If we look at TSDB, Kiji, Asynch HBase, it looks like extensions to HBase already exist.
I haven't looked at Salesforce,com's SQL interface, but I suspect that they too have some sort of framework where they have to enforce typing. Sent from a remote device. Please excuse any typos... Mike Segel On Mar 17, 2013, at 10:01 PM, ramkrishna vasudevan <ramkrishna.s.vasude...@gmail.com> wrote: > HBase shipping a generic framework for different interfaces is needed for > ease of use for the users. +1 on the idea. > Getting out the correct result for float values, positive and negative > integers had to be taken care by the users or by using some wrappers. > > This will help to solve that problem to a great extent. > > Regards > Ram > > On Sun, Mar 17, 2013 at 10:54 PM, Mohamed Ibrahim > <mibra...@mibrahim.net>wrote: > >> I'm not a lawyer, but I think we're ok as long as it's in source code as >> that is protected under freedom of speech in the US. See here ( >> http://en.wikipedia.org/wiki/Cryptography ) under Export Control, the part >> related to Bernstein v. United States . I don't know about binaries like >> deb, but I can tell that we download binaries for browsers every day and >> they use encryption in lots of places. I believe if there's any real issues >> it would have surfaced up by now. >> >> As far as types in HBase, I think it is an excellent idea. I would suggest >> to enable us to add a custom type, just like we can add our custom filters. >> Some types that I had to code myself include CSV. There can be other custom >> types that I need in the future, may be json, so the ability to add a >> custom type might be a good feature. >> >> Thanks, >> Mohamed >> >> >> On Sun, Mar 17, 2013 at 1:12 PM, Andrew Purtell <apurt...@apache.org> >> wrote: >> >>>> This then leads to another question... suppose Apache does add >> encryption >>> to Hadoop. While the Apache organization does have the proper paperwork >> in >>> place, what then happens to Cloudera, Hortonworks, EMC, IBM, Intel, etc ? >>> >>> Well I can't put that question aside since you've brought it up now >>> twice and encryption feature candidates for Apache Hadoop and Apache >> HBase >>> are something I have been working on. Its a valid question but since as >> you >>> admit you don't know what you are talking about, perhaps stating >> uninformed >>> opinions can be avoided. Only the latter is what I object to. I think the >>> short answer is as an Apache contributor I'm concerned about the Apache >>> product. Downstream repackagers can take whatever action needed including >>> changes, since it is open source, or feedback about it representing a >>> hardship. At this point I have heard nothing like that. I work for Intel >>> and can say we are good with it. >>> >>> On Sunday, March 17, 2013, Michael Segel wrote: >>> >>>> Its not a question of FUD, but that certain types of >>> encryption/decryption >>>> code falls under the munitions act. >>>> See: http://www.fas.org/irp/offdocs/eo_crypt_9611_memo.htm >>>> >>>> Having said that, there is this: >>>> http://www.bis.doc.gov/encryption/encfaqs6_17_02.html >>>> >>>> In short, I don't as a habit export/import encryption technology so I >> am >>>> not up to speed on the current state of the laws. >>>> Which is why I have to question the current state of the US encryption >>>> laws. >>>> >>>> This then leads to another question... suppose Apache does add >> encryption >>>> to Hadoop. While the Apache organization does have the proper paperwork >>> in >>>> place, what then happens to Cloudera, Hortonworks, EMC, IBM, Intel, >> etc ? >>>> >>>> But lets put that question aside. >>>> >>>> The point I was trying to make was that the core Sun JVM does support >> MD5 >>>> and SHA-1 out of the box, so that anyone running Hadoop and using the >>>> 1.6_xx or the 1.7_xx versions of the JVM will have these packages. >>>> >>>> Adding hooks that use these classes are a no brainer. However, beyond >>>> this... you tell me. >>>> >>>> -Mike >>>> >>>> On Mar 16, 2013, at 7:59 AM, Andrew Purtell <apurt...