Premium Essay

P2P Case Study

In: Business and Management

Submitted By knight626
Words 349
Pages 2
“Introducing Scrum at P2P” in Larson and Gray, 6e, Pages 609-613.

Please read and study the case “Introducing Scrum at P2P” in Larson and Gray, 6e, pages 609-613. Please prepare your answers to the following questions (1.5 line spacing, maximum 4 pages) and submit your answer document to Canvas. Please also bring your answers to class for our discussion.
Part A: 1. How well is Scrum working?

The case is basically a tale of two sprints. During the first sprint, Scrum guidelines were adhered to and significant progress was made on the project. The team has evolved into self organizing group and is energized. Unfortunately during the second sprint, the project deviated from Scrum guidelines and the team seems less energized and productivity has declined.

2. What are the issues confronting the Big Foot project?

Prem started off well but as soon as the project experienced trouble during the second sprint he resorted back to the traditional role of project manager as task master. Admittedly there is fine line between coaching and directing, but he needed to play a less assertive role in solving the integration problem. Here, instead of telling the team what to do, he could have poised questions that would have helped them to solve the problem themselves. This is a hard thing to do when you are under time pressure and you are confident you have the answer. He exacerbated the problem by taking control of the daily scrum away from the team. The synergy that had developed during the first sprint dissipated as team members no longer felt personally responsible for their tasks. Not only did motivation suffer, but the project likely suffered by not tapping into the collective expertise of the team.

A second major issue is Prem acquiescing to Isaac’s request to change the work on the second sprint and extending the deadline. This violates one of Scrum’s…...

Similar Documents

Free Essay

Classification of Botnet Detection Based on Botnet Architechture

...Botnet approaches in the near future. Keywords- Botnet; Bot; Malware; Malicious code; P2P; Honeypot functions programmed by the Bot-master in automated way. Bots can receive commands from the Bot-master and work according to those commands to perform many cyber crimes for example phishing [26], malware dissemination, Distributed Denial of Service attack (DDoS) attack, identity theft etc. The process of Botnet can be broadly divided into three parts: (1) Searching: searching for vulnerable and unprotected computers. (2) Distributing: the Bot code is distributed to the computers (targets), so the targets become Bots. (3) Sign-on: the Bots connect to Botmaster and become ready to receive command and control traffic [6]. In a Botnet each computer is infected with a malicious program called a “Bot”, which actively communicates with other Bots in the Botnet or with several “Bot controllers” to receive commands from the Botnet owner [3]. Unlike the existing malwares (such as virus and worms), Botnet is based on Command and control (C&C) infrastructure, which allows Bots to receive commands and malicious code as ordered by Bot-master [32]. IRC protocol uses the centralized approach for the command & control (C&C) infrastructure. The centralized C&C mechanism of such Botnet has made them vulnerable to being detected and disabled. Therefore new technique has been introduced, that is Peer-to-Peer (P2P) based Botnets. III. TYPES OF BOTNET BASED ON THE......

Words: 2973 - Pages: 12

Premium Essay

Security Aspects of Peer-to-Peer Computing

...Internet, known as Peer-to-Peer (P2P), is emerging. Although originally designed exclusively for pragmatic file swapping applications, Peer-to-Peer mechanisms can be used to access any kind of distributed resources and may offer new possibilities for Internet based applications. Computer and network security, or cybersecurity, are critical issues. But merely protecting the systems that hold data about citizens, corporations, and government agencies it is not enough. The infrastructure of networks, routers, domain name servers, and switches that glue these systems together must not fail, or computers will no longer be able to communicate accurately or reliably. Given the magnitude of securing cyberspace, a reflection on what we are trying to do seems in order. Several questions arise, such as what exactly the infrastructure is, what threats it must be secured against, and how protection can be provided on a cost-effective basis. The popular peer-to-peer (P2P) file-sharing networks, which have appeared over the past few years are introduced. A peer-to-peer (P2P) network is a type of decentralized and distributed network architecture in which individual nodes in the network (called"peers") act as both suppliers and consumers of resources, in contrast to the centralized client–server model where client nodes request access to resources provided by central servers. Networks in which all computers have equal status are called peer-to-peer or P2P networks. In a peer-to-peer......

