Wednesday, October 31, 2012

SB Podcast 018 | 40 Years of Exercise Wisdom: Strength Training ...

KB PressThis is a special episode. ?In this session, I was very honored to interview long time strength coach, movement expert, and former competitive athlete,?Mark Reifkind.

You?ll learn a ton in this information packed interview, where we discuss the theme of?strength?training over the age of 40.

Mark has extensive experience, both an athlete and an elite strength and performance coach. ?The knowledge and passion he shares is unbelievable.

Here?s just a few samples of what we cover in this episode:

  • The difference between training for health and training for performance.
  • What is the unique blend of training and skill development that the kettlebell offers?
  • What type of training methods are best as we age to prevent ?breakdown.?
  • What is ?length-tension? and why is this important?
  • Discover the 7 primal movement patterns.
  • The #1 most important thing we need to remember in exercise training.
  • Should people over 40 train heavy?
  • 2 specific actions you can take after listening to the interview?
  • And (seriously) so much more!

Get your notepad and pen ready to learn from a man with over 40 years in the trenches of athletic training and performance. ?Make sure you listen all the way through to take it all in.

Subscribe to the podcast!??>>>>>click here.

SHOW NOTES (things discussed in this episode).

You can find out more about Mark on his website, GiryaStrength.com. ?Mark?s DVD?s are Restoring Lost Physical Function, Lats, The Super Muscle, and Mastering the Hardstyle Kettlebell Swing. ?

The upcoming workshop in South Florida this January is Grumpy Old Men: Training Over the Age of 40 by Mark Reifkind, Dan John, and Tom Furman. ?Learn to train properly as we ?mature.? ?This is a workshop not to be missed! ?(Please note:?I have no affiliation with this workshop, I just believe this is an outstanding learning opportunity.)

If you don?t have it, get the great book, The Swing by Mark?s awesome wife, Tracy. ?She is truly an inspiration to all of us!

And, the book I am currently reading on the topic of ?practice? is Practice Perfect: 42 Rules for Getting Better at Getting Better?by Doug Lemov et al.

To learn more about primitive movement and Primal Move, click here.

Please SHARE this valuable episode!

And, make sure you enter your email above to get much more great information and updates, including instant access to the Stealth Fat Loss Report right now! ?See you on the inside.

Source: http://stealthbody.com/sb-podcast-018-40-years-of-exercise-wisdom-strength-training-over-the-age-of-40-interview-with-strength-coach-mark-reifkind

elite eight stephon marbury the lion king suzanne collins cherry blossom festival nc state erika van pelt

Advertisement: Win New Customers

[unable to retrieve full-text content]
 

Ads by Pheedo

Source: http://ads.pheedo.com/feeds/ht.php?t=c&i=75cc751fdf1dcbc9884965fc531bd71b&p=4

bachelor ben jon hamm kim kardashian law school rankings jon hamm heather morris ncaa bracket predictions jeff foxworthy

Wall Street still dark, exchanges test systems

NEW YORK (AP) ? With large portions of lower Manhattan still dark early Tuesday, U.S. stock exchanges said they were testing contingency plans to ensure trading resumes as soon as possible this week after Hurricane Sandy smashed into the East Coast.

U.S. markets will be closed for a second day, but the New York Stock Exchange said that despite reports that its historic trading floor suffered irreparable damage, no such damage has occurred and that contingency plans are being tested only as a safety measure.

The measures would push the opening and closing auctions to the electronic NYSE Arca system.

Futures trading will go on until 9:15 a.m. Eastern Tuesday, but volume is light.

Dow Jones industrial futures fell 21 points to 13,033. The broader S&P futures gave up 0.6 points to 1,407. Nasdaq futures slipped 7.75 points to 2,651.25.

Officials with the NYSE and Nasdaq say they plan to open on Wednesday, though portions of southern Manhattan were inundated with water.

Tuesday marks the first time since 1888 that the NYSE remained closed for two consecutive days due to weather.

Dozens of companies have postponed earnings reports this week because of the storm, but Ford Motor Co. did release results for the third quarter that topped Wall Street expectations.

Ford's revenue fell 3 percent to $32.1 billion because of the economic crisis in Europe and falling sales in South America. The company exceeded Wall Street's revenue forecast of $31.5 billion largely because of North America, where revenue jumped 8 percent.

Global markets rebounded Tuesday though trading was subdued in the wake of the storm that pounded Wall Street, in addition to a broad swath of the East Coast.

In Europe, the FTSE 100 index of leading British shares was up 0.7 percent at 5,835 while Germany's DAX rose 0.9 percent to 7,266. The CAC-40 in France was 0.8 percent higher at 3,436.

Earlier in Asia, trading was mixed.

Japan's Nikkei 225 index fell 1 percent to close at 8,841.98.

South Korea's Kospi index rose 0.4 percent to 1,899.58 but Hong Kong's Hang Seng index fell 0.4 percent to 21,428.58. Benchmarks in mainland China also rose.

Crude oil prices rose 50 cents to $86.04 Tuesday in electronic trading on the New York Mercantile Exchange.

Source: http://news.yahoo.com/wall-street-still-dark-exchanges-test-systems-111719709--finance.html

college basketball oakland pinnacle airlines kansas vs kentucky joe posnanski michael kidd gilchrist national championship

Around the Web?

We hope everyone is safe after the storm! Here are Tuesday’s links: Happy due date to our blogger Tamera Mowry-Housley — PEOPLE.com N.Y.C. nurses carry NICU babies down stairs during evacuation — CNN.com Steps to take to go from full to part-time work — TheBump.com Baby gear: Buy this now, buy that later — lilSugar.com [...]

Source: http://feeds.celebritybabies.com/~r/celebrity-babies/~3/v9agsxKxaRY/

hugo hugo nfl combine 84th annual academy awards beginners 2012 oscars the shore

Monday, October 29, 2012

Marco Rubio daughter hospitalized after accident

{ttle}

{cptn}","template_name":"ss_thmb_play_ttle","i18n":{"end_of_gallery_header":"End of Gallery","end_of_gallery_next":"View Again"},"metadata":{"pagination":"{firstVisible} - {lastVisible} of {numItems}","ult":{"spaceid":"2145892301","sec":""}}},{"id": "hcm-carousel-556265402", "dataManager": C.dmgr, "mediator": C.mdtr, "group_name":"hcm-carousel-556265402", "track_item_selected":1,"tracking":{ "spaceid" : "2145892301", "events" : { "click" : { "any" : { "yui-carousel-prev" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"prev","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } }, "yui-carousel-next" : { "node" : "a", "data" : {"sec":"HCMOL on article right rail","slk":"next","itc":"1" }, "bubbles" : true, "test": function(params){ var carousel = params.obj.getCarousel(); var pages = carousel._pages; // no more pages, don't beacon again // if same page, don't beacon if(("_ult_current_page" in carousel) && carousel._ult_current_page==pages.cur) return false; // keep track of current position within this closure carousel._ult_current_page = pages.cur; return true; } } } } } } })); }); Y.later(10, this, function() {(function() { try{ if (Math.floor(Math.random()*10) == 1) { var loc = window.location, decoded = decodeURI(loc.pathname), encoded = encodeURI(decoded), uri = loc.protocol + "//" + loc.host + encoded + ((loc.search.length > 0) ? loc.search + '&' : '?') + "_cacheable=1", xmlhttp; if (window.XMLHttpRequest) xmlhttp = new XMLHttpRequest(); else xmlhttp = new ActiveXObject("Microsoft.XMLHTTP"); xmlhttp.open("GET",uri,true); xmlhttp.send(); } }catch(e){} })(); }); Y.later(10, this, function() {Y.namespace("Media").ywaSettings = '"projectId": "10001256862979", "documentName": "", "documentGroup": "", "ywaColo" : "vscale3", "spaceId" : "2145892301" ,"customFields" : { "12" : "classic", "13" : "story" }'; Y.Media.YWA.init(Y.namespace("Media").ywaSettings); }); Y.later(10, this, function() {if(document.onclick===YAHOO.Media.PreventDefaultHandler.newClick){document.onclick=YAHOO.Media.PreventDefaultHandler.oldClick;} }); }); });

Thursday, October 25, 2012

Lebanese opposition blames Syria for assassination

BEIRUT (AP) ? Lebanon's main opposition bloc stepped up pressure Wednesday on the Hezbollah-dominated government to resign after blaming the Shiite militant group's ally Syria for a car bomb that killed a top intelligence officer.

The anti-Syrian opposition alliance said Lebanon's rival groups can't hold a national dialogue until the government led by Hezbollah and its allies steps down.

"The first step to face strife is the fall of this government," said a statement by the March 14 coalition of anti-Syrian parties read by senior official Fares Soeid. "The government, through its leader and the political groups that back him, takes major responsibility for facilitating the plan of the criminal Assad regime," it added.

The statement was an apparent reference to what anti-Syrian politicians say is lack of support for investigations into other recent assassination attempts.

Friday's assassination of senior intelligence officer Brig. Gen. Wissam al-Hassan in a car bomb has stirred up sectarian tensions in Lebanon, where Sunnis and Shiites are deeply divided over the Syrian civil war. Violence since the assassination has killed 13 people.

Damascus has intervened heavily in Lebanese affairs over the past decades and is blamed for the deaths of many prominent critics and anti-Syrian political figures. But Hezbollah remains a staunch ally to both Syria and Iran, which provide much of its arms and funding.

Soeid said the opposition will work to bring down the government through peaceful means.

The United States also waded into the debate, with Secretary of State Hillary Rodham Clinton making a thinly veiled jab at Hezbollah, which the U.S. considers a terrorist organization.

Clinton told reporters in Washington that the Lebanese must choose their own government, but that "the Lebanese people deserve so much better."

"They deserve to live in peace and they deserve to have a government that reflects their aspirations, not acts as proxies and agents for outside forces," she said.

Lebanon's two largest political coalitions have lined up on opposite sides of Syria's civil war. Hezbollah and its partners who dominate the government have stood by Assad's regime, while the Sunni-led opposition backs the rebels seeking to topple the government. Assad and many in his inner circle are Alawites ? an offshoot of Shiite Islam and a minority in Syria ? while the rebels come mostly from the country's Sunni majority.

Al-Hassan was the latest of some dozen anti-Syrian Lebanese politicians and security forces to be killed since February 2005 when former Prime Minister Rafik Hariri was killed in a truck bomb in Beirut. Hariri at the time was distancing himself from Syria, which dominated Lebanon for decades.

Prime Minister Najib Mikati offered to resign after Friday's bombing. But he was asked by President Michel Suleiman to stay while he consulted politicians involved in a national dialogue that has been trying for months to find a solution to the dilemma of Hezbollah's arsenal.

Hezbollah is by far the country's strongest military force with its own arsenal that it has refused to integrate into the regular army. Lebanon also has dozens of smaller militias linked to political groups, families or tribes. It's a problem the country has struggled with since the 1975-1990 civil war.

