorithms that can learn from data and improve their performance over time without being explicitly programmed. 2. Neural networks are a type of machine learning algorithm inspired by the human brain that can perform both supervised and unsupervised learning tasks. 3. Supervised learning involves using labeled training data to infer a function that maps inputs to outputs, while unsupervised learning involves discovering hidden patterns in unlabeled data through techniques like clustering.
Aanswers · Aanswers ◦ n(I) π
etc...15
15
I is the identity matrix.
The Multi-Relational Path Algebra:
- Allows single-relational algorithms to be applied to multi-relational graphs
- Provides a universal framework for defining paths through a multi-relational
graph
- Enables the computation of multiple primary eigenvectors, each
corresponding to a different path definition
- In effect, provides multiple definitions of centrality for a multi-relational
network
- Is Turing complete—any computable path can be expressed
- Is a general framework—applies to any multi-relational data model
A graph is a structure composed of a set of vertices (i.e.~nodes, dots) connected to one another by a set of edges (i.e.~links, lines). The concept of a graph has been around since the late 19th century, however, only in recent decades has there been a strong resurgence in the development of both graph theories and applications. In applied computing, since the late 1960s, the interlinked table structure of the relational database has been the predominant information storage and retrieval paradigm. With the growth of graph/network-based data and the need to efficiently process such data, new data management systems have been developed. In contrast to the index-intensive, set-theoretic operations of relational databases, graph databases make use of index-free traversals. This presentation will discuss the graph traversal programming pattern and its application to problem-solving with graph databases.
Relational databases power most applications, but new use-cases have requirements that they are not well suited for.
That's why new approaches like graph databases are used to handle join-heavy, highly-connected and realtime aspects of your applications.
This talk compares relational and graph databases, show similarities and important differences.
We do a hands-on, deep-dive into ease of data modeling and structural evolution, massive data import and high performance querying with Neo4j, the most popular graph database.
I demonstrate a useful tool which makes data import from existing relational databases with a non-denormalized ER-model a "one click"-experience.
Which leaves biggest challenge for people coming from a relational background is to adapt some of their existing database experience to new ways of thinking.
Graph Database Management Systems provide an effective
and efficient solution to data storage in current scenarios
where data are more and more connected, graph models are
widely used, and systems need to scale to large data sets.
In this framework, the conversion of the persistent layer of
an application from a relational to a graph data store can
be convenient but it is usually an hard task for database
administrators. In this paper we propose a methodology
to convert a relational to a graph database by exploiting
the schema and the constraints of the source. The approach
supports the translation of conjunctive SQL queries over the
source into graph traversal operations over the target. We
provide experimental results that show the feasibility of our
solution and the efficiency of query answering over the target
database.
Big Graph Analytics on Neo4j with Apache SparkKenny Bastani
In this talk I will introduce you to a Docker container that provides you an easy way to do distributed graph processing using Apache Spark GraphX and a Neo4j graph database. You'll learn how to analyze big data graphs that are exported from Neo4j and consequently updated from the results of a Spark GraphX analysis. The types of analysis I will be talking about are PageRank, connected components, triangle counting, and community detection.
Database technologies have evolved to be able to store big data, but are largely inflexible. For complex graph data models stored in a relational database there may be tedious transformations and shuffling around of data to perform large scale analysis.
Fast and scalable analysis of big data has become a critical competitive advantage for companies. There are open source tools like Apache Hadoop and Apache Spark that are providing opportunities for companies to solve these big data problems in a scalable way. Platforms like these have become the foundation of the big data analysis movement.
Speakers
Designing and Building a Graph Database Application – Architectural Choices, ...Neo4j
Ian closely looks at design and implementation strategies you can employ when building a Neo4j-based graph database solution, including architectural choices, data modelling, and testing.g
Max De Marzi gave an introduction to graph databases using Neo4j as an example. He discussed trends in big, connected data and how NoSQL databases like key-value stores, column families, and document databases address these trends. However, graph databases are optimized for interconnected data by modeling it as nodes and relationships. Neo4j is a graph database that uses a property graph data model and allows querying and traversal through its Cypher query language and Gremlin scripting language. It is well-suited for domains involving highly connected data like social networks.
Dive into the realm of operating systems (OS) with Pravash Chandra Das, a seasoned Digital Forensic Analyst, as your guide. 🚀 This comprehensive presentation illuminates the core concepts, types, and evolution of OS, essential for understanding modern computing landscapes.
Beginning with the foundational definition, Das clarifies the pivotal role of OS as system software orchestrating hardware resources, software applications, and user interactions. Through succinct descriptions, he delineates the diverse types of OS, from single-user, single-task environments like early MS-DOS iterations, to multi-user, multi-tasking systems exemplified by modern Linux distributions.
Crucial components like the kernel and shell are dissected, highlighting their indispensable functions in resource management and user interface interaction. Das elucidates how the kernel acts as the central nervous system, orchestrating process scheduling, memory allocation, and device management. Meanwhile, the shell serves as the gateway for user commands, bridging the gap between human input and machine execution. 💻
The narrative then shifts to a captivating exploration of prominent desktop OSs, Windows, macOS, and Linux. Windows, with its globally ubiquitous presence and user-friendly interface, emerges as a cornerstone in personal computing history. macOS, lauded for its sleek design and seamless integration with Apple's ecosystem, stands as a beacon of stability and creativity. Linux, an open-source marvel, offers unparalleled flexibility and security, revolutionizing the computing landscape. 🖥️
Moving to the realm of mobile devices, Das unravels the dominance of Android and iOS. Android's open-source ethos fosters a vibrant ecosystem of customization and innovation, while iOS boasts a seamless user experience and robust security infrastructure. Meanwhile, discontinued platforms like Symbian and Palm OS evoke nostalgia for their pioneering roles in the smartphone revolution.
The journey concludes with a reflection on the ever-evolving landscape of OS, underscored by the emergence of real-time operating systems (RTOS) and the persistent quest for innovation and efficiency. As technology continues to shape our world, understanding the foundations and evolution of operating systems remains paramount. Join Pravash Chandra Das on this illuminating journey through the heart of computing. 🌟
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Tatiana Kojar
Skybuffer AI, built on the robust SAP Business Technology Platform (SAP BTP), is the latest and most advanced version of our AI development, reaffirming our commitment to delivering top-tier AI solutions. Skybuffer AI harnesses all the innovative capabilities of the SAP BTP in the AI domain, from Conversational AI to cutting-edge Generative AI and Retrieval-Augmented Generation (RAG). It also helps SAP customers safeguard their investments into SAP Conversational AI and ensure a seamless, one-click transition to SAP Business AI.
With Skybuffer AI, various AI models can be integrated into a single communication channel such as Microsoft Teams. This integration empowers business users with insights drawn from SAP backend systems, enterprise documents, and the expansive knowledge of Generative AI. And the best part of it is that it is all managed through our intuitive no-code Action Server interface, requiring no extensive coding knowledge and making the advanced AI accessible to more users.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Trusted Execution Environment for Decentralized Process MiningLucaBarbaro3
Presentation of the paper "Trusted Execution Environment for Decentralized Process Mining" given during the CAiSE 2024 Conference in Cyprus on June 7, 2024.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
16. His friends introduced more friends
๏ Michael: master hacker
Michael Peter Emil
Andreas
Kerstin
17. His friends introduced more friends
๏ Michael: master hacker
๏ Johan: technology sage
Michael Johan
Peter Emil
Andreas
Kerstin
18. His friends introduced more friends
๏ Michael: master hacker
๏ Johan: technology sage
๏ Madelene: polyglot journalist
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
19. His friends introduced more friends
๏ Michael: master hacker
๏ Johan: technology sage
๏ Madelene: polyglot journalist
๏ Allison: marketing maven
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
20. So, we have a bunch of people
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
21. So, we have a bunch of people
๏ how do we know they are friends?
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
22. So, we have a bunch of people
๏ how do we know they are friends?
๏ either ask each pair: are you friends?
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
23. So, we have a bunch of people
๏ how do we know they are friends?
๏ either ask each pair: are you friends?
๏ or, we can add explicit connections
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
24. So, we have a bunch of people
๏ how do we know they are friends?
๏ either ask each pair: are you friends?
๏ or, we can add explicit connections
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
25. There's a problem here
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
26. There's a problem here
๏ Emil is awesome
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
27. There's a problem here
๏ Emil is awesome
๏ What about other relationships?
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
28. There's a problem here
๏ Emil is awesome
๏ What about other relationships?
๏ We mentioned "introductions" so there must've
been at least some pre-existing connections
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
29. There's a problem here
๏ Emil is awesome
๏ What about other relationships?
๏ We mentioned "introductions" so there must've
been at least some pre-existing connections
Allison
Michael Johan
Peter Emil
Andreas
Madelene Kerstin
31. This can continue...
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
32. This can continue...
๏ this is how social networks grow
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
33. This can continue...
๏ this is how social networks grow
๏ either meet people directly
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
34. This can continue...
๏ this is how social networks grow
๏ either meet people directly
๏ or be introduced
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
35. This can be useful
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
36. This can be useful
๏ professional recommendation (LinkedIn)
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
37. This can be useful
๏ professional recommendation (LinkedIn)
๏ product recommendation (Amazon)
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
38. This can be useful
๏ professional recommendation (LinkedIn)
๏ product recommendation (Amazon)
๏ restaurant recommendations (Yelp)
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
39. This can be useful
๏ professional recommendation (LinkedIn)
๏ product recommendation (Amazon)
๏ restaurant recommendations (Yelp)
๏ same domain, or reaching across domains
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
40. This is really just data
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
41. This is really just data
๏ it's just a graph
Allison
Michael Johan
Peter Emil
Anna
Andreas Adam
Madelene Kerstin
46. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
13
47. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
13
48. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
•suitable for any connected data
13
49. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
•suitable for any connected data
๏ well-understood patterns and algorithms
13
50. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
•suitable for any connected data
๏ well-understood patterns and algorithms
•studied since Leonard Euler's 7 Bridges (1736)
13
51. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
•suitable for any connected data
๏ well-understood patterns and algorithms
•studied since Leonard Euler's 7 Bridges (1736)
•Codd's Relational Model (1970)
