Imperial, California - Today, new and existing Sprint customers that activate  qualifying Samsung devices on Sprint, receive a full year of Amazon Prime on us – that’s a $99 value, exclusively from Sprint. With Amazon Prime, customers can enjoy unlimited FREE Two-Day Shipping on more than 20 million items, unlimited streaming of tens of thousands of movies and TV episodes with Prime Video, access to ad-free streaming of over a million songs including thousands of curated playlists and personalized stations with Prime Music, unlimited photo storage with Prime Photos and much more this holiday season and the year after.

Washington, DC - As mobile technologies mature, employees increasingly want to use mobile devices to access corporate enterprise services, data, and other resources to perform work-related activities. Unfortunately, security controls have not kept pace with the security risks that mobile devices can pose. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker may be able to gain unauthorized access to that data. Even worse, a mobile device with remote access to sensitive organizational data could be leveraged by an attacker to gain access not only to that data, but also any other data that the user is allowed to access from that mobile device.

Boulder, Colorado - Physicists at JILA have made their "quantum crystal" of ultracold molecules more valuable than ever by packing about five times more molecules into it. The denser crystal will help scientists unlock the secrets of magnets and other, more exotic materials.

Washington, DC - The Navy released online November 4, its recently-published, two-volume history of U.S. naval aviation.

Washington, DC - Webster's defines retirement as the "withdrawal from one's occupation."  But research over the past several years shows that American workers are "withdrawing" from their jobs in fewer numbers than ever before.

Washington, DC - The National Institute of Standards and Technology (NIST) has published a guide to deploying automated application whitelisting to help thwart malicious software from gaining access to organizations’ computer systems. Guide to Application Whitelisting (Special Publication 800-167) explains the basics of the technology and provides step-by-step instructions.