An official close to Suleiman told The Associated Press that one topic on the agenda for a national dialogue would be "what kind of government they suggest." He spoke on condition of anonymity because he was not authorized to speak to the media.

However, the demand for the government's resignation is likely to block any dialogue because Hezbollah and its allies will most likely refuse to do so.

Suleiman met with Mohammed Raad, the head of Hezbollah's parliamentary bloc. Raad said after the meeting that the group is ready to attend the national dialogue adding that he and the president did not speak about the Cabinet "at all," apparently a reference to the demands for its resignation.

U.S. ambassador to Lebanon Maura Connelly met Suleiman and an embassy statement said she reiterated Washington's support for the president and other leaders as they seek "to build an effective government and take the necessary next steps" in the wake of al-Hassan's assassination.

She noted the concerns shared by the U.S. and international community regarding the potential for instability and the creation of any political vacuum, the statement said.

Angry protesters tried to storm the government palace after al-Hassan's funeral Sunday in Beirut, venting their rage at leaders they consider puppets of the Syrian regime. But they were pushed back by troops who fired their guns in the air and filled the street with tear gas.

Al-Hassan's work led to the arrest of former Information Minister Michel Samaha, one of Syria's most loyal allies in Lebanon, who is accused of plotting a wave of attacks in Lebanon at Syria's behest. Syrian Brig. Gen. Ali Mamlouk, one of Assad's most senior aides, was indicted in absentia in the August sweep.

On Wednesday, security officials said investigators are looking into the type of explosives used in Friday's bombings to see if it was similar to those that Samaha brought in his car to Lebanon from Syria.

They are also checking data of cellular telephone calls that were done in the areas of the explosion before the blast occurred, the officials said on condition of anonymity in line with regulations. They added that street security cameras in the area showed that a car had saved a place for the booby-trapped Toyota RAV4, which parked near al-Hassan's office shortly after the other vehicle left.

The Toyota RAV4 was stolen more than a year ago and the thieves had called its original owner asking him if he wants to buy it back. Officials said they are trying to identify those who called the car owner.

___

Associated Press writer Bradley Klapper contributed reporting from Washington.

Source: http://news.yahoo.com/lebanese-opposition-blames-syria-assassination-151756779.html

jennie garth space needle nashville predators king arthur king arthur there will be blood there will be blood

Online Income Builders Home-Based Business Opportunities ...

The Mobile Entrepreneur

Immediate Earnings & Lengthy-term Residuals! world wide web.teambuildingproject.com The idea and profitability of Online Earnings Builders? ? Team Development Project. A brand new method of building immediate earnings, lengthy-term residual wealth with home-based business possibilities. A thrilling, effective?

Video Rating: 5 / 5

world wide web.MyOnlineBusinessGuide.info Greatest having to pay jobs on the planet online begin working 20 min each day. Chance for everybody to learn to work at home online on your pc without any experience, learn to make extra cash working at home online. Here?s what you?re going to learn 1. Locating a lucrative chance and key phrases. 2. Creating the fundamentals in our site : Obtaining a domain and setting up wordpress/plug ins. likely to invest our understanding into practice the step-by-step blueprint for creating your site, beginning to end. 3: Crafting your sites content to ensure that you get the most conversion rate it is possible to from your site 4. Gain some quick back links and obtain your website indexed fast. 5. How you can turn your websites right into a 6 figure business. And far, a lot more? to construct effective small company online, get all training here: world wide web.myonlinebusinessguide.info ??????????ignore?this?????????- greatest having to pay jobs with no degree this year to make better money. working at home online, best jobs with no degree career advice for college kids to work on home work at home with multiple earnings streams greatest having to pay jobs on the planet, work wiser not harder. work at home job internet business stay home mother jobs jobs that pay well without experience for males or women working at home on your pc, small company ideas and possibilities 2012 to make better money. greatest having to pay careers ?

    Zettabytes Unique Tools for your Business CLICK below

  • Resell Rights Ninja The Art Of Effortless Money!
  • Authority SEO Domination Downsell
  • 1 Million Fresh Biz Op Email List to Import into Any Self Hosted Autoresponder! Get No. 1 in Google and get more subscribers! Bonus: 1. 30,000 Twitter IDs from the Weight Loss, Diet Niche 2. 1 Million Facebook profile emails. 3. 4.6 Million unique Keywords and Phrases 4. 100,00 Unique Dofollow blog wordpress link list 5. 4.3 Millio

Source: http://virtualblackswanmarketing.com/?p=17738

viktor bout ncaa hockey role models ferdinand porsche gregg williams theraflu masters leaderboard

Critique Speaking Writing Contest ? Creative Writing Contests

The Critique Speaking Contest is not only your opportunity to share your experience, but get a short video made of that experience!

?

????????? All submissions will be read.

????????? In February 2013, 25 will be chosen to receive a reading live by the Avatar Repertory Theater on the virtual world, Second Life, produced by The Sanity Patrol Players.

????????? Recordings of these readings will be posted on The Sanity Patrol website.

????????? For the month of March, anyone and everyone will vote for their favorites.

????????? The Sanity Patrol Players will produce videos of the top 3-5 pieces on Second Life. (see examples of the videos)

????????? Videos will be posted on YouTube and The Sanity Patrol Press website in May 2013.

?

Submission Guidelines

1.??? Submissions must be 500-1000 characters in length.

2.??? Entries must be a monologue for Tikka or a dialogue between Tikka and Arthur (see character photos).

3.??? The point of view must be that of Tikka.

4.??? Submissions can be real, fictional, speculative, or anything in between.

5.??? Do not include stage directions unless absolutely necessary.

6.??? Submit entries in an email to: contest@thesanitypatrol.com

7.??? Maximum of 5 entries per person

8.??? Winning writers maintain copyright and license The Sanity Patrol for noncommercial use of the material

9.??? DEADLINE: December 31, 2012

?

About Tikka. Tikka loves literature, plays, movies and games. She also loves authors ? they possess a magic that transports her into alternative realities. From her own efforts at writing, she has learned that developing a new work requires she not only understand the rudimentary elements of story, but learn ways to best communicate with authors.

About Arthur. Arthur identifies himself as an author. Like most authors, one minute he?s articulate and profound, and the next he?s self indulgent and goofy. Sometimes he?s earnest and open to feedback, and others he?s smug and cynical. He recognizes he needs help and establishes a relationship with Tikka.

About Second Life. Second Life is a virtual world that anyone with a computer and online access can access for free. Participants select (or design) an avatar they can maneuver through the many environments built by other participants, attend live concerts and theater, shop for all kinds of dazzling fashion and role play under a wide range of circumstances.

About The Sanity Patrol Players. Since 1998, The Sanity Patrol Players have produced live theater, industrial theater, virtual theater and mixed reality theater.

About Avatary Repertory Theater (ART). Founded in 2008, ART is a troupe of actors, graphic artists, pro?gram?mers, musicians and sound eng?ineers from all over the globe to produce virtual theater on Second Life.

About Critique Speak. Critique Speak is an upcoming comprehensive graphic ebook on the language of constructive feedback. Tikka and Arthur serve as the main characters.

JOIN THE CONVERSATION

Facebook

Critique Speak Blog

YouTube

Like this:

Be the first to like this.

Tags: fiction contests, short fiction contest, short video contests, Writing contest

Source: http://writingcontests.wordpress.com/2012/10/25/critique-speaking-writing-contest/

kyra sedgwick honor killings mary tyler moore x games pro bowl pro bowl 2012 rick santorum daughter

Wednesday, October 24, 2012

EU: Spain, Italy putting EU emissions cuts at risk

FILE - In this Feb. 25, 2008 file photo the tower of a church is seen between the smoke billowing chimneys of the brown coal power plant Frimmersdorf in Grevenbroich near Duesseldorf, Germany. The European Union's environmental agency says Spain and Italy could hinder the EU from achieving its greenhouse emissions target under a U.N. climate pact. The European Environment Agency said the debt-ridden countries are not on track to make the emissions cuts required by the Kyoto Protocol, and have not bought enough credits to offset the shortfall. (AP Photo/Frank Augstein, File)

FILE - In this Feb. 25, 2008 file photo the tower of a church is seen between the smoke billowing chimneys of the brown coal power plant Frimmersdorf in Grevenbroich near Duesseldorf, Germany. The European Union's environmental agency says Spain and Italy could hinder the EU from achieving its greenhouse emissions target under a U.N. climate pact. The European Environment Agency said the debt-ridden countries are not on track to make the emissions cuts required by the Kyoto Protocol, and have not bought enough credits to offset the shortfall. (AP Photo/Frank Augstein, File)

(AP) ? Debt-ridden Spain and Italy could hinder the European Union from achieving its goal of cutting greenhouse emissions under an international climate pact, the EU's environmental agency said Wednesday.

The EU considers itself at the forefront of the fight against climate change and as a bloc it's on track to meet its obligations under the Kyoto Protocol, which limits the emissions of gases that warm the planet.

But the 15 countries that were EU members when the 1997 pact was adopted must also meet their individual emissions targets.

Some of them, including Italy and Spain, will only be able to do so by buying credits to offset their own emissions, for example by investing in projects that reduce carbon emissions in developing countries.

In a report released Wednesday, the European Environment agency said Italy hasn't presented "any concrete plan" on how to close the gap with such credits. Spain has a plan that would just about close the gap but must buy so many carbon credits that it faces a "considerable challenge" of fulfilling its plan, the EEA said.

"These gaps, if not addressed by early 2015, could hinder the (bloc) from achieving its target," the Copenhagen-based agency said.

Although the Kyoto treaty expires this year, countries can use the offset mechanism until 2015. But buying Kyoto credits could become a challenge for financially strapped countries in southern Europe.

"It might put extra pressure on public budgets in the countries that will have to purchase international emission credits in order to achieve their targets," said EEA climate expert Francois Dejean, who coordinated the report.

But he said recessions in many countries have also triggered emission reductions and lowered the demand for emission credits.

EU climate commissioner Connie Hedegaard focused on the fact that as a bloc, the EU is delivering on its Kyoto commitment.

"While our economy grew 48 percent since 1998, emissions are down 18 percent," she said in a statement. "These figures prove once again that emissions can be cut without sacrificing the economy."

Kyoto only mandates emissions cuts for industrialized countries, not fast-growing developing countries like China and India. The U.S. said that was unfair and refused to ratify the deal.

Governments around the world are now in negotiations to extend Kyoto until a more comprehensive climate deal that includes both rich and poor countries can be reached. U.N. climate talks are focused on reaching such a pact by 2015, so it can take effect five years later.

