This chapter will introduce you to some of the most commonly used patterns in application development. A lot of these models originated from the way Cassandra internally stores the data and the fact that there is no relational integrity. The chapter has two parts: one discusses data models and the patterns that emerge from the data models, and the other part exploits Cassandra's non-relational ability to store large amounts of data per row.
Although many patterns are discussed in this chapter, it certainly doesn't cover all the cases. Coming up with an innovative modeling approach from a very specific and obscure problem you encounter depends on your imagination. But no matter what the problem is, the most efficient approach is to attack the problem by keeping the following things in mind:
Denormalize, denormalize, and denormalize: Forget about old-school 3NF (read more about Normal Forms at https://en.wikipedia.org/wiki/Database_normalization#Normal_forms). In...