Words: 2656 - Pages: 11

Premium Essay

“Introducing Scrum at P2P” in Larson and Gray, 6e, Pages 609-613.

...Please read and study the case “Introducing Scrum at P2P” in Larson and Gray, 6e, pages 609-613.   Please prepare your answers to the following questions (1.5 line spacing, maximum 4 pages) and submit your answer document to Canvas. Please also bring your answers to class for our discussion. Part A: 1. How well is Scrum working? The case is basically a tale of two sprints. During the first sprint, Scrum guidelines were adhered to and significant progress was made on the project. The team has evolved into self organizing group and is energized. Unfortunately during the second sprint, the project deviated from Scrum guidelines and the team seems less energized and productivity has declined. 2. What are the issues confronting the Big Foot project? Prem started off well but as soon as the project experienced trouble during the second sprint he resorted back to the traditional role of project manager as task master. Admittedly there is fine line between coaching and directing, but he needed to play a less assertive role in solving the integration problem. Here, instead of telling the team what to do, he could have poised questions that would have helped them to solve the problem themselves. This is a hard thing to do when you are under time pressure and you are confident you have the answer. He exacerbated the problem by taking control of the daily scrum away from the team. The synergy that had developed during the first sprint dissipated as team members no......

Words: 1245 - Pages: 5

Premium Essay

A a a a a

...Saunders, Lewis amd Thornhill: Research Methods for Business Students, 5th edition, Additional Case Studies Case 4a Marketing music products alongside emerging digital music channels Esmée had been working in the music industry as a marketing director for a small and successful independent record label for over fifteen years before deciding to study at university. She had witnessed many changes in the music industry over her career, the most significant of which was the transition from selling cassettes, vinyl records and CDs at retail to selling digital music online. She had observed that the music industry had not taken much notice of the potential for marketing and distributing digital music online until Shawn Fanning developed his peer-to-peer (P2P) file trading application, Napster, in 1999. While the music industry focused on shutting the service down, Napster became even more popular with music fans and consumers who were interested in discovering and sharing new music and creating custom compilations or playlists without having to buy entire albums. Early on, Esmée had decided that she needed to understand why Napster was so popular and consumers so enthusiastic about sharing music online. She decided to download the Napster application and was surprised to find older songs that were no longer available at retail, previously unreleased recordings, alternative studio versions and bootleg recordings made at live concerts. While searching for and......

Words: 1033 - Pages: 5

Premium Essay

Types of Ecommerce

...discussed in this book.1 For the most part, we distinguish different types of e-commerce by the nature of the market relationship—who is selling to whom. The exceptions are P2P and m-commerce, which are technology-based distinctions. Business-to-Consumer (B2C) E-commerce The most commonly discussed type of e-commerce is Business-to-Consumer (B2C) e-commerce, in which online businesses attempt to reach individual consumers. Even though B2C is comparatively small ($140–$170 billion in 2005), it has grown exponentially since 1995, and is the type of e-commerce that most consumers are likely to encounter. Within the B2C category, there are many different types of business models. Chapter 2 has a detailed discussion of seven different B2C business mod- E - c o m m e r c e : T h e R e v o l u t i o n I s J u s t B e g i n n i n g 17 TABLE 1.3 MAJOR TYPES OF E-COMMERCE T Y P E O F E - C O M M E R C E E X A M P L E B2C—Business-to-Consumer Amazon.com is a general merchandiser that sells consumer products to retail consumers. B2B—Business-to-Business ChemConnect.com is a chemical industry exchange that creates an electronic market for chemical producers and users. C2C—Consumer-to-Consumer eBay.com creates a marketspace where consumers can auction or sell goods directly to other consumers. P2P—Peer-to-Peer Gnutella is a software application that permits consumers to share music with one another directly, without the intervention of a market maker as in C2C......