___ Ritter reported from Stockholm.

Associated Press

Source: http://hosted2.ap.org/APDEFAULT/b2f0ca3a594644ee9e50a8ec4ce2d6de/Article_2012-10-24-EU-Greenhouse%20Emissions/id-fe8f9954312c4f9aa8718e4a9ef43ac8

yellow cab dropkick murphys guernsey nit colcannon dystonia tourettes

Investors Call on Canadian Oil Sands Producers to Improve Environmental and Social Performance

$2 Trillion Group of Investors Propose Higher Standards for Greenhouse Gas Emissions, Water Management, Land Reclamation and Consultations with First Nations

BOSTON, Oct. 22 /CSRwire/ - As presidential candidates spar over the issue of North American energy independence, a group of 49 investors with $2 trillion in assets under management are calling on Canadian oil sands developers to dramatically reduce the environmental and social impact of their operations by lowering greenhouse gas (GHG) emissions, managing water use, promoting land reclamation and consulting fully with First Nations and other communities affected by oil sands projects. The investors argued that these performance improvements ?should be prioritized ahead of unmitigated growth ambitions for oil sands development.?

The investors? statement of expectations was delivered to Canada?s Oil Sands Innovation Alliance (COSIA), an industry-led group formed in March with the specific goal of improving the industry?s environmental performance.

?We are supportive of COSIA?s goal to ?accelerate the pace and scope of environmental innovation? to put the oil sands on a more sustainable path, as well as its focus on transparency and accountability,? the investors wrote in the statement. ?We believe that COSIA?s effectiveness will be greatly enhanced by setting specific goals for improving environmental and social performance along with detailed plans for achieving them.?

Canadian oil sands production is already at 1.6 million barrels per day, the vast majority of which goes to the U.S. Last year, the U.S. imported as much oil from the Canadian oil sands as it did from Saudi Arabia, the second largest source of U.S. oil imports. Oil sands production is projected to grow to 4.2 million barrels per day by 2025.

Oil sands development is significantly more resource-intensive than traditional oil development, creating environmental and social concerns that investors argue may threaten the sector?s long-term viability and growth.

In their statement, investors specifically called on COSIA to:

  • Set goals and timelines for reducing the greenhouse gas intensity of oil sands production to at least that of conventional oil production, while also providing greater disclosure on research and development efforts and supporting provincial and federal regulations that would lead to significant reductions in GHG emissions.
  • Manage water risk by setting goals and timelines for minimizing net surface and groundwater withdrawals, and keeping withdrawals within science-based ecosystem limits.
  • Reduce the rate of land disturbance and increase reclamation, provide disclosure of liabilities, establish wetlands and biodiversity offsets and accept limits to the amount of land available to oil sands development at any given time.
  • In cooperation with government authorities, fully incorporate the principle of Free, Prior, and Informed Consent in their responsibilities to First Nations, Metis, Inuit and other communities affected by oil sands operations.

?Oil sands companies cannot ignore these performance improvements in the name of unmitigated growth. The risks to their industry and investors are simply too great,? said Matthias Beer, senior analyst of governance & sustainable investment at F&C Asset Management, a U.K-based investment firm. ?This statement of expectations asks oil sands companies to hold themselves to reasonable standards, which we believe is a necessary step in protecting the long-term financial viability of this resource.?

?This is a clear sign that investors are dissatisfied with the status quo in Canada?s oil sands, but the expectations it lays out are achievable,??said?Mindy Lubber, president of Ceres,?a sustainability advocacy group that organized the initiative. ?Oil sands companies must listen to their investors and substantially improve their environmental and social performance. Investors are telling these companies to prioritize these critical issues before they embark on aggressive growth plans."

In 2010, Ceres commissioned the report,?Canada's?Oil?Sands: Shrinking Window of Opportunity, which provides further detail on the financial and environmental risks of oil sands development including land, water and greenhouse gas management.

About Ceres

Ceres?is an advocate for sustainability leadership.?Ceres?mobilizes a powerful coalition?of investors, companies and public interest groups to accelerate and expand the adoption of sustainable business practices and solutions to build?a healthy global economy.?Ceres also directs the Investor Network on Climate Risk (INCR), a network of 100 institutional investors with collective assets totaling more than $10 trillion. ?

For more information, visit http://www.ceres.org

Source: http://feedproxy.google.com/~r/CsrwirePressReleases/~3/E1Gmvk_OlZk/34780-Investors-Call-on-Canadian-Oil-Sands-Producers-to-Improve-Environmental-and-Social-Performance

god bless america earned income credit super bowl commercials florida primary 2012 super bowl matthew broderick tax refund calculator

2005 Ford F-150 XLT ($13,994)

?

?

Have a question? Ask one of our
Internet Sales Managers right now at 863-797-4383

About This Ford

Ford F-150 XLT

  • VIN: 1FTPX14575FB43733
  • Stock No: 13C0064A
  • Mileage: 97,594
  • Style:Extended Cab Pickup
  • Transmission: 4-Speed Automatic w/OD
  • Engine: Gas V8 5.4L/330
  • Exterior Color: Silver Metallic

1418

Disclaimer:
Estimated Monthly Payment will depend on final negotiated agreed upon numbers on the exact vehicle purchased. Financing offers are through our designated lender based on a 680 beacon credit score and approved credit. Subprime finance approval may stipulate a bank fee. In that case customer is responsible for that amount. Prices are plus tax, tag/title, dealer fees, and any dealer installed equipment. Vehicles are subject to prior sale. All offers are mutually exclusive See dealer for complete details. Actual MPG rating will vary with options, driving conditions, habits and vehicle condition.

CARFAX Vehicle History

Don?t run the risk of buying a used car with costly hidden problems. Get a detailed vehicle history report from our nationwide database within seconds.

CARFAX Vehicle History Reports are based only on information supplied to CARFAX. Other information about this vehicle, including problems, may not have been reported to CARFAX. Use this report as one important tool, along with a vehicle inspection and test drive, to make a better decision about your next used car.

View the CARFAX Report

?

Features & Options

?

Additional photos of this 2005 Ford F-150 XLT

ALL OFFERS WITH APPROVED CREDIT PLUS TAX, TAG, TITLE AND $595 DEALER FEE, PLUS DEALER INSTALLED OPTIONS. OFFERS CANNOT BE COMBINED. ALL PRICES SHOWN WITH $2,000 CUSTOMER CASH OR TRADE REDUCTION. ALL REBATES AND INCENTIVES ASSIGNED TO DEALER TO INCLUDE FMCC CASH, MILITARY AND COMMERCIAL, HYUNDAI PRICES SHOWN WITH COMPETITIVE OWNERS INCENTIVE COUPON. BUY FOR PAYMENTS ARE BASED ON $2,000 CUSTOMER CASH OR TRADE REDUCTION FOR 75 MONTHS AT 3.9% APR. OFFERS CAN NOT BE COMBINED. PAYMENT DEFERRED PROGRAM WITH APPROVED CREDIT. ALL HYUNDAI LEASE PAYMENTS, 36 MONTHS, 12,000 MILES PER YEAR WITH $3995 CASH DOWN. ALL FORD LEASE PAYMENTS, 39 MONTHS,10,500 MILES, WITH $3995 CASH DOWN, IN SOME CASES A SECURITY DEPOSIT WILL BE NEEDED. UP TO 20% OVER BOOK TRADE IN VALUE LESS .20 CENTS PER MILE A YEAR AND LESS ANY RECONDITIONING COST TOWARDS TRADE-INS ON NEW OR USED VEHICLE. ALL USED PRICING REFLECTS A $1,995 CUSTOMER CASH OR TRADE REDUCTION. *EQUIPMENT AND FACTORY CERTIFICATION VARIES PER MODEL, ASK SALES REP FOR DETAILS. SEE DEALER FOR ALL DETAILS. ALL OFFERS EXCLUSIVE AND GOOD THRU DATE OF PUBLICATION. PHOTOS FOR ILLUSTRATION PURPOSES ONLY. DEALER NOT RESPONSIBLE FOR TYPOGRAPHICAL ERRORS. lkau2436

Source: http://www.lakelandautomall.com/used/2005-Ford-F-150-XLT-1FTPX14575FB43733

bobby petrino fired buffett rule lollapalooza lineup joss whedon ronnie montrose melissa gilbert dancing with the stars dandelion wine

Tuesday, October 23, 2012

AFRICA/CONGO DR - A ransom for the three priests kidnapped has arrived; Bishops condemn the crime

Kisangani (Agenzia Fides) -?Ho trovato una Chiesa viva, desiderosa di apportare il proprio contribuito alla promozione dell?uomo e allo sviluppo dell?area? dice all?Agenzia Fides don Giuseppe Magrin, incaricato della formazione per la Congregazione per l?Evangelizzazione dei Popoli, che ? appena rientrato da Kisangani, la pi? importante citt? del centro-nordorientale della Repubblica Democratica del Congo. Don Magrin ha partecipato al Seminario di formazione per i formatori dei seminari dell?Assemblea Episcopale Provinciale di Kisangani (ASSEPKIS), che si ? tenuto dal 18 al 27 novembre.
Gli altri conferenzieri oltre a don Magrin, erano Sua Eccellenza Mons. Julien Andavo, Vescovo di Isiro-Niangara e incaricato delle case di formazione della provincia ecclesiastica, Mons. Jan Dumon, Segretario della Pontificia Opera di S.Pietro Apostolo, e don Archange Kampi, della diocesi di Bunia e insegnante presso i Seminari maggiore e minore. Al seminario hanno partecipato 25 preti diocesani. ? I partecipanti al seminario erano particolarmente motivati, come dimostrato dal livello e dal numero delle domande da loro poste? dice don Magrin.
Don Magrin ? rimasto particolarmente colpito ?dal desiderio di miglioramento da parte degli abitanti di Kisangani, una citt? che convive ancora con le ferite dei violenti scontri del 1999 tra le truppe ugandesi e rwandesi per il controllo delle miniere d?oro che si trovano nelle sue vicinanze?.
?I giovani in particolare desiderano studiare per avere migliori possibilit? nella vita. Il governo intende potenziare la locale universit? e anche la Chiesa vuole dare il proprio contributo al miglioramento degli studi universitari? dice don Magrin.
?La Chiesa locale, pur tra le carenze materiali, vuole proseguire con entusiasmo l?opera di evangelizzazione iniziata nel 1897 da Missionari del Sacro Cuore di Ges? (dehoniani), col grande missionario p. Gabriele Grison, sulla cui tomba ha pregato Giovanni Paolo II, affiancati da missionari da altre congregazioni nelle vaste provincie dell?est del Congo. Tra questi vi sono anche i Padri Bianchi, grandi esperti del mondo islamico, perch? il primo nucleo dell?allora Stanleyville (ora Kisangani) fu costruito da immigrati sudanesi, in gran parte musulmani. Ancora oggi Kisangani ospita un?importante comunit? musulmana? ricorda don Magrin. ?I missionari hanno lavorato bene e la Chiesa e il clero locale sono il risultato dei semi sparsi da loro? conclude il sacerdote. (L.M.) (Agenzia Fides 28/11/2009)

Source: http://www.fides.org/aree/news/newsdet.php?idnews=32496&lan=eng

jeremy renner justin timberlake engaged bluefin tuna jonestown john dillinger carlos zambrano clemson

Despite Shutout Win, UMD Football Falls in AFCA Poll

October 22, 2012 Updated Oct 22, 2012 at 6:16 PM CDT

Duluth, MN (Northland's NewsCenter) --- A 30-0 homecoming win over Bemidji State did no good for the University of Minnesota-Duluth (UMD) football team in the national polls, as they fell a spot to eighth in this week's American Football Coaches' Association (AFCA) Division II poll.