@apache.org> >> wrote: >>>> >>>>> The ASF avails itself of an exception to crypto export which only >>>> requires >>>>> a bit of PMC housekeeping at release time. So "is not [ok]" is FUD. I >>>>> humbly request we refrain from FUD here. See >>>>> http://www.apache.org/dev/crypto.html. To the best of our knowledge >> we >>>>> expect this to continue, though the ASF has not updated this policy >> yet >>>> for >>>>> recent regulation updates. >>>>> >>>>> On Saturday, March 16, 2013, Michel Segel wrote: >>>>> >>>>>> I also want to add that you could add MD5 and SHA-1, but I'd check >> on >>> us >>>>>> laws... I think these are ok, however other encryption/decryption >> code >>>> is >>>>>> not. >>>>>> >>>>>> They are part of the std sun java libraries ... >>>>>> >>>>>> Sent from a remote device. Please excuse any typos... >>>>>> >>>>>> Mike Segel >>>>>> >>>>>> On Mar 16, 2013, at 7:18 AM, Michel Segel < >> michael_se...@hotmail.com> >>>>>> wrote: >>>>>> >>>>>>> Isn't that what you get through add on frameworks like TSDB and >> Kiji >>> ? >>>>>> Maybe not on the client side, but frameworks that extend HBase... >>>>>>> >>>>>>> Sent from a remote device. Please excuse any typos... >>>>>>> >>>>>>> Mike Segel >>>>>>> >>>>>>> On Mar 16, 2013, at 12:45 AM, lars hofhansl <la...@apache.org> >>> wrote: >>>>>>> >>>>>>>> I think generally we should keep HBase a byte[] based key value >>> store. >>>>>>>> What we should add to HBase are tools that would allow client side >>>> apps >>>>>> (or libraries) to built functionality on top of plain HBase. >>>>>>>> >>>>>>>> Serialization that maintains a correct semantic sort order is >>>> important >>>>>> as a building block, so is code that can build up correctly >> serialized >>>> and >>>>>> sortable compound keys, as well as hashing algorithms. >>>>>>>> >>>>>>>> Where I would draw the line is adding types to HBase itself. As >> long >>>> as >>>>>> one can write a client, or Filters, or Coprocessors with the tools >>>> provided >>>>>> by HBase we're good. Higher level functionality can then be built of >>> on >>>> top >>>>>> of HBase. >>>>>>>> >>>>>>>> >>>>>>>> For example, maybe we need to add better access API to the HBase >> WAL >>>> in >>>>>> order to have an external library implement idempotent transactions >>>> (which >>>>>> can be used to implement 2ndary indexes). >>>>>>>> Maybe some other primitives have to be exposed in order to allow >> an >>>>>> external library to implement full transactions. >>>>>>>> Or we might need a statistics framework (such as the one that >> Jesse >>> is >>>>>> working on). >>>>>>>> >>>>>>>> These are all building blocks that do not presume specific access >>>>>> patterns or clients, but can be used to implement them. >>>>>>>> >>>>>>>> >>>>>>>> As usual, just my $0.02. >>>>>>>> >>>>>>>> -- Lars >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> ________________________________ >>>>>>>> From: Nick Dimiduk <ndimi...@gmail.com> >>>>>>>> To: user@hbase.apache.org >>>>>>>> Sent: Friday, March 15, 2013 10:57 AM >>>>>>>> Subject: Re: HBase type support >>>>>>>> >>>>>>>> I'm talking about MD5, SHA1, etc. It's something explicitly >>> mentioned >>>>>>>> in HBASE-7221. >>>>>>>> >>>>>>>> On Fri, Mar 15, 2013 at 10:55 AM, James Taylor < >>>> jtay...@salesforce.com >>>>>>> wrote: >>>>>>>> >>>>>>>>> Hi Nick, >>>>>>>>> What do you mean by "hashing algorithms"? >>>>>>>>> Thanks, >>>>>>>>> James >>>>>>>>> >>>>>>>>> >>>>>>>>> On 03/15/2013 10:11 AM, Nick Dimiduk wrote: >>>>>>>>> >>>>>>>>>> Hi David, >>>>>>>>>> >>>>>>>>>> Native support for a handful of hashing algorithms has also been >>> >>> >>> >>> -- >>> Best regards, >>> >>> - Andy >>> >>> Problems worthy of attack prove their worth by hitting back. - Piet Hein >>> (via Tom White) >>