Words: 1166 - Pages: 5

Premium Essay

Copyright Infringement

...intellectual property (This includes Literary, Musical, Dramatic, or Artistic work; not ideas) the sole right to produce and reproduce their work. 2. Right to authorize:- These rights include the right to authorize others to produce or reproduce your work as well as the right broadcast your work. 3. Protection:- Copyright prevents your work from being stolen or misused by others. 4. Moral rights:- Copyright allows the holder of the copyright to object to uses of their work that they find morally objectionable. 5. For a Limited time only:- Copyright only lasts for a limited time in Canada. It is different depending on the country of origin. But in Canada it generally lasts for 50 years after the death of the author, or in the case of cinematographic works 50 years after the date of "publication" or public release. This could be a good thing in that influential work will eventually pass into the public domain and be free for everyone to use. 6. Automatic Copyright Protection:- One of the strengths of U.S. copyright law is that it automatically extends to all creative works as soon as your company publishes them. Any work that could be copyrighted receives limited protections as soon as it’s placed in a fixed format. Companies aren’t required to place a copyright notice on the work to secure their rights, nor are they required to register the work with the U.S. Copyright Office to claim ownership of the piece. Although these protections are handy......

Words: 7189 - Pages: 29

Premium Essay

The Influence of Internet Finance for Sme Financing in China

...developing Internet finance since 2010 so there are more typical cases. Currently there are three popular internet finance services in China,which include online peer-to-peer (P2P) lending, online B2C loan, and online Crowd-funding. Online P2P lending is the combination of Internet and traditional private lending, it skips the indirect bank loan financing pattern and gives the debtors a chance to lend money from the creditors directly without going through a bank. Based on customer’s online transactions information, an online B2C loan service has its own credit assessment system and links SMEs or individuals via Internet based services. Finally, Crowd-funding is a model to raise project funds from Internet users using the method of group purchase and purchase in advance. These online financial services are continuing to gain ground based on their different features and have already benefited a multitude of SMEs in China. Influences Positive influences Compared to traditional banking system, Internet finance has various unique advantages. Firstly, as identified by Zhu and Huang (2014), instead of depending credit on mortgages or guarantees, Internet financial platforms collect customer information at a lower cost on the Internet, lowering the threshold of SMEs and simplifying the applying process. This superiority easily solves the problem of information collection and greatly benefits some small borrowers. Secondly, the study indicates that the development of Internet......

Words: 2241 - Pages: 9

Free Essay

Peer-to-Peer

...Applications Steven Willmott, Josep M. Pujol and Ulises Cort´s e Universitat Polit`cnica de Catalunya e a Llenguatges i Sistemes Inform`tics Campus Nord, M´dul C5-C6, C/Jordi Girona 1-3, Barcelona (08034), Spain o {steve, jmpujol, ia}@lsi.upc.es Abstract. Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from highcapacity file sharing and global scale distributed computing to business team-ware. The objective of this paper is to outline a number of areas in which Agent techniques for the management of social problems such as decision making or fair trading amongst autonomous agents could be used to help structure P2P actions. In particular we focus on approaches from mechanism design, argumentation theory and norms / rules and electronic institutions. 1 Introduction Peer-to-peer (P2P) architectures exhibit attractive properties for a wide range of real world systems. As a result they are increasingly being applied in the design of applications ranging from high-capacity file sharing and global scale distributed computing to business team-ware. In addition their benefits however, P2P systems also fundamentally change the networking paradigm used in an application often causing tensions with other application goals such as security, predictability, performance guarantees, billing and so forth. Some of these issues in particular......

