By Russ McGuire \n\nRemember the mid-1990s? This thing happened called the Internet. Yeah, we technologists know the Internet didn\u2019t happen in the 1990s, it had already been happening in the 1970s and the 1980s, but it really happened in our business about a decade ago. \n\nDepending on your corporate culture, the nature of your business and workforce, and what side of the bed you woke up on that day, when you saw the Internet wave about to hit the shores of your business infrastructure, you either said, \u201cOh wow!\u201d or, \u201cOh no!\u201d \n\nFor the very few of you who said \u201cOh wow,\u201d the Internet was all about the unleashing of power. The Web represented a universal client that could be used for unifying access to the business\u2019 core applications. As Internet access became ubiquitous\u2014with everyone having it at home and it showing up in hotels and convention centers (and even coffee shops!), you could connect your employees into the business wherever they could plug in. The Internet\u2019s connectionless model enabled emerging communications tools such as instant messaging, intranets, extranets and a multitude of future ways of collaborating, sharing information, and improving communications. And, oh yeah, the Internet would be a great way to commoditize telecom bandwidth. \n\nFor the rest\u2014almost everyone\u2014in the \u201cOh no!\u201d camp, you saw the incredible dangers that the Internet represented to your business. As departments within your company started connecting systems to the Internet, they were opening up holes for hackers to break into your critical operations. As users browsed the Web or opened e-mail attachments, they unleashed viruses that quickly spread across the enterprise. As employees could get to anything on the Net\u2014they did\u2014sapping productivity and potentially opening the business up to lawsuits. As users increasingly moved out of the four walls of your business buildings, they still expected \u201cdesktop\u201d support, stretching your already thin resources. And the demand for precious budget dollars to buy, implement and support rapidly expanding Internet pipes, Web servers and content servers of every flavor, firewalls, anti-virus-spam-spyware software continued to grow, even as IT budgets were shrinking. \n\nWhatever your perspective, the reality is that the Internet has been a huge focus for all of us for the past decade\u2014both in capturing the power of the Internet and managing the danger. But guess what: That\u2019s nothing new. We jumped through the same hoops from the mid-1980s to the mid-1990s as our businesses adopted the PC, moving computing power out of the safe, yet-constrained environment of the datacenter onto virtually every employee\u2019s desktop. We spent a decade running to catch the power of the PC to create competitive advantage for our company while wrestling to bring the dangers of the PC under control. That\u2019s our job. It\u2019s what we do, and we\u2019re good at it. So get ready, it\u2019s all about to happen again. The Age of Mobility The PC age was simply the result of a fundamental economic reality. Long ago, Intel founder Gordon Moore made a pretty simple observation. He said something like, \u201cEvery couple of years we can squeeze twice as many transistors onto the chips we\u2019re making.\u201d Moore\u2019s Law, as we know it, wasn\u2019t some deep scientific fact uncovered through complex mathematical proofs, it was a simple observation of a clear reality. And yet, the implications are huge. \n\nMoore\u2019s Law also implies that the cost of computing power is regularly being cut in half. That means that we (industry) could afford to use computing power in new places and for new applications that we couldn\u2019t previously imagine. In the mid-1980s, it meant that we could financially justify putting a PC on each knowledge worker\u2019s desk. Today, it means that we can put a microprocessor in our car key and in the light switch on the wall, and soon will put an RFID tag on every product sold at our local Wal-Mart. \n\nThe Internet age was the result of a different economic reality. \n\nLong ago, Ethernet inventor Bob Metcalfe made the simple observation. He said something like, \u201cThe more people that join a network, the more valuable the network is to all the participants.\u201d Again, no deep scientific thesis here, but a simple observation with huge implications. \n\nMetcalfe\u2019s Law basically pointed to the fact that, if a network ever reached a threshold of a certain number of users, then it would become so valuable that everyone would need to become part of the network. That happened ten years ago and we\u2019ve been feeling it ever since. \n\nTo get a sense of what comes next, let me make a simple observation: \u201cA product is more valuable the more you can use it.