Codetown ::: a software developer's community
Are you interested in learning about graph databases? The folks at Neo4J published a book and it's free! Here's a link to the download page: http://graphdatabases.com/
Tags:
Database representation of graph-structured information is fascinating in its own right.
I have been studying genomics technology in which graphs play a big role, both as information-structure that is the basis of certain algorithms, as well as the data driving visualizations or visually-interesting real-world structures.
As an example, here is a visualization of a protein complex that catches the eye.
See http://en.wikipedia.org/wiki/FOXP2#/media/File:Protein_FOXP2_PDB_2a...
The image is a Richardson diagram which is (mostly) automatically generated from a database describing the molecular structure of the protein. This type of diagram was invented (i.e. originally hand-drawn) by Jane Richardson, PhD.
I wonder if the book "Graph Databases" touches on this.
Presently, I am doing a research study on a particular feature of the epigenome. It involves large DNA databases (actually, structured flat files), elaborate algorithms for sequence correlation, and histone complexes. Each of these involves graph-theoretic representations and inference functions from graph structures.
The "databases" I know for DNA, the transcriptome, pathways, etc. do not lend themselves to conventional SQL, or even noSQL as far as I know to date. (Chime in anyone? )
I will be presenting a paper at the IEEE SouthCon conference in April 2015 which touches on a graph-theoretic feature of certain (sequencing) problems lending itself to massively-parallel-ization of linearly-expressable algorithms.
I am pleased to see a free book on graph databases. Thanks!
Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.
Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.
Check out the Codetown Jobs group.

The Danube release of the Gaia-X trust framework provides mechanisms for the automation of compliance and supports interoperability across sectors and geographies to ensure trusted data transactions and service interactions. The Gaia-X Summit 2025 hosted facilitated discussions on AI and data sovereignty, and presented data space solutions that support innovation across Europe and beyond.
By Ben Linders
AWS has launched its European Sovereign Cloud with a €7.8 billion investment, designed to meet EU regulatory demands and address data privacy concerns amid geopolitical tensions. Despite its operational separation from global regions, questions linger about legal protections against U.S. data access. Competitors like Microsoft and local providers may present stronger sovereignty options.
By Steef-Jan Wiggers
Kyra Mozley discusses the evolution of autonomous vehicle perception, moving beyond expensive manual labeling to an embedding-first architecture. She explains how to leverage foundation models like CLIP and SAM for auto-labeling, RAG-inspired search, and few-shot adapters. This talk provides engineering leaders a blueprint for building modular, scalable vision systems that thrive on edge cases.
By Kyra Mozley
In this series, we examine what happens after the proof of concept and how AI becomes part of the software delivery pipeline. As AI transitions from proof of concept to production, teams are discovering that the challenge extends beyond model performance to include architecture, process, and accountability. This transition is redefining what constitutes good software engineering.
By Arthur Casals
To prevent agents from obeying malicious instructions hidden in external data, all text entering an agent's context must be treated as untrusted, says Niv Rabin, principal software architect at AI-security firm CyberArk. His team developed an approach based on instruction detection and history-aware validation to protect against both malicious input data and context-history poisoning.
By Sergio De Simone
© 2026 Created by Michael Levin.
Powered by