Laptop security: How do you lock down something that won't keep still?
Evaluating mobile architectures
CWNA Official Study Guide - Chapter 1
'Stayin' alive': ZigBee tries to create wireless dance fever
Deployment revelations: More planning and a conservative approach
Components of a mobile solution
Smart tags help with security, eliminate shipment delays
Motion Computing's M1300 raises the bar on Tablet PCs
Wireless options for your PDA
Beware malicious users
Can new business systems help Palm keep an upper hand?
The untethered classroom
Mobile education programs improve worker productivity
Security key to multinetwork wireless roaming
Define the business goals for mobile solutions
Configuring service set identifiers
Another wireless standard? Oh MAN!
Experts: Place wireless security on equal footing with wired
Experts: Security no excuse for avoiding mobile devices
Can my software call your software?
Wi-Fi buzz at CTIA
Choosing a mobile and wireless systems integrator
Radio Frequency Technology eases tracking for transportation industry, DoD, retail
Deployment, installation techniques round out mobile toolbox
Wi-Fi Security - Chapter 4
Know your wireless building blocks
How to pick wireless devices
War driving: Who's browsing your wireless network?
Miscommunications and misconceptions of mobile synchronization
Get e-mail from anywhere
VoIP over WLANs
The VPN Expert: Gateways for secure wireless access
Wireless networks on cusp of explosive growth
Wireless LAN requirements
A proven wireless solution