\u201d I call this the Law of Mobility because if mobility gets built into a product, then you\u2019ll have it with you available for use all the time. Think about the BlackBerry. Think about a cameraphone. Neither one is valuable because it\u2019s a more feature-rich, higher-quality version of their less-mobile cousins\u2014they are valuable because you always have them and can use them anytime, anywhere. \n\nThis simple observation has significant implications for all of us. As the cost of adding mobility into products falls precipitously, mobility is rapidly being built into everything\u2014and all of it is ending up on your network. (Keep up with the latest at lawofmobility.com.) \n\nWhat are you doing to capture this power of mobility and how are you managing the emerging dangers? \n\nCapturing the PowerI think I can summarize the power of mobility down to two words: \u201cHere\u201d and \u201cNow.\u201d How much is the value created by our business for our customers constrained because something isn\u2019t \u201chere\u201d and it isn\u2019t available \u201cnow\u201d? Mobility creates power and value by eliminating those constraints. I recently shared this simple observation with one of Sprint\u2019s large customers. Their response was spot on: \u201cSo, it\u2019s all about the Law of Mobility. How do we increase the value of our product by taking things that were fixed and making them mobile?\u201d For this customer, their \u201cproduct\u201d is actually a service, and they are now working to unlock information, systems, capabilities, etc. from being tied to a specific location and instead able to move to where that component of their \u201cproduct\u201d can best serve the customer. Solving the \u201chere\u201d problem will unleash tremendous power and will clearly differentiate this business in the eyes of their customers. \n\nAnother customer recently explained that his business suffers when he can\u2019t get information in time to meet his customers\u2019 needs. The right update might be waiting for him when he gets back to his desk, but by then, it\u2019s too late. The wrong part has been shipped, or not shipped at all. The wrong service was performed or in the wrong way. If this business can use mobility to solve the \u201cnow\u201d problem, they too will unleash tremendous power and rise above the shoddy service expectations that have been set in their industry. \n\nSo what does this mean for IT? Unfortunately, it probably means increased spending with unclear paybacks, but what else is new? The above examples are intentionally vague and may not even relate to the opportunities to unleash the power of mobility in your business, but it probably comes down to investing in the right mobile devices, the right applications and the right mobile services to overcome the \u201chere\u201d and \u201cnow\u201d constraints that have been plaguing your company. \n\nManaging the DangerAlthough I\u2019m sure that many new dangers will emerge as we move into the mobility age, we can already guess at some of the big ones. The security of data (especially when a mobile device is lost or stolen), the threat of viruses, the challenge of supporting mobile users and the complexity of managing a portfolio of applications on multiple device types (many owned by end users) across diverse networks (most outside IT\u2019s control). \n\nAs with many IT management challenges, there are at least three ways to deal with these dangers: Ignore them (not recommended), outsource the management or become an expert and invest in the tools. Both tools and managed services are available to address virtually all of the known dangers of mobility and I\u2019m sure savvy businesses will continue to introduce offers as new threats emerge. \n\n\u201cOh wow?\u201d or \u201cOh no?\u201dIn retrospect, I think most of us relate to the \u201cOh wow!\u201d or \u201cOh no!\u201d positioning based on how prepared we were when the Internet question was raised by our CEO or by some overly-hip board member. If we were already thinking about the Internet, both in terms of the power it could unleash or the danger it could impose on our business, then we were ready for the call and could confidently respond with, \u201cOh wow! Look what the Internet can do for us!\u201d If we weren\u2019t ready then all we could do is say, \u201cOh no! Look what the Internet can do to us!\u201d \n\nHow will you respond when your CEO calls asking what you\u2019re doing about mobility? \n\nRuss McGuire is a leading strategist and visionary in the telecom industry. He is director of business strategy for Sprint. His experience includes 20 years in the telecom industry as well as experience in the defense and nuclear power industries.