To receive the Latest Links twice a month via email, please visit our subscribe page.
This is an area code listing by number and by state/country. It also includes information about the North American Numbering Plan and a link to that site. Each table includes the area code, region, time zone offset, and description.
Center on Budget and Policy Priorities
On December 28, 2002 the federal Temporary Emergency Unemployment Compensation (TEUC) program is scheduled to expire. This program provides additional weeks of unemployment insurance to jobless workers who have exhausted their regular, state-funded unemployment benefits without finding a job. The report at this site explains why this program should be extended. The report is also available in PDF format on the site. There is also a link to additional analyses of the program.
The Center for Democracy and Technology
The mission of the CDT is to promote democratic values and constitutional liberties in the digital age. It is a non-profit, public policy organization. There are links to legislation affecting the Internet for the 107th, 106th, and 105th. The legislation can be browsed by topic. There are links to other Internet issues such as the response to 9/11 terrorism, access to government information, digital authentication, etc.
Froogle is a new service from Google seeking to make it easy to locate information about products for sale online. You may search using your own term or browse Froogle’s subject categories. The search results are ranked by relevance to the search terms that you have entered. The search results include a link to the merchant online. You can narrow your search results by price range.
Musings with Alphonse Vinh
Alphonse Vinh is a reference librarian at National Public Radio (NPR). His monthly column examines topics he has found interesting in his research of new books and articles for NPR editors and reporters.
SANS Institute/FBI Internet Security Vulnerabilities List
This is a list of the twenty most critical internet security vulnerabilities. The top twenty are divided evenly into a list for Windows and a list for Unix. There is a weekly update of critical new vulnerabilities. Links to a list of related sources is also provided. Appendix A includes a list of common vulnerable ports and Appendix B lists the experts who helped create the vulnerable services lists.