Re: BitTorrent Methodology

From: Ben Grodsky <grodsky_at_mediadefender.com>
Date: Thu, 10 May 2007 11:51:37 -0700

Andrew,

Fine by me. Jay and I are available Thursday or Friday next week. We're booked already for the beginning of the week. Let me know what day/time is good for you and whether we should set up the conference call line or if you will.

Thanks.

-Ben


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky; Jay Mairs
Cc: Markham, Aaron (NBC Universal) <Aaron.Markham_at_nbcuni.com>; Amaechi L. Okonko
Sent: Thu May 10 11:42:31 2007
Subject: RE: BitTorrent Methodology

Hi Ben,

 

Jay answered most of the questions last week by email. Necip is pretty tight on time today so why don’t we push the call back to next week.

 

 

Andrew

 

________________________________

From: Ben Grodsky [mailto:grodsky_at_mediadefender.com]
Sent: Tuesday, May 08, 2007 11:48 AM
To: Skinner, Andrew (NBC Universal); Jay Mairs
Cc: Markham, Aaron (NBC Universal); Amaechi L. Okonko
Subject: Re: BitTorrent Methodology

 

Andrew,

Do we have a call time set? I'm still on holiday and don't see it scheduled. Is it possible to have this call at either 11 am or 2 pm on Thurs?

Thanks,
Ben


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky; Jay Mairs
Cc: Markham, Aaron (NBC Universal) <Aaron.Markham_at_nbcuni.com>
Sent: Thu May 03 13:50:29 2007
Subject: RE: BitTorrent Methodology

Next Thursday will be fine. I think that most of the questions about supply and demand can be answered through some quick email exchanges though. Jay, would you mind sparing a few moments to clarify the following:



1. Are IP addresses time stamped and collected during countermeasures? Is it possible to figure out if countermeasures were used on user X, and If so, how many times and when? During the call we will most likely be discussing these questions in regard to ed2k user hash.





2. How is supply measured and collected? Basically, how do you define supply? If a swarm is entered and supply data is captured will existing users be counted again if it is revisited at a later time?





3. How is demand measured and collected? How do you define demand?





4. How do spoofs, decoys, swarming, and interdiction affect supply and demand numbers? Are these counts included, counted separate, or not included in the supply/demand numbers?







Thanks,



Andrew





________________________________

From: Ben Grodsky [mailto:grodsky_at_mediadefender.com]
Sent: Wednesday, May 02, 2007 12:19 PM
To: Skinner, Andrew (NBC Universal); Markham, Aaron (NBC Universal)
Cc: Randy Saaf; Jay Mairs
Subject: RE: BitTorrent Methodology



Aaron and Andrew,

Attached please find our BitTorrent testing methodology. This is what our QA team does. We added the last step as a way for your team to help us improve our BitTorrent effectiveness for your titles.

Thanks,

Ben

________________________________

From: Ben Grodsky
Sent: Tue 01-May-07 15:13
To: 'Andrew.Skinner_at_nbcuni.com'; Jay Mairs
Cc: 'doganaksoy_at_crd.ge.com'
Subject: Re:

Andrew,

I'm out Thursday (this week) through Wednesday (next week). Could we set a call for Thursday next week?

Thanks,
Ben


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky; Jay Mairs
Cc: Doganaksoy, Necip (GE, Research) <doganaksoy_at_crd.ge.com>
Sent: Tue May 01 14:56:03 2007
Subject:

Hi Ben & Jay,



Are you guys open for a call this Friday? Necip and I would like to discuss how supply and demand are measured, as well as how user hashes are collected. I’ll be free for the rest of the day if one of you would like to clear some stuff up ahead of time.





Thanks,



Andrew

818.777.3491

Received on Fri Sep 14 2007 - 10:55:56 BST

This archive was generated by hypermail 2.2.0 : Sun Sep 16 2007 - 22:19:46 BST