Welcome!

Agile Computing Authors: Liz McMillan, Pat Romanski, Elizabeth White, John Basso, Kevin Benedict

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Linux Containers, Agile Computing

@CloudExpo: Blog Post

Disruptive Web Innovation

Hey! You! Get off of my cloud! Interview with Ghazaleh Koohestanian

Thanks for taking the time to answer my questions. Please tell us, what is re2you all about and what do you do?

Ghazaleh Koohestanian: re2you is an inter-cloud layer that will revolutionize the way people use the Web. This new cloud-based, drag-and-drop interface across multiple services eliminates third-party data mining and revolutionizes the Web experience. We reinvent the way consumers use the Web by adding a new meta-layer, which gives the user the ability to move data through the Web in a whole new way with ease and privacy.

What are you launching at TheNextWeb?

Koohestanian: We are launching the private beta of re2you. A trial version is currently in the hands of several Telco carriers. We are offering a full range from B2B2C.

What technology could yours disrupt?

Koohestanian: re2you disrupts the entire Internet marketplace and infrastructure, touching all aspects including: internet security, privacy and even NSA espionage. We also create new relevant marketing opportunities with a simple drag-and-drop user interface across multiple services.

Who is your target audience and how do you intend to reach them?

Koohestanian: We are B2B2C, initially offering the product to Telco carriers. Carriers can reclaim the Internet by exclusively offering this as a preloaded service on their devices. However, the consumer will ultimately drive the adoption of our products, simply for convenience reasons.

What is the viral aspect of your product?

Koohestanian: Consumer convenience and ease of use, combined with a heightened sense of online privacy are major drivers for adoption.

How will you make money? What's the business model?

Koohestanian: We have several options of making money. Foremost, carriers and marketers can buy a login into the metadata. We don't collect user data, but advertisers will be able to purchase information about the insight we gain into user behavior, and thereby will be able to better target their ads to the consumers who want to see them. Small and medium businesses will be able to purchase services that will enable them to build their business through tools - like the Google search function - that may be currently out of their reach, due to financial restraints or lack of technical knowledge.

Who are your competitors?

Koohestanian: There are innovators that are developing marketing platforms to gather granular consumer data and security companies that aim to anonymize consumer identities. However, as far as we can tell, nobody has taken our approach of mirroring the entire Internet experience, which provides an impenetrable layer of security, and customizes the Web experience for the user, making it safer, easier and more pleasurable. At the same time, we offer marketers the option to dig into the metadata to create more targeted and successful campaigns without needing to collect the private data of potential customers.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Koohestanian: Back in 2011, Jonathan Mayer outlined the tracking of Internet users by third-parties, focusing on a Stanford University study. The study demonstrated that 61 percent of these sites leaked information to third parties - unknowingly to the user. Usernames and IDs are the most common things leaked. Mayer concluded, "it's a fact of life that information is going to leak to third parties." But, I don't think this complete lack of consumer protection is acceptable. Re2you doesn't leak information, so a customer's name and email address won't be sent to third parties when they view an ad online, for instance.

How could the average Facebook user benefit from using re2you as his or her browser?

Koohestanian: The fact is, data is acquired by third-party Web tracking companies as soon as it goes online, and your user data is the currency of the Web. Companies then use this data to make behavioral inferences that are often inaccurate. re2you mirrors the user identity in a secure, virtualized environment, which gives the user protection and anonymity.

Who founded the company and when? Also, what can you tell me about how the company was founded?

Koohestanian: I had the idea for this back in 2009, however, I started the company and began actively raising funds last year.

What is your distribution model? Where to buy your product?

Koohestanian: We will offer re2you to consumers directly in early 2015, and are expecting the first Telco integration mid-next year.

What's next on your product roadmap?

Koohestanian: Once we are funded and up and running with carriers worldwide, we will go after the Internet of Things.

Are you targeting a first VC round? If yes, when and what will you use the funds for?

Koohestanian: We are currently raising funds.

What else would you like to add?

Koohestanian: We have a demo version of the web browser version, which is available on request. Our goal is to give users more security and control over their Web experience, while enabling marketers and advertisers with a targeted monetization tool. Since we only share insights that are generated by our secure algorithm, data and content stay with the user.

About Re2you
Re2you is the intercloud layer that will revolutionize the way people use the web. The new cloud-based, drag-and-drop interface across multiple services eliminates data mining and revolutionizes the web experience for users and marketers alike. For more information, please email [email protected].

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

@ThingsExpo Stories
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Much of IT terminology is often misused and misapplied. Modernization and transformation are two such terms. They are often used interchangeably even though they mean different things and have very different connotations. Indeed, it is somewhat safe to assume that in IT any transformative effort is likely to also have a modernizing effect, and thus, we can see these as levels of improvement efforts. However, many businesses are being led to believe if they don’t transform now they risk becoming ...
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Large scale deployments present unique planning challenges, system commissioning hurdles between IT and OT and demand careful system hand-off orchestration. In his session at @ThingsExpo, Jeff Smith, Senior Director and a founding member of Incenergy, will discuss some of the key tactics to ensure delivery success based on his experience of the last two years deploying Industrial IoT systems across four continents.
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...