Words: 3969 - Pages: 16

Premium Essay

Graduated Response Plan

...CARNEGIE MELLON UNIVERSITY The Graduated Response System Issues, Benefits and Alternative approach Anik K Singh 8/11/2012 The Graduated Response System INTRODUCTION The growth of internet and its ever increasing pervasiveness has caused extensive digitization of copyrighted content not limited to a single format and subsequently an increase in online piracy. This combined with the advent of P2P file sharing mechanisms as a massive means of infringement practice has led to a paradigm shift in the approach to copyright infringement. Where unauthorized copying of a work was earlier considered a means of increasing a work’s market by stimulating its network effects, it is today seen as an unfair practice, a hindrance to the content owners and artists creative and financial viability. This shift has seen associations like RIAA (Recording Industry Association of America) and MPAA (Motion Picture Association of America) take desperate measures to curb illegal file sharing, the latest means of which is the “Three Strikes Rule” also known as The Graduated Response Plan. This paper starts with a brief overview on why copyright laws are important to content owners and discusses illegal file sharing, its history and the various means used for it. We then discuss the various approaches that representative bodies like RIAA have taken in the past and why the transition to the Graduate Response Plan, how it operates, its relative advantages and disadvantages to......

Words: 5226 - Pages: 21

Free Essay

How Uber Succeed

...Introduction Uber, a young but famous startup who was founded in 2009, created an innovative business model (Ridesharing services) in transportation industry with the help of modern technological innovations. People just need to tap on Uber app to order a ride. Due to the convenience and reliability of its service, Uber has become a global company who has $51 billion market valuation and operates in 330 cities in more than 60 countries. It can be learned from the case that a product innovation from a startup is changing the ride-service industry or even the transportation industry. This paper will analyze how product innovation helps Uber to be a well-known and highly valued company in just few years. Arguments Based on the case, there are three reasons of Uber’s product innovation success: an innovative business method, good timing of entry and a coherent strategy. An innovative business model As we all know, Uber was created to solve the problem of unmatched rides demand and rides offer due to the difference in space and time in taxi industry. The basic pattern of Uber is to provide an information exchange platform as a form of mobile application to connect passengers who need rides with drivers who can provide ride services. It can be considered as a new application of peer-to-peer model in transportation industry. So Uber actually is a platform provider. This platform helps the form of ridesharing service, which is quite different from traditional way of taking......

Words: 1773 - Pages: 8

Premium Essay

Woohoo Hulu

...required badges, such as “First Aid” and “Citizenship in the World,” “Respect Copyrights” became a new option for one of the other nine badges a Boy Scout must earn in order to become an Eagle Scout. This badge is yet another attempt by the entertainment industry to stop illegal downloading. Over the last decade, despite numerous lawsuits and education programs, people have continued to share files by copying them and/or using P2P networks. As CD sales continue to drop and Virgin Megastores continue to close, it seems as though the collapse of the entertainment industry is unavoidable. Why have multi-billion dollar corporations been so unsuccessful at altering consumers’ decisions to download illegally? The media often places blame on the technologies themselves and the consumers (i.e. the “cheap college student”). But a closer look at the situation reveals that the fault lies in the entertainment industry’s approach to the problem. The invention of the Internet established certain social values such as freedom and communication, which led to the creation of P2P networks. Instead of working within this established culture, the entertainment industry tried to alter it to support its own financial interests. The decade-long battle between the industry and the consumer reveals that this method does not work. However, all is not lost. During the last year, the television industry realized the benefits of encouraging Internet culture instead of suppressing it. For the first......

Words: 2069 - Pages: 9

Premium Essay

Music Piracy and Its Effects on the Demand, Supply, and Prosperity of the Music Industry

...offering download and subscription services, cable and satellite radio services, Internet radio webcasting, legitimate peer-to-peer (P2P) services, video-on-demand, podcasts, CD kiosks and digital jukeboxes, mobile products such as ring backs, ringtones, wallpapers, audio and video downloads and more. All of these services are attempting to curb illegal infringement by competing with free low quality copies that are prolific and in many ways dominant on the e-market, and in addition they all cost the provider money to create, offer and market to a public that by utilizing other means could get similar services, all be it lesser quality copies for free. The high volume of illegal uses, and the low return to suing any one individual, makes it more cost-effective to aim litigation at targets as far up the chain as possible. From the perspective of the music industry, it was easier and more effective to shut down Napster than to sue the millions of people who illegally traded files on Napster (Lemley & Reese, 2004). Early litigation of individuals may have provided a deterrent for some users, and yet these same users are now being ignored in litigation for the purpose of choosing defendants with bigger pockets, capable of actually paying lawsuit rulings to partly compensate for known and unknown losses on the part of the industry. The case of Record Industry vs. Jeffrey Howell Both the RIAA and NARAS argue that music, when digitized is to be bound by copyright law,......

