SlideShare a Scribd company logo
1 of 6
Every Silicon Valley entrepreneurial company is asked, “What is
your company and why did you build it?” We started answering
the question about when we began the company four-and-a-half
years ago. The elevator pitch for the MenSagam is that it makes
all of the data on the web appear as if it is in a structured query
language (SQL) database system. That is a simple proposition,
but it also has huge ramifications.
It means that every tool and language can access data in every
software as a service (SaaS) application. You type something into
Google and it tells you where you might want to go on the web to
find more information on whatever you typed. Google knows
everything right? It is incredible, but it doesn’t know everything. It
doesn’t know anything about your Salesforce®, Intacct®, or
NetSuite® data, and it doesn’t know about anything that is inside
your SaaS apps behind your password-protected application
programming interface (API). How do you get access to that in a
standard way? What tool gives you access to your structured data
inside your enterprise apps that are inside the Cloud. Well, that is
the MenSagam. We are the gateway for all of that data in the
Cloud that you put there to protect because it is your enterprise
data.
When we are asked by those investors, “What value proposition
does the MenSagam bring and to whom?,” the answer is that the
MenSagam builds everything to look like one big SQL database in
the Cloud, and it is good for all users of the data that is in the
Cloud. It gives them access to the data from any language or any
business intelligence (BI) or other kind of tool that is SQL-
enabled. It also benefits the Software as a Service vendors. If
they are hooked up to the MenSagam, any user, using any of
those tools or languages, can get access to that data.
The Value Proposition
We have what we call a virtuous cycle going. It is kind of like why
people buy an iPhone. It is because there are all those great apps.
Well, if you are going to build an app, what platform are you going to
put it on? You are going to put it on the iPhone, of course, because
there are all those users. That is what the MenSagam does as well.
Why would you want your BI tool hooked up to the MenSagam?
Because all the data is available so the users of all that data now
become potential customers of your BI tool. If you’re a vendor of a
SaaS application, why would you want to get your data liberated so
it is available via the MenSagam? It is because you want your users
to be able to access that data from all those tools and languages.
The Virtuous Cycle
So, the users that say, “Well, I’m going to go with those other guys.
Well, no, because their data is hard to get to. I’m going to go with
these guys instead because I can gvet to their data via the
MenSagam.”
The MenSagam opens that gateway of standards that has these
huge ramifications that make all of this data available to all of those
users using any of these tools and languages.

More Related Content

More from MenSagam Technologies

Photo shop cs5-watercolor-painting-effect-tutorial
Photo shop cs5-watercolor-painting-effect-tutorialPhoto shop cs5-watercolor-painting-effect-tutorial
Photo shop cs5-watercolor-painting-effect-tutorial
MenSagam Technologies
 

More from MenSagam Technologies (17)

BI User
BI UserBI User
BI User
 
Benefits to Product Managers
Benefits to Product ManagersBenefits to Product Managers
Benefits to Product Managers
 
Benefits to End Users
Benefits to End UsersBenefits to End Users
Benefits to End Users
 
A Master’s Degree in “The Cloud”
A Master’s Degree in “The Cloud”A Master’s Degree in “The Cloud”
A Master’s Degree in “The Cloud”
 
Alternatives to Data Synchronization
Alternatives to Data SynchronizationAlternatives to Data Synchronization
Alternatives to Data Synchronization
 
Accessing Underlying Data in SaaS Applications
Accessing Underlying Data in SaaS ApplicationsAccessing Underlying Data in SaaS Applications
Accessing Underlying Data in SaaS Applications
 
The history of cloud computing
The history of cloud computingThe history of cloud computing
The history of cloud computing
 
How people-are-interact-with-Google+
How people-are-interact-with-Google+How people-are-interact-with-Google+
How people-are-interact-with-Google+
 
Digital Marketing Workshop 2014 at VIT University Vellore.
Digital Marketing Workshop 2014 at VIT University Vellore.Digital Marketing Workshop 2014 at VIT University Vellore.
Digital Marketing Workshop 2014 at VIT University Vellore.
 
App1
App1App1
App1
 
How to get more facebook likes, shares and commands.
How to get more facebook likes, shares and commands.How to get more facebook likes, shares and commands.
How to get more facebook likes, shares and commands.
 
How can you became a SEO Strategies Master?
How can you became a SEO Strategies Master?How can you became a SEO Strategies Master?
How can you became a SEO Strategies Master?
 
How to Drive Traffic to Facebook Promotions?
How to Drive Traffic to Facebook Promotions?How to Drive Traffic to Facebook Promotions?
How to Drive Traffic to Facebook Promotions?
 
Looking at SEO Techniques for 2014
Looking at SEO Techniques for 2014Looking at SEO Techniques for 2014
Looking at SEO Techniques for 2014
 
Social Media Marketing Guide for Small Business
Social Media Marketing Guide for Small BusinessSocial Media Marketing Guide for Small Business
Social Media Marketing Guide for Small Business
 
How to grow your business using contant marketing
How to grow your business using contant marketingHow to grow your business using contant marketing
How to grow your business using contant marketing
 
Photo shop cs5-watercolor-painting-effect-tutorial
Photo shop cs5-watercolor-painting-effect-tutorialPhoto shop cs5-watercolor-painting-effect-tutorial
Photo shop cs5-watercolor-painting-effect-tutorial
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Recently uploaded (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

What is the Mensagan and why did we build it?

  • 1.
  • 2. Every Silicon Valley entrepreneurial company is asked, “What is your company and why did you build it?” We started answering the question about when we began the company four-and-a-half years ago. The elevator pitch for the MenSagam is that it makes all of the data on the web appear as if it is in a structured query language (SQL) database system. That is a simple proposition, but it also has huge ramifications.
  • 3. It means that every tool and language can access data in every software as a service (SaaS) application. You type something into Google and it tells you where you might want to go on the web to find more information on whatever you typed. Google knows everything right? It is incredible, but it doesn’t know everything. It doesn’t know anything about your Salesforce®, Intacct®, or NetSuite® data, and it doesn’t know about anything that is inside your SaaS apps behind your password-protected application programming interface (API). How do you get access to that in a standard way? What tool gives you access to your structured data inside your enterprise apps that are inside the Cloud. Well, that is the MenSagam. We are the gateway for all of that data in the Cloud that you put there to protect because it is your enterprise data.
  • 4. When we are asked by those investors, “What value proposition does the MenSagam bring and to whom?,” the answer is that the MenSagam builds everything to look like one big SQL database in the Cloud, and it is good for all users of the data that is in the Cloud. It gives them access to the data from any language or any business intelligence (BI) or other kind of tool that is SQL- enabled. It also benefits the Software as a Service vendors. If they are hooked up to the MenSagam, any user, using any of those tools or languages, can get access to that data. The Value Proposition
  • 5. We have what we call a virtuous cycle going. It is kind of like why people buy an iPhone. It is because there are all those great apps. Well, if you are going to build an app, what platform are you going to put it on? You are going to put it on the iPhone, of course, because there are all those users. That is what the MenSagam does as well. Why would you want your BI tool hooked up to the MenSagam? Because all the data is available so the users of all that data now become potential customers of your BI tool. If you’re a vendor of a SaaS application, why would you want to get your data liberated so it is available via the MenSagam? It is because you want your users to be able to access that data from all those tools and languages. The Virtuous Cycle
  • 6. So, the users that say, “Well, I’m going to go with those other guys. Well, no, because their data is hard to get to. I’m going to go with these guys instead because I can gvet to their data via the MenSagam.” The MenSagam opens that gateway of standards that has these huge ramifications that make all of this data available to all of those users using any of these tools and languages.