WASHINGTON Real Estate | KALORAMA Homes For Sale ...

by starfish on November 11, 2012

Find KALORAMA Homes For Sale and KALORAMA Home Values. We also have information on mortgages, insurance, movers and other WASHINGTON Real Estate Services for anyone looking to sell or buy a home in Washington DC.

Showing properties 1 - 5 of 47. See more Kalorama tract Homes For Sale.
(all data current as of 11/11/2012)

  1. 9 beds, 8 full, 1 part baths

    Lot size: 12,650 sqft

  2. 5 beds, 4 full, 1 part baths

    Lot size: 8,180 sqft

  3. 5 beds, 4 full, 1 part baths

    Lot size: 9,720 sqft

  4. 4 beds, 4 full, 2 part baths

    Lot size: 4,763 sqft

  5. 8 beds, 6 full, 2 part baths

    Lot size: 8,100 sqft

Listing information deemed reliable but not guaranteed. Read full disclaimer.

Paul Kitchen and Starfish Team provide clients, family and close friends with professional, honest and dependable service. A resident of WASHINGTON, Paul is extremely familiar with the local neighborhoods including KALORAMA, school districts and the WASHINGTON Real Estate market in this beautiful Washington DC town.

Paul Kitchen
Real Estate Consultant
Keller Williams Realty Consultants
3915 National Drive, Ste 100 Burtonsville, MD 20866
(202) 568-6580
(800) 793-7304 toll free
WASHINGTON Real Estate
WASHINGTON Real Estate Blog

Starfish Real Estate

Source: http://www.starfishteam.com/dc-md-va-blog/2012/11/11/washington-real-estate-kalorama-homes-for-sale-november-2012/

patriots vs broncos contraband denver vs new england denver broncos vs new england patriots cruise ship sinking vernon davis starship troopers

How to Stop Spies from Digging Up Your Personal Information

How to Stop Spies from Digging Up Your Personal InformationThe spies in our lives aren't like the ones in movies?they take the form of a suspicious lover, obsessive coworker, or jealous "friend." While you can't distrust everyone you meet and lead a happy life, you can protect your personal information from falling into the wrong hands. Here's how to guard yourself from spies without slipping into a state of constant paranoia.

Securely Manage Your Online Information

How to Stop Spies from Digging Up Your Personal InformationThe goal of spying is to gain information and anyone can find plenty of personal information about you?or anyone, really?by knowing where to look. I spoke with security and investigations expert Brandon Gregg to find out the most common sources:

In today's world 90% of everything you need about someone is online because of their own postings on Faceback and LinkedIn. Another 9% can be found on private databases like TLO, CLEAR, Intelius, Lexis Nexis and other pay-for-data sites. The last 1% (passwords, secrets, and personal personal data) can be found via social engineering tricks. Surveys have shown ?34% of respondents volunteered their password when asked without even needing to be bribed and 79% of people unwittingly gave away information that could be used to steal their identity when questioned.' Need higher chances? Another survey showed ?More than 70% of people would reveal their computer password in exchange for a bar of chocolate.' Add some social engineering tricks like intel about your target (boss' secretary name from LinkedIn) or caller ID spoofing and you will increase your chances to the high 90% range.

You can't prevent the information collected about you in private databases, but you do have some control over your online presence and can protect yourself against social engineering.

Be Careful About What You Post Online

How to Stop Spies from Digging Up Your Personal InformationThe best way to protect yourself from revealing too much online isn't to stop posting, but rather to change the sorts of things you post. Public details about your personal life make it very simple for just about anyone to find out a lot of information about you and use it to gain your trust. While you can continue to do this and simply be vigilant, social networks like Facebook and Google+ make it possible to share certain posts with some people but not everyone. Manage your Facebook privacy by creating groups that can see personal posts and ones that can't. You can do the same on Google+ with circles. When posting publicly, or at least to a wider audience, limit that content to impersonal things like links to articles, products you like, images of other people or things, and online videos. You're still at risk by posting anything at all, as anyone can potentially gain your trust by simply knowing a few of your interests, but if you're careful you won't fall victim to any social engineering hacks.

Perhaps more importantly, be very careful about your online check-ins. When you disclose your location, anyone who's watching now knows exactly where you are. Site like Please Rob Me popped up on the web because thiefs began using online check-ins as a way to determine when their targets weren't around. If you stop checking in you don't have to worry about this at all, but at the very least you should do it privately. Don't expose your check-ins to the world because you never know who's watching.

If you do have online data you want to get rid of because it puts you at risk, it isn't easy to do but definitely possible. Check out our guide on commiting internet suicide for details

Never Trust Anyone with Your Password Password

How to Stop Spies from Digging Up Your Personal InformationYou can only do so much to protect yourself against social engineering hacks and keep spies out of your personal information. Truly staying safe necessitates a little healthy paranoia. While it should go without saying, never give your password out to anyone. Most social engineering attempts focus on gaining your trust enough to get your password, so you can protect yourself far more by simply keeping it private. That said, a social engineering attempt won't necessarily fail just because you didn't give up your password. These attacks work because they lower your guard and get you to provide information you don't consider sensitive without realizing it. The request for your password may not come until two or three calls down the line. Protect yourself by knowing exactly who you're talking to before giving them any information at all.