The Bulldogs, who were ranked second in the AFCA preseason poll, are for the first time this season not the top-ranked team from the Northern Sun Intercollegiate Conference (NSIC).

Minnesota State-Mankato now sits seventh in the poll following a 30-20 win over Winona State this past weekend, vaulting them from ninth to now sitting a slot ahead of UMD.

Colorado State-Pueblo is the top-ranked team this week, receiving 24 of a possible 30 first-place votes. The entire AFCA Division II poll can be viewed here.

UMD is (7-1) overall this season and will next be in action October 27 on the road to Minnesota-Crookston, with that game scheduled for a 1:00 p.m. kickoff.

Posted by Zach Schneider
Bio - Facebook - Twitter - E-Mail

Source: http://www.northlandsnewscenter.com/sports/Despite-Shutout-Win-UMD-Football-Falls-in-AFCA-Poll-175319711.html

geithner gabrielle giffords juliette lewis chelsea handler mitch daniels shirataki noodles john kerry

How elephants' hair style helps them stay cool

Joanna Carver, reporter

elephant-hair-121010.jpg

(Image: Conor Myhrvold/Princeton University)

This may sound shocking, but elephants don't care much about style. Their hair, a Princeton University study has found, is functional, meant to keep the heat away.

It may seem like a bizarre concept, since in many animals hair or fur is meant to trap heat and keep critters warm. "But in this paper," said Elie Bou-Zeid, who led the research team, "we show that the sparse hair has the opposite effect."

An elephant's hairs help heat travel away from the skin. According to the study, a light breeze is enough to significantly cool an elephant, increasing its heat loss by 20 per cent.

Elephants, big leathery animals that they are, need to know how to cool off. They also use their trunks to splash water and mud on themselves.

Conor Myhrvold, a recent Princeton graduate and the paper's lead author, pointed out that nearly 300 years ago, scientist Antonie van Leeuwenhoek studied elephant hairs with one of the microscopes he invented and wrote to the Royal Society about them.

"It's not too surprising that something so small could be forgotten on something so large, the world's largest land animal," he said.

Journal reference: PLoS One, DOI: 10.1371/journal.pone.0047018

Subscribe to New Scientist Magazine

Source: http://feeds.newscientist.com/c/749/f/10897/s/24c0cb23/l/0L0Snewscientist0N0Cblogs0Cshortsharpscience0C20A120C10A0Celephant0Ehair0Estyle0Bhtml0Dcmpid0FRSS0QNSNS0Q20A120EGLOBAL0Qonline0Enews/story01.htm

Frank Ocean Gay scarlett johansson bill clinton andy roddick Costa Rica Earthquake sandra fluke kellie pickler

Monday, October 22, 2012

'Women in politics': more than a talking point

A Christian Science perspective.

By the editors of the Christian Science Sentinel / October 22, 2012

In a refreshingly apolitical twist ? in the midst of an overtly political event ? former Congresswoman Gabrielle Giffords bravely took the stage at the US Democratic National Convention last month. She was there simply to lead the crowd in the Pledge of Allegiance. But there was something far more significant about her appearance ? something almost of a miracle ? that momentarily hushed any political partisanship. Her presence wasn?t about politics. It was about the courage and strength to walk and talk.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

Ever since she was the victim of an assassination attempt in January 2011, Ms. Giffords?s story has transcended the bitter blame and hateful rhetoric that has consumed so much of the political arena today. After being critically injured by a gunshot wound to the head, she has been making a remarkable recovery. Hers is a tale of hope and inspiration, optimism, and perseverance. And her courage, grace, and humility have probably brought out the best in many of her fellow political leaders.

It?s been said by people on both sides of the aisle that if women had a greater presence in politics, our leaders would be better equipped to work together in a spirit of compromise and sisterly love, instead of dwelling on division and gridlock.

Why is this so? Maybe one reason is that having more women in leadership positions would force politicians to act like the family they really are.

Of course, there are some polarizing women politicians in both major US parties, and it would be naive and unrealistic to expect the solution to be as simple as voting in more female members of Congress. But while the answer may not be found simply in more gender balance, there is quite possibly an answer in more of a spiritual gender balance. In other words, the notion that more female politicians are needed in politics points to a deeper issue: that perhaps politicians are neglecting qualities traditionally thought of as feminine ? in themselves.

If all politicians ? male and female ? nurtured more of a spiritual femininity, we would naturally see more love, patience, compassion, purity, and generosity expressed. What a difference that would make!

Members of Congress must work together, at least to some degree, if they are going to accomplish anything. This means they must function as a family. And if traditionally masculine qualities are all that rule a family, then there?s bound to be something missing. That family might express deep intelligence, determination, and resolve, but if resolve is not balanced with love, it risks dissolving into bullying.

In her book ?Science and Health with Key to the Scriptures,? Mary Baker Eddy wrote, ?Union of the masculine and feminine qualities constitutes completeness. The masculine mind reaches a higher tone through certain elements of the feminine, while the feminine mind gains courage and strength through masculine qualities. These different elements conjoin naturally with each other, and their true harmony is in spiritual oneness? (p. 57).

Isn?t that what ?true harmony? is all about? It is both manhood and womanhood expressed. It is strength united with tenderness, wisdom with love, might with grace. Strength, wisdom, and might are all undoubtedly good qualities for leaders to express; but add tenderness, love, and grace to the mix and you have a government that functions with ease and joy.

In other words, government is not just the metaphorical ?father? of the nation; it must also be the ?mother.? And we can see ?mothering? qualities reflected by politicians in greater willingness to solve even the most intractable problems.

Mrs. Eddy ? herself a strong example of female leadership ? wrote, ?[M]aternal affection lives on under whatever difficulties? (Science and Health, p. 60). So no matter how daunting the difficulties ahead, if politicians cherish a maternal affection for the country, that affection will live on no matter what. It is bound to guide them to solutions that unite a family, that reconcile the bitter in heart, that inspire the hopeless, and that bring us all back to sit around the same table.

Adapted from an editorial in the Christian Science Sentinel.

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/VSbmaad4FBU/Women-in-politics-more-than-a-talking-point

anthony shadid gary carter this means war bobby brown suzanne somers colbert colbert report

Law of the Cloud v Law of the Land: Challenges and Opportunities ...

Source: De Filippi, P, Belli, L, ?Law of the Cloud v Law of the Land: Challenges and Opportunities for Innovation?, European Journal for Law and Technology, Vol. 3, No. 2, 2012

INTRODUCTION

Cloud computing represents an innovative use of information and communication technologies which has drastically modified the way in which computing resources are used and deployed over the Internet. Hardware and software resources are delivered on demand through the Internet, eliminating the need for users to purchase expensive computers and/or software applications. Similarly, data need no longer be stored on users? devices; they can be exported in large data-centres where they can be easily processed by Cloud operators. Consequently, the decentralized structure of the Internet (built on the ?end-to-end? principle) is slowly being supplanted by increasingly large and centralized infrastructures (designed around the concept of ?mainframes?).

The first section of this paper will analyse how this shift may affect the fundamental rights of users, mainly with regard to the right of privacy and freedom of expression. Indeed, given that they control most of the data passing through their platforms, Cloud providers have the ability to infringe users? rights ? e.g. by collecting and/or processing personal data without authorisation, or arbitrarily censoring certain types of communication.

Theoretically, it could be assumed that, in a competitive market, market players will eventually be forced to adapt to users demands and expectations in order not to lose market share. Yet, the Cloud market is an oligopolistic market dominated by a few large corporations concerned with the maximization of their own profits. The second section of this paper will examine the behaviour of these market players, and how they contribute to increasing or preserving their market share both by locking users into their systems and by claiming priority access to the network ? without paying particular concern to the fact that their activities might impinge upon users? privacy and freedom of expression.

Finally, the last section will address the potential solution that may be endorsed in order to preserve the fundamental rights of users, without constraining innovation. After addressing the distinction between ex-ante regulation (e.g. through the definition of net neutrality rules) and ex-post regulation (e.g. by means of competition law, consumer protection law, etc.), the paper will assess their corresponding benefits and drawbacks so as to determine whether either of them, or a combination of the two, could successfully preserve users? right without excessively limiting the operations of Cloud providers. Finally, the paper will explore the viability of alternative forms of regulation based on self-regulation and technical regulation by end-users. Indeed, users are becoming increasingly aware of the risks derived from Cloud computing, and are developing specific technologies and software applications in order to counteract the negative effects that certain Cloud services might have on their fundamental rights. Rules are, consequently, no longer dictated by Cloud operators in a top-down fashion; they are, instead, established by the users themselves through a bottom-up approach.

1. CLOUD COMPUTING AND FUNDAMENTAL RIGHTS

Although an exact definition of Cloud Computing has yet to be established, it can generally be regarded as a set of technologies that enable the dynamic provision of computing resources over the Internet.[3] [4] These can be either hardware resources ? such as storage capacity and processing power ? or software resources ? such as platforms and applications. These resources are provided dynamically on-demand, automatically growing or shrinking according to actual needs ? thereby reducing the risk of shortage or excess capacity. With the advent of Cloud Computing, an increasing number of applications are nowadays run in the Cloud rather than on user?s devices. Most of these applications can be accessed through a simple web browser: this is the case of most webmails, web-based document storage, as well as many web-based production and collaboration tools. Cloud computing can be distinguished into different types and categories according to the nature of the resources they are concerned with (Infrastructure as a Service, Platform as a Service, or Software as a service), and the extent to which they are being deployed (e.g. public, private, hybrid and community clouds).[5][6] [7] Different deployment models will have a different impact on users? right to privacy, data protection and freedom of expression. Given their potential effect on these fundamental rights, we will refer ? for the purpose of this paper ? almost exclusively to Cloud computing technologies deployed as a public Cloud in the form of Software as a Service.

From the perspective of end-users, the main advantage of this type of Cloud Computing is that data become a resource accessible from anywhere and at any time, as long as there is an Internet connection. This is likely to promote collaboration amongst users and facilitate data sharing across multiple locations. Cloud Computing also greatly reduces the costs of storing and processing information. Thanks to Cloud Computing technologies, a smart phone connected to the Cloud can be as powerful as a personal computer. Indeed, being most hardware and software resources increasingly relocated into the Cloud, users no longer need to purchase sophisticated computers with a large amount of resources; they can merely subscribe to a Cloud service, thus only paying for the amount of resources they use. However, to the extent that they lose control over the technological infrastructure, software applications, and data stored in the Cloud, users can no longer govern the manner in which these resources can be used or accessed by them or by others. Conversely, by controlling the underlying architecture of the Cloud, Cloud providers acquire the ability to monitor the activities and communications of users, as well as to control, restrain or manipulate most of the data stored in the Cloud.