Words: 6792 - Pages: 28

Premium Essay

Agriculture Bangladesh

...CASE STUDY The Pirate Bay: The World's Most Resilient Copyright Infringer? he Pirate Bay (TPB), a Swedish Web site (Piratebay.org), is one of the world's most popular pirated music and content sites, offering free access to millions of copyrighted songs and thousands of copyrighted Hollywood movies. In June 2011, The Pirate Bay reported that it h ad about 5 million registered users, and 25 million non-registered users (so-called "free riders"). To put that number in p erspective, consider that it is nearly three times the population of Sweden itself (9 million). The Pirate Bay is regularly in the top 100 most popular Web sites in the world, and reach es 1 % of the global Internet popula­ tion, according to Internet analysts in 20ll. In Sweden, Norway, and the Netherlands, it often ranks as one of the top 10 sites. This despite the fact that TPB has been subjected to repeated legal efforts to shut it down. It bills itself as "the world's most resilient bittorrent site." But the hattIe is far from over. The Internet is becoming a tough place for music and video pirates to make a living in part because of enforce­ ment actions, but more importantly because of new mobile and wireless technologies that enable high-quality content to be streamed for just a small fee. T Q . search Torrents I ~ I ~ 1::rt.J.!!9!I! I ~ 1D!R..!92 ==­ How do I clown'o.d? First some background. The Pirate Bay is part of a European social and political movement that opposes copyrighted......

Words: 2743 - Pages: 11

Premium Essay

Illegal Downloading Research Background

...information surrounding illegal downloading and to what extent the problem has escalated. The effect on record and film companies: I shall critically evaluate research performed so far on the effects illegal downloads have had on the recording industry and film production companies, studies finding a positive effect include, Frank N. Magid Associates, Inc. (2009) P2P / Best consumers for Hollywood, studies performed finding negative effects include Éric Boorstin. (2004) P2P = Different impact according to age / Reasons for fall of CD sales and Norbert Michael. (2006) The impact of illegal file sharing on the music industry: An Empirical analysis; and academic studies finding a nil effect include, Patrick Mooney et al. (2010) Napster and its effects on the Music Industry: An empirical analysis, Journal of social sciences. The effect on entertainment stores; I intend to explore the effect that illegal downloading has had on the disc sales of entertainment stores; and the consequences this has had on the economy, drawing upon studies previously performed, such as Harvard Business School. (2004) Effect of sharing on discs sales, and I shall also explore the effects by completing a small case study on the well-established entertainment company HMV, in order to establish whether disc sales have reduced over the past ten years, and if this has affected the financials of the company. Results of my survey and interview: I intend to perform my own survey, in order to establish a......

Words: 1113 - Pages: 5

Free Essay

Information System Literature Review

...a time of night frequently reserved for social interaction and communication or participation in individual, couple, or family leisure activities” (p. 2). A person deems the virtual world more interesting than the real-world, tends to lean more in the virtual world, and create an avatar to identify himself or herself with his or her personal character. The individual is motivated to be involved with the virtual world because they are inquisitive, view it as a dare, it is not the real world, there are no risks, and he or she is in control (See Figure 1) (Hsu, Wen, & Wu, 2009). The negative effects that MMORPG players somewhat neglect to see is the impact of withdrawal from physical communication with family and friends. Another study completed by Ahlstrom, Lundberg, Zabriskie, Eggett, and Lindsay (2012): “MMORPG users would rather spend time in the game than with friends, have more fun with in-game friends than people they know, found it easier to converse with people in-game, did not find social relationships as important, and felt happier when in the game than anywhere else. It appears that many MMORG players would rather have social relationships with those in their online virtual word environment than with the people or relatives in their real physical world environment” (p. 5). The Cyber-psychologist has labeled this an addiction behavior, as the over use of the Internet and having an unhealthy relationship with the online gaming with characteristics of being......

Words: 2522 - Pages: 11