There are multiple ways to monitor Docker containers. This blog post will explain a few simple and easy to use options. Read on for further explanation and analysis.
In this post, we look at the graph data model used by the International Consortium of Investigative Journalists (ICIJ) and show how to construct it using Cypher in Neo4j. We dissect an example from the leaked data, recreating it using Cypher, and show how the model could be extended.
"Big data" and "data lake" only have meaning to an organization’s vision when they solve business problems by enabling data democratization, re-use, exploration, and analytics. Read on to learn what a data lake is, its various benefits, and what's to come.
System logs are now being generated from more sources than ever, each one as crucial as the last. Can traditional processing and architecture handle this growing and changing scale? Or is there a better fit?