At present, the distributed and decentralized architecture of the Internet is increasingly threatened by the centralised processing and storage of data undertaken by many Cloud operators ? which have acquired considerable power with regard to what may or may not be done with the information they hold. Private ordering allows Cloud providers to impose their own rules onto users, both contractually ? by means of specific Terms of Service ? and technically ? through the actual infrastructure of the Cloud. Oftentimes, the lack of bargaining power on the side of the users is such as to give them no other choice than accepting the rules dictated by the cloud providers (or abstaining from the use of their services). Besides, the transnational character of Cloud computing, combined with the opacity of its operations, is such that users generally have no control or knowledge over the exact location of data. [8] A number of challenges must therefore be addressed to determine the applicable law and the extent to which users? rights will be effectively protected. The following sections will focus on how centralised infrastructures might negatively affect the fundamental rights of users ? endangering their privacy and potentially jeopardizing their freedom of expression.

1.1 PRIVACY, DATA PROTECTION AND CONFIDENTIAL INFORMATION
Cloud computing triggers the application of several regulations that enshrine different conception of privacy and data protection, and different degrees of protection for confidential information. Hence, Cloud computing could have serious implications on the privacy of personal information and on the confidentiality of corporate or governmental information. [9] To begin with, it should be recalled that, at the European level, privacy and data protection are perceived as fundamental rights that deserveerga omnes protection.[10] [11] Indeed, the judicial traditions of many European countries have delineated privacy as an attribute of person-hood that cannot be waived and that should be protected against all. [12] Such a perception has led to reaffirm, on a regional level, the fundamental right to respect for one?s private and family life, home and communications ? which has been endorsed by both article 8 of the European Convention on Human Rights and article 7 of the European Charter of Fundamental Rights ? and the fundamental right to the protection of personal data ? which is specifically enshrined in article 8 of the Charter.

Conversely, in the United States (where the majority of Cloud providers? headquarters are located), the Constitution contains no express right to privacy. The American conception of privacy fundamentally coincides with the ?right to be left alone? ? a right whose constitutional basis can be found in the Fourth and Fifth Amendments of the Bill of Rights.[13] [14] Indeed, as it has been remarked by James Withman, the conceptual core of the American right to privacy ?still takes much the form that it took in the eighteenth century: it is the right to freedom from intrusions by the state, especially in one?s own home?. [15] Unlike the situation in Europe, therefore, privacy in the U.S. (as a constitutional right) has been tailored to be exclusively asserted against the State ? even though specific statutory laws have subsequently endorsed a legal right to privacy enforceable also against the private sector by means of a ?sectoral approach?. [16] This distinction is of particular relevance because Cloud computing generally relies upon the activities of a plurality of stakeholders operating from different jurisdictions ? all contributing to the provision of a single Cloud service. Hence, in the lack of agreed provisions to determine the applicable law for any given Cloud service, each stakeholder involved will remain subject to its own national legislation. This is likely to lead to a concurrence of different national laws ? frequently involving U.S. legislation. [17]

As a general rule, in the context of Cloud computing, the rights to privacy and data protection are affected only to the extent that users might disclose information which qualifies as ?personal data? ? the processing of which is framed by a number of legal provisions.[18] [19] In this respect, it should be noted that Cloud operators can gather a considerable amount of information about their users ? which can be disclosed either explicitly or implicitly through their actions. As regards personal data, while they are often disclosed directly by users (e.g. in the process of subscribing to the service), they might also be revealed unwillingly to the Cloud operator ? who can subsequently exploit this information to its own benefit. [20]

The rights to privacy and data protection are thus likely to be violated by a variety of Cloud operators that process personal data beyond what is strictly necessary to provide a service to their user-base, often with a view to create personalised profiles delineating the habits of the user-base. [21] User profiling has indeed become an extremely lucrative tool to provide customised and targeted advertisements. Yet, as we will explain later, these profiles may eventually be disclosed to third parties or accessed by foreign agencies ? thereby further endangering the privacy of users. These issues are further complicated by the fact that, in order to improve the speed and reliability of Cloud services, data is frequently copied and processed on several servers at the same time. Jurisdictional issues may arise insofar as these different data centres are located in different countries with divergent privacy standards. As it has been highlighted by Peter Hustinx (European Data Protection Supervisor): only Cloud operators established in the EU and/or using equipment in an EU Member State (or acting as a processor for a controller using such equipment) will in principle be ?caught? by EU law; others will escape EU law ? even if they mainly and mostly targets European citizens. [22]

Therefore, in order to protect the fundamental right to privacy of European citizens, Directive 95/46/EC precludes the transfers of personal data to any third country that does not provide an adequate level of protection as regards the processing of personal data. [23] In this respect, the US approach to privacy ? as a combination of sectoral laws and self-regulation ? can hardly be regarded as an adequate standard from a European perspective. [24] Yet, the gap between the protection granted in the EU and in the US has been bridged by the US-EU Safe Harbour Agreement, meant to safeguard the free flow of information between the US and the EU by establishing a voluntary mechanism that allows US organizations to self-certify their adherence to a particular set of Privacy Principles deemed as a sufficient level of privacy protection. [25] [26]

The confidentiality of information stored in the Cloud is also put at risk to the extent that it subsists on remote servers held by a variety of market operators, who might have economic interests and/or legal obligations to disclose confidential information to third parties ? be those commercial actors or governmental bodies.[27] [28] Indeed, in certain jurisdictions information stored in the Cloud may be accessible by governmental agencies, in spite of the rights and protections guaranteed under the user?s domestic law. [29] For instance, Section 217 of the US Patriot Act allows US governmental agencies to intercept the communications of any ?computer trespasser? as long as they have obtained authorization from the ?owner of a protected computer? ? an entity that could potentially qualify as a service provider.[30] The Patriot Act thereby exonerates the US government from the need of obtaining a warrant to intercept online communications.

Furthermore, data confidentiality can be threatened by exporting data into centralized Cloud infrastructures, insofar as the user loses control over that data. [31] In particular, it should be noted that, in the US, the ?business record doctrine? (or ?third party doctrine?) stipulates that confidential information is no longer protected by the Fourth Amendment when it is knowingly revealed to a third party ? since disclosure implies relinquishing control over information. [32] Anyone communicating private information to a third party Cloud operator should therefore assume that such information can no longer be reasonably considered as private or confidential.

Finally, given the number of actors involved in the provision of a Cloud service, the risks of losing data or losing control over online information are much higher ? and the impact much greater ? in the context of Cloud computing. [33] On the one hand, users run the risk that data may be intercepted during their transmission to the Cloud. On the other hand, data stored in the Cloud could either be deliberately disclosed to unauthorised parties by the Cloud operator itself (e.g. under an expectation of remuneration) or be accidentally made available to third parties (as a result of a fault or security breach). Hence, in order to preserve users? privacy and confidentiality, Cloud operators need not only comply with data protection regulation, but also adhere to specific duties of care and incur the infrastructural costs necessary to guarantee the security and integrity of online communications. [34]

1.2 FREEDOM OF EXPRESSION
Freedom of expression is a fundamental right, enshrined, inter alia, in the International Covenant on Civil and Political Rights (article 19), and the European Convention on Human Rights (article 10). Yet, freedom of expression shall not be conceived in absolute terms. While it has been recognized as a fundamental right by most international treaties and conventions, the right to freedom of expression (or free speech) is subject to a number of limitations bent on preserving particularly relevant interests ? such as public order, morality, national security and public health. To this extent, national legislators have been allowed to incorporate into the law a limited series of exception to the enjoyment of this right.

Freedom of expression might, however, be significantly challenged by Cloud computing in a way that extends way beyond these exceptions. Indeed, since all communications passing through the Cloud can theoretically be monitored by the infrastructure provider (unless these have been encrypted beforehand), they can potentially be filtered and/or censored by the various Cloud operators involved in the transmission thereof. [35]

For instance, Facebook?s Terms of Service prohibits ?obscene? and ?sexually explicit? material ? where the assessment of such material is unilaterally carried out by Facebook?s staff itself. [36] [37] Hence, when the social network decided to ban pictures illustrating naked breasts, many mothers had their breast-feeding pictures removed from their Facebook profiles without any opportunity of challenging this decision. [38] It could be argued that every online service provider has the right to decide what kind of content can be published on its own platform. Yet, given that, as a result of network effects, there are only a few platforms available for users to choose from, the arbitrary decision of any service provider holding a dominant position in the market might have negative effects on user?s freedom of expression insofar as it only authorises certain types of communication.

Given the extent to which they can affect users? ability to communicate, the internal policy of Cloud service providers and the technical implementation of the user interface can produce normative governing effects similar to laws. However, as opposed to the Law of the Land, which must necessarily be enforced by public authorities, the Law of the Cloud can be automatically enforced by the technical functionalities provided by the platform ? which can be used either to enhance or to impede basic freedoms. [39] If it is true that, as stated by Lawrence Lessig, ?Code is law?, it is also true that the private policy of Cloud operators could be seen as a substitute legal system. [40] These policies do indeed integrate a series of rules, which can be automatically imposed upon users by private enforcement systems and technological measures of self-help. [41] If the ?medium is the message?, whoever controls the medium also has the possibility to control the contents of the message ? either by modifying the technical infrastructure in order to indirectly affect the manner in which people communicate, or by interfering directly with users communication so as to censor, or eventually alter the content thereof. [42]

Finally, anonymity is also likely to have a strong impact on freedom of communication. Since the right of freedom of expression also comprises the right to communicate anonymously, every user who communicates by means of an online application should be guaranteed that the service provider does indeed respect and enforce the anonymity of communications ? a precondition for free political and social discourse. [43] Yet, for a variety of reasons ? technical or not ? Cloud providers tend to require users to identify themselves before they can benefit from their service. This is likely to trigger a chilling effect on communication and to limit users? ability to fully exercise their right to freedom of expression on the Internet. [44]

2. CLOUD COMPUTING AND THE MARKET

According to market economics, it might be assumed that the aforementioned problems could ? theoretically ? be ignored, since market mechanisms will make sure that no service provider will ever infringe the rights and the privacy of users beyond what is acceptable by them. [45] In a competitive market, a service provider that does not respect the expectations of its user-base will eventually be overtaken by the operators that meet the demand of unsatisfied users. Competition will thus ensure that the fundamental rights of users are respected to the extent necessary as to satisfy the demand.

In practice, however, the advent of Cloud computing is characterised by a trend towards a massive centralization of resources. [46] In order to achieve significant economies of scale, large data centres have been developed, gathering together a large number of computing resources ? in terms of storage capacity and processing power. While this is not a problem as such, centralisation could lead to market failure to the extent that the Cloud industry becomes dominated by a single entity or by a group of entities acting collectively. Should these entities abuse their dominant position, the self-regulating mechanisms of the market would most likely be compromised. [47]

By rising up market barriers, dominant players can limit the number of competitors in the market so as to maintain a dominant market share. This can be done, for instance, by reducing interoperability in order to lock users into a specific system and/or by acquiring priority access to the network so as to reduce the perceived quality of competing services. Given their consequences on innovation, those two mechanisms will be explored more in detail in the following sections.

