DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Data Engineering
  3. Data
  4. Graph Algorithms in Neo4j: Use Cases for Graph Transactions and Analytics

Graph Algorithms in Neo4j: Use Cases for Graph Transactions and Analytics

We've looked at how graph analytics has progressed through the years, but in this installment, we examine some concrete use cases for graph technology in this department.

Mark Needham user avatar by
Mark Needham
·
Amy Hodler user avatar by
Amy Hodler
·
Nov. 26, 18 · Opinion
Like (2)
Save
Tweet
Share
7.52K Views

Join the DZone community and get the full member experience.

Join For Free

Today's most pressing data challenges center around connections, not just tabulating discrete data. Graph analytics accelerate breakthroughs across industries with more intelligent solutions.

This article series is designed to help you better leverage graph analytics so you can effectively innovate and develop intelligent solutions faster.

Last week we traced the rise of graph analytics. This week we'll explore a few of the many concrete use cases for graph technology.

In the coming weeks, we'll look at how graph technology is driving emerging AI applications and then dive deeper into the practical applications of graph algorithms, using examples from Neo4j, the world's leading graph database.

From Chatbots to Cybersecurity

Graph technology is versatile and supports a broad swath of use cases. For example, eBay's ShopBot uses Neo4j to deliver real-time, personalized user experiences and recommendations (see graph below).

Cybersecurity and fraud systems correlate network, social and IoT data to uncover patterns. More accurate modeling and decisioning for a range of dynamic networks drives use cases from subsecond packaging of financial commodities and routing logistics to IT service assurance to predicting the spread of epidemics.

Graph technologies help businesses with many practical use cases across industries and domains, a few of which are highlighted in the sections that follow.

Real-Time Fraud Detection

Traditional fraud prevention measures focus on discrete data points such as specific account balances, money transfers, transaction streams, individuals, devices or IP addresses. However, today's sophisticated fraudsters escape detection by forming fraud rings comprised of stolen and synthetic identities.

To uncover such fraud rings, it is essential to look beyond individual data points to the connections that link them. Connections are key to identifying and stopping fraud rings and their ever-shifting patterns of activities. Graph analytics enable us to detect fraud in real-time and shows us that, indeed, fraud has a shape.

Real-Time Recommendations

Graph-powered recommendation engines help companies personalize products, content, and services by contextualizing a multitude of connections in real time. Making relevant recommendations in real time requires the ability to correlate product, customer, historic preferences and attributes, inventory, supplier, logistics and even social sentiment data.

A real-time recommendation engine requires the ability to instantly capture any new interests shown during the customer's current visit — something that batch processing can't accomplish.

360-Degree View of Data

As businesses become more customer-centric, it has never been more urgent to tap the connections in your data to make timely operational decisions. This requires a technology to unify your master data, including customer, product, supplier and logistics information to power the next generation of e-commerce, supply chain, and logistics applications.

Organizations gain transformative, real-time business insights from relationships in master data when storing and modeling data as a graph. This translates to highlighting time- and cost-saving queries around data ownership, customer experience and support, organizational hierarchies, human capital management, and supply chain transparency.

A flexible graph database model organizes and connects all of an organization's master data to provide a live, real-time 360° view of customers.

Streamline Regulatory Requirements

Graph technology offers an effective and efficient way to comply with sweeping regulations like the EU's General Data Protection Regulation (GDPR), which requires that businesses connect all of the data that they have about their customers and prospects.

Organizations manage enterprise risk by providing both the user-facing toolkit that allows individuals to curate their own data records and the data lineage proof points to demonstrate compliance to authorities.

Management and Monitoring of Complex Networks

Graph platforms are inherently suitable for making sense of complex interdependencies central to managing networks and IT infrastructure. This is especially important in a time of increasing automation and containerization across both cloud and on-premises data centers. Graphs keep track of these interdependencies and ensure that an accurate representation of operations is available at all times, no matter how dynamic the network and IT environment.

Identity and Access Management

To verify an accurate identity, the system needs to traverse through a highly interconnected dataset that is continually growing in size and complexity as employees, partners, and customers enter and leave the system. Users, roles, products, and permissions are not only growing in number but also in matrixed relationships where standard "tree" hierarchies are less relevant.

Traditional systems no longer deliver real-time query performance required by two-factor authentication systems, resulting in long wait times for users. Using a graph database for identity and access management enables you to quickly and effectively track users, assets, devices, relationships and authorizations in this dynamic environment.

Social Applications or Features

Social media networks are already graphs, so there's no point converting a graph into tables and then back again by building a social network on an RDBMS. Having a data model that directly matches your domain model helps you better understand your data, communicate more effectively and avoid needless work.

A graph database such as Neo4j enables you to easily leverage social connections or infer relationships based on user activity to power your social network application or add social features to internal applications.

Conclusion

We've covered just a few of the use cases that are fueled by graph technology. Next week we'll look take a deeper dive into one particularly exciting area: graph technology and AI applications.

Graph (Unix) Data (computing) Analytics Neo4j Database application Algorithm IT Network

Published at DZone with permission of Mark Needham, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • How To Generate Code Coverage Report Using JaCoCo-Maven Plugin
  • Architectural Miscalculation and Hibernate Problem "Type UUID but Expression Is of Type Bytea"
  • Kubernetes vs Docker: Differences Explained
  • Why the World Is Moving Towards Serverless Computing

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: