|By Xenia von Wedel||
|April 29, 2014 12:00 PM EDT||
Thanks for taking the time to answer my questions. Please tell us, what is re2you all about and what do you do?
Ghazaleh Koohestanian: re2you is an inter-cloud layer that will revolutionize the way people use the Web. This new cloud-based, drag-and-drop interface across multiple services eliminates third-party data mining and revolutionizes the Web experience. We reinvent the way consumers use the Web by adding a new meta-layer, which gives the user the ability to move data through the Web in a whole new way with ease and privacy.
What are you launching at TheNextWeb?
Koohestanian: We are launching the private beta of re2you. A trial version is currently in the hands of several Telco carriers. We are offering a full range from B2B2C.
What technology could yours disrupt?
Koohestanian: re2you disrupts the entire Internet marketplace and infrastructure, touching all aspects including: internet security, privacy and even NSA espionage. We also create new relevant marketing opportunities with a simple drag-and-drop user interface across multiple services.
Who is your target audience and how do you intend to reach them?
Koohestanian: We are B2B2C, initially offering the product to Telco carriers. Carriers can reclaim the Internet by exclusively offering this as a preloaded service on their devices. However, the consumer will ultimately drive the adoption of our products, simply for convenience reasons.
What is the viral aspect of your product?
Koohestanian: Consumer convenience and ease of use, combined with a heightened sense of online privacy are major drivers for adoption.
How will you make money? What's the business model?
Koohestanian: We have several options of making money. Foremost, carriers and marketers can buy a login into the metadata. We don't collect user data, but advertisers will be able to purchase information about the insight we gain into user behavior, and thereby will be able to better target their ads to the consumers who want to see them. Small and medium businesses will be able to purchase services that will enable them to build their business through tools - like the Google search function - that may be currently out of their reach, due to financial restraints or lack of technical knowledge.
Who are your competitors?
Koohestanian: There are innovators that are developing marketing platforms to gather granular consumer data and security companies that aim to anonymize consumer identities. However, as far as we can tell, nobody has taken our approach of mirroring the entire Internet experience, which provides an impenetrable layer of security, and customizes the Web experience for the user, making it safer, easier and more pleasurable. At the same time, we offer marketers the option to dig into the metadata to create more targeted and successful campaigns without needing to collect the private data of potential customers.
How does your technology differentiate from the competition and can you elaborate on the different technology deployed?
Koohestanian: Back in 2011, Jonathan Mayer outlined the tracking of Internet users by third-parties, focusing on a Stanford University study. The study demonstrated that 61 percent of these sites leaked information to third parties - unknowingly to the user. Usernames and IDs are the most common things leaked. Mayer concluded, "it's a fact of life that information is going to leak to third parties." But, I don't think this complete lack of consumer protection is acceptable. Re2you doesn't leak information, so a customer's name and email address won't be sent to third parties when they view an ad online, for instance.
How could the average Facebook user benefit from using re2you as his or her browser?
Koohestanian: The fact is, data is acquired by third-party Web tracking companies as soon as it goes online, and your user data is the currency of the Web. Companies then use this data to make behavioral inferences that are often inaccurate. re2you mirrors the user identity in a secure, virtualized environment, which gives the user protection and anonymity.
Who founded the company and when? Also, what can you tell me about how the company was founded?
Koohestanian: I had the idea for this back in 2009, however, I started the company and began actively raising funds last year.
What is your distribution model? Where to buy your product?
Koohestanian: We will offer re2you to consumers directly in early 2015, and are expecting the first Telco integration mid-next year.
What's next on your product roadmap?
Koohestanian: Once we are funded and up and running with carriers worldwide, we will go after the Internet of Things.
Are you targeting a first VC round? If yes, when and what will you use the funds for?
Koohestanian: We are currently raising funds.
What else would you like to add?
Koohestanian: We have a demo version of the web browser version, which is available on request. Our goal is to give users more security and control over their Web experience, while enabling marketers and advertisers with a targeted monetization tool. Since we only share insights that are generated by our secure algorithm, data and content stay with the user.
Re2you is the intercloud layer that will revolutionize the way people use the web. The new cloud-based, drag-and-drop interface across multiple services eliminates data mining and revolutionizes the web experience for users and marketers alike. For more information, please email [email protected].
Samsung VP Jacopo Lenzi, who headed the company's recent SmartThings acquisition under the auspices of Samsung's Open Innovaction Center (OIC), answered a few questions we had about the deal. This interview was in conjunction with our interview with SmartThings CEO Alex Hawkinson. IoT Journal: SmartThings was developed in an open, standards-agnostic platform, and will now be part of Samsung's Ope...
Oct. 26, 2014 01:00 AM EDT Reads: 2,719
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an In...
Oct. 25, 2014 05:00 PM EDT Reads: 1,736
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud...
Oct. 25, 2014 11:45 AM EDT Reads: 1,855
StackIQ offers a comprehensive software suite that automates the deployment, provisioning, and management of Big Infrastructure. With StackIQ’s software, you can spin up fully configured big data clusters, quickly and consistently — from bare-metal up to the applications layer — and manage them efficiently. Our software’s modular architecture allows customers to integrate nearly any application wi...
Oct. 25, 2014 10:00 AM EDT Reads: 1,793
In her General Session at 15th Cloud Expo, Anne Plese, Senior Consultant, Cloud Product Marketing, at Verizon Enterprise, will focus on finding the right mix of renting vs. buying Oracle capacity to scale to meet business demands, and offer validated Oracle database TCO models for Oracle development and testing environments. Anne Plese is a marketing and technology enthusiast/realist with over 19...
Oct. 25, 2014 10:00 AM EDT Reads: 1,733
As Platform as a Service (PaaS) matures as a category, developers should have the ability to use the programming language of their choice to build applications and have access to a wide array of services. Bluemix is IBM's open cloud development platform that enables users to easily build cloud-based, creative mobile and web applications without having to spend large amounts of time and resources o...
Oct. 25, 2014 08:00 AM EDT Reads: 1,807
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at Internet of @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, will discuss how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will nee...
Oct. 24, 2014 09:30 PM EDT Reads: 1,456
When you set off to build an app that will change the world, designing your system architecture to be reliable and scalable is important but the stark reality is that, for your MVP, you probably had a “need for speed” (of development). You didn’t know what all the axes were to scale your application, where your stress points would be, and what weird and wonderful ways your customers would use it d...
Oct. 24, 2014 09:00 PM EDT Reads: 1,282
Compute virtualization has been transformational, yet security policy implementation and enforcement has lagged behind in agility and automation. There are a number of key considerations when implementing policy in private and hybrid clouds. In his session at 15th Cloud Expo, Holland Barry, VP of Technology at Catbird, will discuss the impact of this new paradigm and what organizations can do to...
Oct. 24, 2014 07:00 PM EDT Reads: 1,551
SYS-CON Events announced today that Red Hat, the world's leading provider of open source solutions, will exhibit at Internet of @ThingsExpo, which will take place on November 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA. Red Hat is the world's leading provider of open source software solutions, using a community-powered approach to reliable and high-performing cloud, Linux, ...
Oct. 23, 2014 11:30 PM EDT Reads: 1,749