Welcome!

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Agile Computing

@CloudExpo: Blog Post

Disruptive Web Innovation

Hey! You! Get off of my cloud! Interview with Ghazaleh Koohestanian

Thanks for taking the time to answer my questions. Please tell us, what is re2you all about and what do you do?

Ghazaleh Koohestanian: re2you is an inter-cloud layer that will revolutionize the way people use the Web. This new cloud-based, drag-and-drop interface across multiple services eliminates third-party data mining and revolutionizes the Web experience. We reinvent the way consumers use the Web by adding a new meta-layer, which gives the user the ability to move data through the Web in a whole new way with ease and privacy.

What are you launching at TheNextWeb?

Koohestanian: We are launching the private beta of re2you. A trial version is currently in the hands of several Telco carriers. We are offering a full range from B2B2C.

What technology could yours disrupt?

Koohestanian: re2you disrupts the entire Internet marketplace and infrastructure, touching all aspects including: internet security, privacy and even NSA espionage. We also create new relevant marketing opportunities with a simple drag-and-drop user interface across multiple services.

Who is your target audience and how do you intend to reach them?

Koohestanian: We are B2B2C, initially offering the product to Telco carriers. Carriers can reclaim the Internet by exclusively offering this as a preloaded service on their devices. However, the consumer will ultimately drive the adoption of our products, simply for convenience reasons.

What is the viral aspect of your product?

Koohestanian: Consumer convenience and ease of use, combined with a heightened sense of online privacy are major drivers for adoption.

How will you make money? What's the business model?

Koohestanian: We have several options of making money. Foremost, carriers and marketers can buy a login into the metadata. We don't collect user data, but advertisers will be able to purchase information about the insight we gain into user behavior, and thereby will be able to better target their ads to the consumers who want to see them. Small and medium businesses will be able to purchase services that will enable them to build their business through tools - like the Google search function - that may be currently out of their reach, due to financial restraints or lack of technical knowledge.

Who are your competitors?

Koohestanian: There are innovators that are developing marketing platforms to gather granular consumer data and security companies that aim to anonymize consumer identities. However, as far as we can tell, nobody has taken our approach of mirroring the entire Internet experience, which provides an impenetrable layer of security, and customizes the Web experience for the user, making it safer, easier and more pleasurable. At the same time, we offer marketers the option to dig into the metadata to create more targeted and successful campaigns without needing to collect the private data of potential customers.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Koohestanian: Back in 2011, Jonathan Mayer outlined the tracking of Internet users by third-parties, focusing on a Stanford University study. The study demonstrated that 61 percent of these sites leaked information to third parties - unknowingly to the user. Usernames and IDs are the most common things leaked. Mayer concluded, "it's a fact of life that information is going to leak to third parties." But, I don't think this complete lack of consumer protection is acceptable. Re2you doesn't leak information, so a customer's name and email address won't be sent to third parties when they view an ad online, for instance.

How could the average Facebook user benefit from using re2you as his or her browser?

Koohestanian: The fact is, data is acquired by third-party Web tracking companies as soon as it goes online, and your user data is the currency of the Web. Companies then use this data to make behavioral inferences that are often inaccurate. re2you mirrors the user identity in a secure, virtualized environment, which gives the user protection and anonymity.

Who founded the company and when? Also, what can you tell me about how the company was founded?

Koohestanian: I had the idea for this back in 2009, however, I started the company and began actively raising funds last year.

What is your distribution model? Where to buy your product?

Koohestanian: We will offer re2you to consumers directly in early 2015, and are expecting the first Telco integration mid-next year.

What's next on your product roadmap?

Koohestanian: Once we are funded and up and running with carriers worldwide, we will go after the Internet of Things.

Are you targeting a first VC round? If yes, when and what will you use the funds for?

Koohestanian: We are currently raising funds.

What else would you like to add?

Koohestanian: We have a demo version of the web browser version, which is available on request. Our goal is to give users more security and control over their Web experience, while enabling marketers and advertisers with a targeted monetization tool. Since we only share insights that are generated by our secure algorithm, data and content stay with the user.

About Re2you
Re2you is the intercloud layer that will revolutionize the way people use the web. The new cloud-based, drag-and-drop interface across multiple services eliminates data mining and revolutionizes the web experience for users and marketers alike. For more information, please email [email protected].

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Providing secure, mobile access to sensitive data sets is a critical element in realizing the full potential of cloud computing. However, large data caches remain inaccessible to edge devices for reasons of security, size, format or limited viewing capabilities. Medical imaging, computer aided design and seismic interpretation are just a few examples of industries facing this challenge. Rather than fighting for incremental gains by pulling these datasets to edge devices, we need to embrace the i...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walked through how Octob...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of Dev...
SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...