Fw: Another feed question

From: Ben Grodsky <grodsky_at_mediadefender.com>
Date: Thu, 26 Jul 2007 11:46:04 -0700

Any ideas what I should go back to Andrew/Univ Studs with re: his question below?


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky
Sent: Thu Jul 26 11:41:17 2007
Subject: RE: Another feed question

That’s good!

 

1. Would it be possible to get a separate feed that contains supply data for users that are downloading /uploading decoyed files?

 

Months worth of data from both MD and Bay have been compared and there only seems to be an overlap of 15 IPs. That is much lower than to be expected. We are trying to figure out if it’s because the crawlers were looking in different places at different times, differences in data collection method, or something else.

 

Andrew

 

From: Ben Grodsky [mailto:grodsky_at_mediadefender.com]
Sent: Thursday, July 26, 2007 11:25 AM
To: Skinner, Andrew (NBC Universal)
Subject: Re: Another feed question

 

Andrew,

1) We can identify our decoys and we filter them out from your feed. Your feed does not include our decoys.

2) What we see we record. We record query hits, publishes, etc.

-Ben


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky
Sent: Thu Jul 26 11:16:37 2007
Subject: RE: Another feed question



1. Just to be certain. Decoys are detected when gather supply data, they are just removed from the raw data feed we are getting?

2. How does the data collection decide to connect to someone and ultimately record that connection as supply data.







From: Ben Grodsky [mailto:grodsky_at_mediadefender.com]
Sent: Thursday, July 26, 2007 11:13 AM
To: Skinner, Andrew (NBC Universal)
Subject: Re: Another feed question



Andrew,

1) We pull out our decoys. Your feed just has your supply.

2) I don't understand your question.

3) Maximal coverage.

-Ben


----- Original Message -----
From: Skinner, Andrew (NBC Universal) <Andrew.Skinner_at_nbcuni.com>
To: Ben Grodsky
Sent: Thu Jul 26 11:07:47 2007
Subject: Another feed question

Hi Ben,



We’re on a call now and need some clarification on a few points:



- I know we are given raw supply data in the feed. Does supply data include people who are sharing decoys? Is it possible that a person is sharing a decoy file would show up as an entry in the raw data feed? Or are all the supply entries real pirate files?



- What criteria are used by the data collection system to connect someone and record supply data? At what frequency?



- Is the system going for maximum network coverage, or does it target servers/users with higher resources?





Thanks,

Andrew











Received on Fri Sep 14 2007 - 10:56:06 BST

This archive was generated by hypermail 2.2.0 : Sun Sep 16 2007 - 22:19:48 BST