2.1 INTEROPERABILITY V USER LOCK-IN
Interoperability is generally regarded as a key factor for competition. In the European Union, interoperability emerged as a competition issue in the ICT sector as far back as the 1980s, with the IBM case, and was reiterated in 2004 by the Court of First Instance which confirmed an infringement decision against Microsoft for failing to supply interoperability information to its competitor. [48] [49] In addition, by virtue of the Intel/McAfee case, interoperability ? notably, ?degradation of interoperability? ? gained a prevalent role in EU decisional practice. [50] On June 2010, the Vice President of the European Commission Joaqu?n Almunia underlined that the ICT sector is characterized by potentially strong network effects and strong risks of user lock-in which justify a growing need for interoperability. [51] Nowadays, interoperability and data portability play a pivotal role in avoiding vertical integration and consumer lock-in ? two frequently uttered risks with regard to Cloud Computing, where interoperability limitations have already been ascertained as potential causes of anti-competitive behaviours. [52] Thus, in order to ensure that consumers can freely choose and switch across the most competitive services, data portability ? and, eventually, interoperability ? must necessarily be guaranteed.

Yet, Cloud providers are frequently tempted to lock their users into their system by increasing the transaction costs necessary to shift from one service to the other. This is generally done by relying on a proprietary system that does not allow for any kind of interoperability with competing services, or by means of contractual provisions imposed upon the user-base. By doing so, Cloud providers can reduce the value (or the perceived value) of competing products without actually increasing the value of their own ? a practice which can be considered abusive insofar as they hold a dominant position in the market. [53] Such behaviour has recently been ascribed to Google by virtue of its AdWords search advertising platform and AdWords Application Programming Interface (API). [54] In fact, by imposing contractual restrictions prohibiting the development of software to export data from AdWords to any alternative advertising platform,AdWords?s Terms and Conditions introduced a considerable barrier to the utilisation of any competitive platform. [55] This affair illustrates how interoperability limitations can be used to trigger unnatural network externalities, leading to an irregular augmentation of Google?s market share to the detriment of its competitors, so as subsequently increase its market value. [56]

To avoid similar problems, the proposal for the new Data Protection Regulation in Europe introduced provisions for data portability imposing that users are given the opportunity to retrieve their data in a ?structured and commonly used? electronic format. [57] Yet, by neglecting to impose an obligation to provide data in an open format allowing users to transfer data to any other system of their choice, the Regulation does not however constitute a strong affirmation of the right to data portability.

2.2 NET NEUTRALITY V BANDWIDTH BALKANIZATION
On the Internet, a natural barrier to entry exists in the form of network effects ? where the value of a service ultimately depends on the number of people using it. Positive externalities are created as new users increase the actual value of the service they use. The greater is the number of users, the more valuable becomes the service. Eventually, a positive feedback loop can be observed, whereby the number of users renders the service more valuable and consequently attracts more users to join. Yet, such a virtuous cycle can only be achieved after a critical mass of users has been reached. In the context of Cloud Computing, network effects are especially relevant in the case of online social networks such as Twitter, Facebook, or Google+ whose utility increases as more users use it. The challenge for those online service providers is to attract as many users as possible in order to acquire the initial number of users necessary to trigger the bandwagon effect.[58]

Yet, the greater is the number of users, the more considerable will be the amount of data to be transferred within a given period of time. Given a limited amount of bandwidth, as the data flow increases connection speed will necessary decrease. Nowadays, as the number of Internet users keeps growing, bandwidth has become to be regarded as an increasingly scarce resource. Cloud providers thus have an obvious incentive to pay more to get higher quality Internet connection. This can be achieved, in particular, through the technique of data prioritization ? by providing priority access to the network to only certain online intermediaries, thereby making their service more attractive to users and further increasing network effects. [59] However, as will be highlighted below, being bandwidth a scarce resource, data flow prioritization may ultimately lead to the detriment of non-prioritized players.

Since the transmission of data is a prerequisite for the provision and/or the consumption of Cloud services, Cloud providers and Internet users require a constant and reliable Internet connection provided by Internet service providers. ISPs thus find themselves in a highly strategic position along the Internet value chain, as they fundamentally constitute a two-sided platform, giving the opportunity to two different user groups ? Internet users and Cloud providers ? to benefit from each other. [60] Data flow management tools might enable ISPs to implement data discrimination by means of Deep Packet Inspection (DPI) and other techniques commonly implemented in Next Generation Networks (NGN). [61] While it has been strongly criticized by net neutrality advocates, data discrimination might actually bring a series of benefits to users eager to enjoy higher quality services on the Internet. [62] Indeed, users may find it advantageous to get faster access to certain Cloud services so as to be able to upload and download data more quickly.

In light of these new traffic management possibilities and considering that users? demand for priority access to particular online services often implies data discrimination, this technique might eventually be integrated in the business model of a number of ISPs. This possibility has been officially acknowledged by the Vice-President of the European Commission Neelie Kroes who has clarified that the European Commission do not want to ?create obstacles to entrepreneurs who want to provide tailored connected services or service bundles? though stressing that consumers must be ?aware of what they are getting, and what they are missing?. [63]

In the context of Cloud Computing, in order to cope with the considerable augmentation of bandwidth consumption determined by online services ? particularly with regard to audiovisual applications ? ISPs can theoretically adopt three different approaches: (1) imposing constraints on the amount of data that can be transferred throughout the network, thereby decreasing the quality of the provided services, (2) undertaking network-improvement investments at the expense of end-users, e.g. by raising Internet fees (3) introducing better Internet traffic management, e.g. by introducing data discrimination. [64] The latter seems to be the most seducing option for ISPs. Indeed, by introducing data packet prioritization policies, ISPs could benefit from a more efficient management of their network, while offering both users and Cloud providers a wider range of options based on a variety of quality-of-service (QoS) parameters.

Whilst enabling Cloud providers to provide faster and more reliable services to their customers, data discrimination may, however, also trigger anti-competitive behaviours and encourage the implementation of abusive business models. Offering priority access to the network to certain players only would most likely introduce a new barrier to entry ? making it difficult or impossible for others to compete on equal grounds. [65] Access prioritization may thus jeopardize competition in the market, by precluding other service providers from offering a competing service without acquiring priority access for themselves. Regardless of the quality of the service they might offer, their services will, in fact, always be slower and therefore less valuable. Hence, if priority agreements between Cloud providers and ISPs were to be permitted, competition on the market for online services may be considerably compromised, to the ultimate detriment of end-users.

This is probably by reason of a similar reflexion that the European Parliament and the Council found it necessary to address the issue of network neutrality while elaborating the Telecoms Package. [66] [67] Although the principle of net neutrality has not been fully endorsed by European legislation, it has nonetheless been recognized as a useful means to promote competition and transparency in the market for online services. It can be said, therefore, that the principle of network neutrality has been implemented a minima within European law. Without precluding the possibility for ISPs to implement innovative business models based on data discrimination, the European legislators endowed national regulators with the authority to decide the extent to which net neutrality should be protected. National Regulatory Agencies (NRA) have thus been empowered with the faculty to establish a minimum quality of service threshold and to impose transparency obligations for network operators in order to protect users? rights by making them aware of (and sometimes forbidding) certain kinds of network management practices.[68] [69]

Though not expressly endorsing the principle of network neutrality, the current approach presents the undeniable advantage of encouraging the experimentation of innovative business models, while ensuring that fair competition is preserved to the extent that users are properly informed of the limitations that they might encounter while using the service. Minimum quality thresholds can also be introduced to guarantee a preliminary implementation of the network neutrality principle, without overly constraining the contractual freedom of market players. On the downside, it should be stressed that the Telecoms Package has however failed to achieve harmonization across Member States by neglecting to impose a coordinated approach establishing a common minimum quality threshold at the European level ? opting instead for a more fragmented approach which presents the risk of ?quality balkanisation? due to the potentially divergent minimum standards defined by different NRAs. To this latter extent, the Body of European Regulators for Electronic Communications (BEREC) might play a pivotal role in coordinating the different NRAs with the aim to harmonize the minimal standard of Internet connectivity.

The net neutrality approach chosen by the European Legislator has shed light on the necessity of envisaging a heterogeneous regulatory strategy in order to frame and best regulate the Cloud Computing phenomenon. The following section will analyse the different regulatory techniques that have been proposed so far, investigating their corresponding advantages and drawbacks to eventually come up with the most suitable solution.

3. REGULATORY SOLUTIONS

Cloud computing is one of the most versatile and rapidly evolving segments of the Internet, allowing a plethora of different usages and combining a number of innovative technologies. Despite the relevance of Cloud Computing in the European economy, no specific pan-European regulation has been elaborated so far.[70] It is nonetheless possible to identify three different legal regimes affecting the Cloud Computing sector: electronic communications regulation (cf. theTelecoms Package), electronic commerce regulation (cf. the Electronic Commerce Directive) and European competition law.[71] [72]

As previously illustrated, the specificity of Cloud Computing is that it is a sector characterized by large economies of scale and strong network effects. Market mechanisms are thus likely to lead towards the centralization of resources, with a consequent loss of user control. As a result, the market for Cloud Computing services is likely to be dominated by a few very large players, which may be tempted to abuse their dominant position in the market ? a situation which might result in adverse effects on the right to privacy, data protection and freedom of expression. Assuming that, once a certain number of dominant players are established in the market, the latter is no longer able to regulate itself efficiently, governmental intervention might be required in order to rectify market failures, ensuring that users are free to choose the service that best satisfies their needs.

The fundamental question that will be addressed in the following sections is whether competition should be preserved through ex-ante or ex-post regulation. Ex-ante regulation would require broader enforcement of fundamental rights and/or the introduction of strong net neutrality rules (e.g. in the form of non-discrimination obligations), whereas ex-post regulation would essentially rely on the judiciary tools which are already available under competition law or other bodies of law (such as data protection and consumer protection laws). To conclude, the paper will investigate whether it might be possible to resolve these problems by resorting exclusively to market-based regulatory strategies, i.e. self-regulation by the market actors and users themselves.

3.1 EX-ANTE REGULATION
With regard to fundamental rights, were current data protection rules and consumer protection laws to be respected, users? rights would be properly upheld. However, the brief though intense history of the online industry has shown that fundamental rights protection ? especially concerning privacy ? has not been overwhelmingly successful. This has led to the development of a new data protection framework provided by the recently proposedData Protection Regulation (DPR). [73] Aimed at strengthening users? fundamental rights, the adequacy of the new DPR remains however questionable. This is especially true in the context of Cloud Computing ? characterized by a large number of actors, whose international scope makes it difficult to determine the applicable laws in the case of litigation. While its provisions apply to any entity processing EU citizens? data (regardless of their physical location), the DPR does not however provide explicit protection against unauthorized access to EU data stored in a foreign data centre by governmental authorities. EU citizens exporting data into the Cloud cannot in fact rely on data protection rules provided for under domestic law vis-?-vis foreign public authorities. [74] [75]

Interoperability and data portability are two other factors that could enhance competition in the European market for Cloud services. In fact, the greater is the level of interoperability, the greater will be the portability of data amongst different Clouds services. In order to reduce the risks of consumers being locked into one particular online service, interoperability might however need to be enforced more sharply that it currently is under the revisedData Protection Regulation. [76] Indeed, by introducing interoperability obligations for Cloud operators ? in addition to current data portability requirements ? the law would enable users to export their data from one Cloud to another without any difficulty.

