I define myself first as a software engineer and an accidental entrepreneur.
I started 30 years ago as an employee of some organizations doing different aspects of running the organization. My role was mainly as a software engineer for several companies.
And sometime in 2008, I became an accidental entrepreneur. It was the time when the first Android phone was released here in the US. At that time, the most significant opportunity that jumped out to me was that, by default, the Android phone did not have a corporate email client.
Most people living in Redmond and many employees of Microsoft were used to using corporate email on their phones and having a new phone is no use if they have to carry another phone or a BlackBerry to get their email.
I started building an email client for Android specifically for the Exchange Server, which got some traction. It helped sell more Android phones, and it also helped us sell the software.
Fast forward a couple of years, Android started having native email clients. But when that happens, typically when your product becomes redundant, and it feels like the world is crashing around you because the phone already comes with an email client, your instinct would be, “Oh my God, I’m finished.”
But we pivoted a little bit to the site and discovered that there’s all the software for getting your email on the phone, but there are issues of
- What happens if your phone falls into the wrong hands?
- What happens if your phone is unlocked and someone else gets hold of it?
- What happens if someone plugs your phone into a USB port and a computer?
In those days, the operating system was not mature enough to recognize the importance of a secure container for your data and application.
So, there was no way to secure your email and sensitive information. So, instead of just focusing on the usability of the application, we also started focusing on how secure it is and how enterprises can rely on this piece of software to get your email on the phone but take enough measures to make sure that your email is not compromised if the phone is lost or in several other scenarios.
We trust an email coming from someone to be indeed from that person, and you might even act on an email because it came from you. It might not be the right thing to do.
How do you know that the email from Venky is indeed from Venky and not someone else who pretends to be Venky?
So, these are the basics of security. I had to brush up on many basics to come back to implementing some of the measures we had to take on that application.
Anyways, six years from then, of course, we partnered with a bunch of mobile device management vendors and had the name of the product Touchdown, had it been the official email client for MDM vendors who did not necessarily want to go through the whole process of implementing an email client.
So, we had over 25 vendors who used our email client as the official one. Eventually, it was acquired by Symantec, which wanted to integrate that into its mobility portfolio. So that was the story of becoming an entrepreneur.
But once the exit happens, I work with one of the startup incubators here in Seattle, and I have the privilege of picking and choosing the projects for which I try to build a prototype, a first version, or a V1.
Building a V1 is one of the most satisfying parts of building anything because, after V1, you have customers, investors, and whatnot—so many restrictions and constraints. So, I’ve been doing that for the past few years, working on something new.
It still has to do with tech, and anything that requires a server or a client or networking or security is something that I’m always interested in.