This report discusses wireless network access and authentication protocols for personal/home and corporate/enterprise networks. It also covers the concept of desired state configuration (DSC) and its importance for system administrators. The report highlights the impact of DSC on administrative burden and alternative technologies such as Ansible, Puppet, Salt, and Chef.