With regard to net-neutrality, the situation is slightly more complex, since enforcing net neutrality through regulation might lead to two contrasting results. On the one hand, non-discrimination obligations would preclude ISPs from charging Cloud providers more for acquiring priority access to the network. Ensuring that packets are always treated equally would facilitate the entrance of competing services in the market by reducing the potential new barrier to entry that new service providers would otherwise encounter vis-?-vis established providers. In addition, non-discrimination rules may encourage ISPs and network operators to undertake infrastructural investments aimed at improving the speed and quality of all Internet communications ? whereas, allowing them to charge for priority access would actually constitute an incentive for them to keep the general quality of Internet connections low. On the other hand, however, rules prohibiting any form of packet discrimination may be regarded as excessively draconian. Indeed, as previously illustrated, priority access to the network may be advantageous to both Cloud providers and users ? who would be able to enjoy a faster and more reliable connection to specific online services. The implementation of ex-ante net neutrality rules would therefore ultimately require a nuanced approach, to preserve competition in the market while nonetheless allowing for the establishment of innovative business models within a competitive environment.

3.2 EX-POST REGULATION
An alternative strategy would suggest adopting a more laissez-faire approach, letting the market mechanisms sort out the problem and only intervening ex-post through the tools provided under competition law ? whenever it becomes evident that the market cannot autonomously restore competition. Such an approach would require a throughout investigation of the market for online services in order to establish the extent to which a single entity or group of entities actually dominate the market. Should dominance be found, barriers to entry would then be assessed to determine whether or not they may preclude competition in the market.

It should be noted that, in in the case of Cloud Computing, barriers to entry are already substantial for a variety of online services. Service providers, such as Google, Apple and Facebook, for instance, currently enjoy huge market shares and may be tempted to leverage their dominance into new markets. [77] Yet, according to this approach, competition authorities should only intervene when evidence of an alleged abuse of dominance is found, or if a merger between two or more service providers would drastically jeopardize competition in the market. [78] Short of either of these two situations, governmental intervention would be unjustified, thereby delegating to the market the responsibility to solve interoperability and data-portability issues, as well as to guarantee the protection of users? fundamental rights.

3.3 SELF-REGULATION
The position of this paper is that, aside from these two approaches, it would be perhaps more effective to look for alternative solutions to market failure. If the aforementioned issues cannot be properly solved either by ex-ante or by ex-post regulation, it is worth exploring whether it might be possible to address them through a different approach based on self-regulation by private parties. Self-regulation implies a certain degree of independence from State regulation, as market players regulate themselves ? developing common rules and self-enforcing them. [79] In the context of Cloud computing, self-regulation might be adopted in order to increase professional reputation and preserve ethical standards. This can be achieved, for instance, by promoting certain practices (interoperability, privacy-compliant services, etc.) and banning others types of activities that might negatively affect the user-base (user-profiling, targeted advertising, arbitrary censorship, etc.).

Yet, given the characteristics of the market for Cloud services (dominated by few large corporations), private regulation amongst market players is unlikely to lead to satisfactory results. The State might therefore intervene in order to push self-regulation in the right direction. Indeed, although self-regulation only concerns a limited number of market players, to the extent that they operate within the boundary of the State, they are nonetheless subject to national rules. State regulation can create the necessary infrastructure and provide the necessary incentives for Cloud providers to regulate themselves in a way that properly takes into account users? demands and expectations.

However, self-regulation is not only limited to the realm of market players; it could be ? and has already been ? implemented amongst specific communities of users eager to autonomously establish the rules to which they will have to abide, rather than complying to the rules dictated by third party Cloud operators. This particular type of self-regulation distinguishes itself from the self-regulation of Cloud operators insofar as it does not primary rely on standard agreements or codes of conducts, but rather on technical means (hardware or software) developed by users to address what has not been properly provided by Cloud operators. These tools are designed to provide users with a means to delineate their preferences in a series of rules that are automatically enforced through technological means, regardless of whether or not they comply with the policy of various Cloud operators. These rules can thus be regarded as some form of private ordering achieved through bottom-up technical regulation.

To this latter extent, an interesting example is Eben Moglen?s Freedom Box, intended to give users back control over their data. [80] The Freedom Box is a small and cheap device which functions as a private server featuring built-in privacy and security settings. By shifting power and information away from corporate or governmental bodies, this device endow users with complete control not only over their data, but also over the infrastructure of communication, thereby protecting online privacy and promoting freedom of expression. While it actually operates outside of the Cloud computing framework, the Freedom Box has nonetheless an impact on the Cloud market to the extent that it constitutes an alternative and competitive service that provides ubiquitous access to data stored and processed in a private device ? without impinging upon user?s rights. As such, the Freedom Box can be said to exert an indirect effect over the practices of Cloud operators, which can no longer abuse their power without incurring the risk of losing at least part of their user-base.

Another answer to market failure ? mostly as a response to the growing concerns for net neutrality ? is illustrated by the recent deployment of spontaneously organized wireless mesh networks ? local area networks (LAN) that operate independently from the Internet infrastructure. [81] Indeed, the technical infrastructure of most mesh networks is created through the wireless capacities of users? devices (mobile phones, Wi-Fi routers, etc.) and operated as a peer-to-peer network ? being every device simultaneously a node and an access provider for other nodes. This creates a flexible, dynamic and potentially resilient network that operates independently from the terms and conditions of traditional ISPs in terms of access and bandwidth. Although at an experimental stage, the mesh network could potentially represent a viable alternative to the Internet network. Hence, were the mesh network more widely deployed, it might seriously affect ? albeit indirectly ? the operations of many Internet service providers.

The problem is that, even if these technologies are publicly available to the general public, they are often technically complex to operate, therefore excluding a large section of users from using them. Besides, a plethora of data is currently being held ? whether we like it or not ? by governments and corporations with which we interact (e.g. banks, credit cards, or ISPs). To the extent that their data management might rely on online Cloud services, at present, a legal or regulatory approach cannot be completely discounted in favour of liberating technologies.

As a matter of fact, regulation could either aid or impede these technologies. While it might promote the development of innovative technologies, the law might as well preclude their deployment by excessively regulating the framework in which they operate. For instance, by encouraging unlicensed uses of the Wi-Fi spectrum, the law can support the development of openly available wireless networks, encouraging further innovation in mobile communications. Conversely, proposals to regulate the Wi-Fi spectrum would most likely annihilate any opportunity for the mesh network to subsist. [82] Similarly, while network neutrality may protect consumers in the short run, it might simultaneously diminish the need for the deployment of an alternative communication network ? thus eventually harming the consumers in the long-run by discouraging the development of an innovative platform that the market would have otherwise provided. In the words of J. Schumpeter, in order to encourage the process of ?creative destruction?, it is sometimes better to let competition in the market die, in order for a new market to emerge. [83]

[1] Primavera De Filippi is a researcher at the CERSA / CNRS / Universit? Paris II; representative of CreativeCommons France and coordinator of the Public Domain working group at the Open Knowledge Foundation.

[2] Luca Belli is a PhD candidate in Public Law at PRES Sorbonne University / Universit? Panth?on-Assas / CERSA; ISOC returning Ambassador to the United Nations Internet Governance Forum and member of the Steering Committee of Medialws.eu.

[3] For a preliminary attempt to provide a systemic overview of Cloud Computing technologies, see e.g. Youseff, L. Toward a Unified Ontology of Cloud Computing , Grid Computing Environments Workshop, 2008. GCE ?08

[4] For a more accurate description, see the NIST definition of Cloud Computing, as ?a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.? See: Peter Mell and Timothy Grace, The NIST Definition of Cloud Computing. National Institute of Standards and Technology, NIST Special Publication 800-145, 2009, available at http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (last visited October 5th 2012

[5] Cloud computing technologies provide users with the ability to acquire the technical infrastructure ? in terms of storage, memory and processing power ? dynamically and on demand. This is the most basic form of Cloud Computing, often referred to as IaaS (Infrastructure as a Service).

[6] PaaS (Platform as a Service) is more complex form of Cloud Computing, which provide users with a computing platform -typically including an operating system, a programming environment, a web server and a variety of databases.

[7] SaaS (Software as a Service) is a specific type of Cloud Computing that provides an interface to computer software or other online applications that do no longer need to be run on the end-users devices.

[8] See: Peter Mell and Timothy Grace, 2009, p. 2.

[9] Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing. Report prepared by Robert Gellman for the World Privacy Forum, February 23, 2009

[10] See: Article 7 and 8 of the Charter of Fundamental Rights of the European Union, which respectively enshrine the Right to respect for private and family life (privacy right) and the right to the protection of personal data (data protection). The protection of personal data is also protected by Article 17 of the Treaty on the Functioning of the European Union, and has been further corroborated through the European Directive 95/46/EC on the Protection of Individuals with regard to the Processing of Personal Data and on the Free Movement of such Data (currently under revision).

[11] As Hon. Mr. Justice John L. Murray has remarked, ?EU law is characterised by the principles of direct effect and primacy of Community law in relation to national law, and thus forms an integral part of national law in each member state, which is relied upon and enforced by national courts. Thus, EU law and the decisions of the Court of Justice may be relied upon by individuals before national courts in all Member States. The ability to do so applies in a uniform manner in all Member States and is not dependent on, or governed by, national legislation. Reflecting the high degree of integration at the EU level, the decisions of the Court of Justice have a direct impact on domestic legal systems as they are binding erga omnes, and strong mechanisms exist for their enforcement?. See: John L. Murray, The In?uence of the European Convention on Fundamental Rights on Community Law, Fordham International Law Journal, Vol. 33, Issue 5, 2011, p. 1391.

[12] See: James Q. Whitman, The Two Western Cultures of Privacy: Dignity Versus Liberty, The Yale Law Journal, Vol. 113, 2004. See also: Fran?ois Rigaux, L?individu, sujet ou objet de la soci?t? de l?information, Groupe d??tudes Soci?t? d?information et vie priv?e, 2008.

[13] See Olmstead v. United States, 277 U.S. 438, 471-85 (1928) (Brandeis, J., dissenting): ?The makers of our Constitution understood the need to secure conditions favourable to the pursuit of happiness, and the protections guaranteed by this are much broader in scope, and include the right to life and an inviolate personality ? the right to be left alone ? the most comprehensive of rights and the right most valued by civilized men. The principle underlying the Fourth and Fifth Amendments is protection against invasions of the sanctities of a man?s home and privacies of life. This is a recognition of the significance of man?s spiritual nature, his feelings, and his intellect.?

