As Macs make their way into the enterprise, IT needs to address these six security flaws before disaster strikes
Proposal emerges as powerful Wi-Fi companion, Bluetooth alternative
Carrier begins by offering access to Wayport, Airpath hot spots
Policies form to coexist and co-opt, not quash
Mesh networks offer an agile, cost-effective alternative
Wireless authentication may change the outside-the-firewall mind-set
XML protocols, peer-to-peer nets ease WLAN management