13
52. Yes, a graph...
๏ you know the common data structures
•linked lists, trees, object "graphs"
๏ a graph is the general purpose data structure
•suitable for any connected data
๏ well-understood patterns and algorithms
•studied since Leonard Euler's 7 Bridges (1736)
•Codd's Relational Model (1970)
•not a new idea, just an idea who's time is now
13
85. A graph database...
๏ optimized for the connections between records
๏ really, really fast at querying across records
19
86. A graph database...
๏ optimized for the connections between records
๏ really, really fast at querying across records
๏ a database: transactional with the usual
operations
19
87. A graph database...
๏ optimized for the connections between records
๏ really, really fast at querying across records
๏ a database: transactional with the usual
operations
๏ “A relational database may tell you
the average age of everyone at this workshop,
but a graph database will tell you
who is most likely to buy you a beer.”
19
108. We're talking about a
Property Graph
Em Joh
il a n
knows knows
Alli Tob Lar
Nodes
son ias knows s
knows
And And knows
knows rea rés
s
knows knows knows
Pet Miic
Mc knows Ian
er knows a
a
knows knows
De Mic
lia h ael
Relationships
Properties (each a key+value)
+ Indexes (for easy look-ups)
21
113. Cypher - a graph query language
๏ a pattern-matching query language
๏ declarative grammar with clauses (like SQL)
๏ aggregation, ordering, limits
๏ create, read, update, delete
23
114. Cypher - a graph query language
๏ a pattern-matching query language
๏ declarative grammar with clauses (like SQL)
๏ aggregation, ordering, limits
๏ create, read, update, delete
// get node 1, traverse 2 steps away
start a=node(1) match (a)--()--(c) return c
// create a node with a 'name' property
CREATE (me {name: 'Andreas'}) return me
๏ more on this later...
23
143. Cypher - read clauses
// get node 1, traverse 2 steps away
START a=node(1) MATCH (a)--()--(c) RETURN c
// get node from an index, return it
START a=node:users(login='akollegger')
RETURN a
// get node from an index, match, filter
// with where, then return results
START a=node:users(login='akollegger')
MATCH (a)-[r]-(b) WHERE b.login='jakewins'
RETURN r,b
31
149. Cypher - CREATE relationships
LOVES
A B
A -[:LOVES]-> B
// create love between two people
START a=node:people(name='Andreas'),
b=node:people(name='Anna')
CREATE a-[:LOVES]->(b)
33
153. Cypher - CREATE UNIQUE data
LOVES
A B
A -[:LOVES]-> B
// create love between two people
START a=node:people(name='Andreas'),
b=node:people(name='Anna')
CREATE UNIQUE a-[:LOVES]->(b)
34
157. Cypher - CREATE full path
LOVES
A B
A -[:LOVES]-> B
// create an entire path at once
CREATE p=(a {name:'Andreas'})-[:LOVES]->
(b {name:'Anna'}) return p
35
163. Cypher - DELETE data
LOVES
A B
A -[:LOVES]-> B
// Goodbye Anna! remove relationships
START a=node:people(name='Anna')
MATCH a-[r]-(b)
DELETE a,r
37
165. Github - collaborative coding
๏ Hosting of git repositories
๏ Prominent social aspect
• follow other coders
• collaborate with other coders
• branches and forks
• watch repositories
• star repositories
39
169. Github User Graph - complete
heroku
member of
neo4j mattt
follows
member of
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41
170. Github User Graph - complete
heroku
member of
neo4j mattt
follows
member of
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41
171. Github User Graph - complete
heroku
member of
(user)-[:follows]->(users) neo4j mattt
follows
member of
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41
172. Github User Graph - complete
heroku
member of
(user)-[:follows]->(users) neo4j mattt
(user)-[:member_of]->(org)
follows
member of
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41
173. Github User Graph - complete
heroku
member of
(user)-[:follows]->(users) neo4j mattt
(user)-[:member_of]->(org)
(user)-[:owns]->(repository) member of
follows
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41
174. Github User Graph - complete
heroku
member of
(user)-[:follows]->(users) neo4j mattt
(user)-[:member_of]->(org)
(user)-[:owns]->(repository) member of
follows
(user)-[:collaborates_on]->(repos)
akollegger follows jakewins
owns
follows follows
FEC_GRAPH nawroth
follows
collaborates on
jexp
details: http://developer.github.com 41