[14] Such an interpretation of the Fourth Amendment has been formulated by Samuel Warren and Louis Brendis famous article and reiterated by Louis Brandis himself in his famous dissenting opinion in Olmstead v. U.S. Warren and Brandeis indeed argued that ?[t]he makers of our Constitution sought to protect Americans in their beliefs, their thoughts, their emotions and their sensations. They conferred, as against the Government, the right to be let alone?the most comprehensive of rights and the right most valued by civilized men. To protect that right, every unjustifiable intrusion by the Government upon the privacy of the individual, whatever the means employed, must be deemed a violation of the Fourth Amendment? See: Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193(1890)).

[15] See: James Q. Whitman, 2004, p. 1163

[16] Starting from the 1970s, legislation has been enacted to introduce privacy protection with regard to specific sectors of activities. The first amongst these pieces of legislation was the Fair Credit Reporting Act, which was enacted in 1970 to promote accuracy, fairness, and the privacy of personal information assembled by Credit Reporting Agencies. For further details, see: EPIC, The Fair Credit Reporting Act (FCRA) and the Privacy of Your Credit Report. Another example of the U.S. sectoral approach to privacy may be found in the Health Insurance Portability and Accountability Act (1996), which has introduced a right to information privacy in the health sector. With regard to the online environment, it should be noted that specific protection has been accorded to the privacy of children under the age of 13. Indeed, the Children?s Online Privacy Protection Act (COPPA) ? which took effect in 2000 ? has been specifically tailored to protect the privacy of children by requesting parental consent for the collection or use of any personal information of the users. See: EPIC, Children?s Online Privacy Protection Act (COPPA), available at http://epic.org/privacy/kids/ (last visited October 5th 2012).

[17] It is worth to underline that this heterogeneity of applicable laws involves also the juridical systems within the European Union. Indeed although the Directive 95/46/EC has provided a certain degree of harmonization, the Member states have elaborated 27 slightly different approaches in order to integrate the directive to their national systems. Notably, discrepancies may be found with regard to approaches adopted to frame financial data, health data, etc. It is indeed by reason of this fragmentation that the European Commission has suggested the adoption of a Regulation ? which is a directly applicable juridical tool ? amongst the juridical tools aimed at redefining in a uniform fashion the legal framework of the personal data protection.

[18] Under Article 2(b) of Directive 95/46/EC, ? ?processing of personal data? (?processing?) shall mean any operation or set of operations which is performed upon personal data, whether or not by automatic means, such as collection, recording, organization, storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission, dissemination or otherwise making available, alignment or combination, blocking, erasure or destruction ?.

[19] Directive 95/46/EC has set forth some specific duties and obligations on the ?data controller? and the ?data processor?. Under Article 2 of the Directive, ?(a) ?personal data? shall mean any information relating to an identified or identifiable natural person (?data subject?); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity; [...](d) ?controller? shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or Community law; (e) ?processor? shall mean a natural or legal person, public authority, agency or any other body which processes personal data on behalf of the controller?. Duties and obligations are specified in article 6, 7, 10, 12, 17, 25, 26.

[20] As an example, one may think about the Facebook like button which besides allowing Facebook users to share the content they like with their ?friends?, places ?cookies? on the user?s browser, in order to ?recognise? the user and eventually track its browsing habits. The very purpose of the pieces of software named cookies is indeed to recognise a specific user and trace his browsing habits. Indeed, every time that the user will visit a webpage containing a like button, the cookies will make him recognisable. To this latter extent, see as an instance A.P.C. Roosendaal, ?We Are All Connected to Facebook?by Facebook!?, in: S. Gutwirth et al. (eds.), European Data Protection: In Good Health?, Heidelberg: Springer (2012), pp. 3-19.

[21] For a survey of the various dangers and challenges for privacy in Cloud Computing environment, see Rong Zhang ; Wei Xie ; Weining Qian ; Aoying Zhou , Security and Privacy in Cloud Computing: A Survey, Sixth International Conference on Semantics Knowledge and Grid (SKG), 2010.

[22] See: Peter Hustinx ?Data Protection and Cloud Computing under EU law?, Third European Cyber Security Awareness Day,Panel IV: Privacy and Cloud Computing, BSA, European Parliament, 13 April 20, p. 3.

[23] According to the European Commission, the following countries are deemed as providing ?adequate? data protection standards: Andorra, Argentina, Australia, Canada, Faeroe Islands, Guernsey, State of Israel, Isle of Man, Jersey, Switzerland, Uruguay and the US, thanks to the Safe Harbour Agreement. Indeed, the Council and the European Parliament may give the Commission the power to determine, on the basis of Article 25(6) of directive 95/46/EC, ?whether a third country ensures an adequate level of protection by reason of its domestic law or of the international commitments it has entered into?. The adoption of a ? comitology ? Commission decision is based on Article 25.6 of the Directive. See: http://ec.europa.eu/justice/data-protection/document/international-transfers/adequacy/index_en.htm

[24] See: Ira S. Rubinstein, Privacy, Self-regulation and statutory safe harbors, p. 14, available on http://www.ftc.gov/os/comments/privacyroundtable/544506-00022.pdf (last visited October 4th 2012)

[25] The Safe Harbour Agreement has been jointly developed by the US Department of Commerce and the European Commission and has been approved through Commission Decision 2000/520/EC.

[26] The importance of preventing the interruptions in international flows of data has been recognised as a predominant issues since the adoption in 1980, of the OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data according to which ? [r]estrictions on these flows could cause serious disruption in important sectors of the economy, such as banking and insurance?. See: OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, 23 September 1980, available at http://www.oecd.org/internet/interneteconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm (last visited October 5th 2012)

[27] Confidentiality should be considered as the preservation of ?authorised restrictions on access and disclosure, including means for protecting personal privacy and proprietary information?. See: Directorate General for Internal Policies, Cloud Computing, Study, May 2012, p. 7.

[28] Stephen S. Yau, Ho G. An, Confidentiality Protection in Cloud Computing Systems, in International Journal of Software and Informatics, Vol.4, No.4, December 2010, pp. 351?365

[29] E.g. the U.S. Patriot Act affects every services provided by U.S. companies, regardless of where the data centres are located, see Zack Whittaker, ?Case study: How the USA PATRIOT Act can be used to access EU data?.

[30] Indeed, the provided definition of ?protected computer? is particularly broad insomuch as being quasi-omnicomprehensive, encompassing also the systems ?used in interstate or foreign commerce or communication?.

[31] See: Directorate General for Internal Policies, Cloud Computing, Study, May 2012, p. 45.

[32] See: Orin S. Kerr, The Case for the Third-Party Doctrine, Michigan Law Review, Vol. 107, 2009. See also: Smith v. Maryland, 442 U.S. 735 (1979) and United States v. Miller, 425 U.S. 435 (1976) according to which: ?[T]he Fourth Amendment does not prohibit the obtaining of information revealed to a third party and conveyed by him to Government authorities, even if the information is revealed on the assumption that it will be used only for a limited purpose and the confidence placed in the third party will not be betrayed.?

[33] S. Ovadia, Navigating the Challenges of the Cloud, in Behavioral & Social Sciences Librarian Volume 29, Issue 3, 2010

[34] Pearson, S. Taking account of privacy when designing cloud computing services, ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009. CLOUD ?09.

[35] By exporting their data and their computing resources into the Cloud, users progressively lose control over their hardware and software resources, but also over the privacy of their communications. Indeed, Cloud providers can monitor and analyse all activities and communications performed by their users insofar as they necessarily have to connect into the Cloud in order to benefit from the service. For a more detailed overview of the issues related to data logging and monitoring in Cloud Computing, see e.g. B.H. Takabi, Security and Privacy Challenges in Cloud Computing Environments, Security and Privacy, IEEE, Volume 8, Issue 6, Nov-Dec 2010

[36] See: Facebook Terms of Service, available at http://www.facebook.com/legal/terms (last visited, October 4th 2012).

[37] See, for instance, Facebook?s unilateral decision to remove pictures of breastfeeding women which were considered as obscene (in February 2012) and Facebook?s decision to block the accounts of several women members of a Brazilian activist group called ?Marcha das Vadias? ? which is Brazilian for ?Slut?s walk? ? because they posted pictures portraying them protesting with uncovered breasts (in May 2012), see: h ttp://www.telegraph.co.uk/technology/facebook/9072201/Why-lactivists-are-milking-Facebooks-breastfeeding-ban.html and h ttp://www1.folha.uol.com.br/tec/1097488-facebook-bloqueia-usuarias-que-aparecem-seminuas-em-fotos-da-marcha-das-vadias.shtml (last visited, October 4th 2012)

[38] Facebook claimed that pictures illustrating a ?mother breastfeeding without clothes? were in violation with its terms of service according to which it is forbidden to post any ?pornographic? content, or any image containing ?nudity?. For more details, see Facebook?s Statement of Rights and Responsibilities available at http://www.facebook.com/legal/terms, last visited June 25th 2012.

[39] The expression ?Law of the Land? refers to the complex of laws in force in a given country. Such an expression finds its roots in the 1297 Magna Carta and has been reiterated in several Constitutions. For instance, the Supremacy clause in the United States Constitution states: ? This Constitution, and the Laws of the United States which shall be made in Pursuance thereof; and all Treaties made, or which shall be made, under the authority of the United States, shall be the supreme Law of the land [...]?

[40] Lessig L., Code: And the Other Laws of Cyberspace, Version 2.0, 2006.

[41] See, e.g. Radin, Margaret Jane, Regulation by Contract, Regulation by Machine. Journal of Institutional and Theoretical Economics, Vol. 160, pp. 1-15, 2004.

[42] Marshall McLuhan coined the sentence ?The medium is the message? to express the idea that the distinctive characteristics of a medium are necessarily embedded into the message it conveys to the extent that it influences how the message is perceived.

[43] According to the US Supreme Court, ?[p]rotections for anonymous speech are vital to democratic discourse. Allowing dissenters to shield their identities frees them to express critical minority views [...] Anonymity is a shield from the tyranny of the majority?. See: McIntyre v. Ohio Elections Comm?n (93-986), 514 U.S. 334 (1995).

[44] See the EFF report on Freedom of Expression, Privacy and Anonymity on the Internet, submitted to the United Nations Special Rapporteur on the promotion and protection of the right to Freedom of Opinion and Expression, January 2011

[45] A liberal approach to market economics assumes that ?the marketplace will protect privacy because the fair treatment of personal information is valuable to consumers; in other words, industry will seek to protect personal information in order to gain consumer confidence and maximize profits. For more than twenty years, however, government agency task forces and reports regularly illustrated the lack of fair information practices in American society, but nevertheless resorted to the mantra that business should be given more time to self-regulate?. See: Joel R. REIDENBERG, Restoring Americans? Privacy in

Source: http://www.medialaws.eu/law-of-the-cloud-v-law-of-the-landchallenges-and-opportunities-for-innovation/

felix hernandez Ron Palillo julia child Texas A&m taylor swift taylor swift katy perry