For more on protecting yourself from social engineering hacks, read our guide.

Safeguard Your Trash

How to Stop Spies from Digging Up Your Personal InformationNot all valuable data about you exists in a computer. In fact, spies may find more valuable information in your mail or files. Letters and receipts tell a story, provide a fair amount of private data, and put you at risk. Anyone with access to your home can easily steal this information without you ever finding out, and those who don't can find it in your trash.

You might think that digging through trash is illegal, but in most cases it is not:

The current law in the U.S.A. (federal as well as most states) is that (1) a person has no reasonable expectation of privacy for contents of garbage and (2) a person has relinquished any property interest in garbage, even when it sits in metal trash cans or opaque plastic bags at the person's home awaiting collection. This sorry state of affairs needs correction, probably by legislation.

What kind of magic can you find in the trash? Brandon explains:

Dumpster diving, trash pulls, digging in the garbage (or whatever you may call it) often times provides great intel and evidence due to people's consistent disregard for their own privacy. What may be a meaningless piece of garbage to them, can build your intel about the suspect to a level that would creep the average person out. Family names, former addresses, phone numbers, account numbers, bank statements, credit card purchases, DNA (toothbrushes, combs, cups, etc) and a whole slough of raw data can be found and combined to give you further intel gathering tools (social engineering, pre-texting, etc) or even provide you with a smoking gun for your investigation.

If you want to protect yourself from dumpster divers, you need to shred your trash. While you can buy cheaper shredders that split paper into individual strips, any spy with a little time on their hands can reassemble that with ease. Instead, spend the extra money to get a more heavy-duty shredder capable of cross-cutting. Nothing short of obliterating your sensitive documents will prevent reassembly, but cross-cutting reduces the likelihood that anyone's going to put your paper back together without breaking the bank.

Avoid Getting Tracked

How to Stop Spies from Digging Up Your Personal InformationIt's easy to track someone nowadays, especially if a spy has access to your smartphone. Even without, GPS tracking devices are cheap and easy to come by. If you think you're being tracked, here's what you need to look for.

Make sure Google Latitude isn't installed or active on your phone. With the right settings, Latitude will post your location publicly so a spy can find it at any time without ever being identified. Even worse, software called Flexispy allows anyone who installs it to access pretty much everything on your phone whenever they please. Spies will need access to your mobile in order to accomplish this, so lock your phone with a secure password and don't share it with anyone you can't keep an eye on.

While it may be difficult for a spy to install tracking software on your phone, it's incredibly easy for anyone to track you with a GPS data logger. According to Brandon, you can pick them up for practically nothing on eBay. I found several on Google Shopping in about five seconds. They're cheap, and a spy can strap them on your car for a week or two and pick up the data at their leisure. If you believe you're being tracked, check your car regularly. For detailed information on where to look, check out this post.

Don't Try to Catch a Spy

Although it might be tempting to try and catch someone who's spying on you, it's very hard to find any definitive proof. I asked Brandon how spies should avoid getting caught and most mistakes seem easy enough to avoid:

There are many ways to "get burned" while spying on someone. From someone noticing you walking too close to advance counter surveillance tactics like TSCM equipment that easily find any covert camera or audio bug you planted. The key is not to be aggressive, know your target, and don't let your tactics trace back to you. Depending on who and why you are spying remember your target will be there tomorrow. Take your time. Plan. No one suspects they are being spied on; use that to your advantage. If you get confronted, turn around and walk away. Just like being arrested, not talking gives them nothing to work with.

Basically, even if you do catch someone spying on you there's a good chance you won't be able to prove it. Instead, worry more about protecting yourself and stay vigilant. Don't give out personal information easily. Avoid living in public, even if that's what the times dictate. Most of us won't be subject to spies, but don't think it can't happen to you. Suspicious lovers, vengeful enemies, and jealous coworkers may take small steps towards finding your personal data. You never know who's lurking around the corner. It may be a stranger or a friend, but you won't have to worry if you make an effort to protect your personal data.

Special thanks to Brandon Gregg for his expert advice. Brandon has worked investigations for numerous Fortune 500 companies over the last 12 years investigating theft, fraud, organized crime, corporate espionage, and many high profile cases as well as being an educator, published author, and featured speaker on surveillance, computer forensics, complex investigations, and ethical hacking. You can find out more about him here.

Image elements by Christopher T. Howlett (The Noun Project) and Harijs A. (Shutterstock).

How to Stop Spies from Digging Up Your Personal Information

This post is part of Spy Week, a series at Lifehacker where we look at ways to improvise solutions to every day problems Bond-style. Want more? Check out our spy week tag page.

Source: http://feeds.gawker.com/~r/lifehacker/full/~3/xqjwGX3ps4s/how-to-stop-spies-from-digging-up-your-personal-information

Brigitte Nielsen Cricinfo Geno Smith ny giants brandon marshall ryder cup Kate Middleton Bottomless

Italy Earthquake Budget Block: Some EU Nations Take Quake Money Hostage To Get Budget Deal, EU Parliament President Says

  • A pair of shoes are seen amid debris of the collapsed BBG industrial moldings building in Mirandola, northern Italy, Wednesday, May 30, 2012. A magnitude 5.8 earthquake struck the same area of northern Italy stricken by another fatal tremor on May 20. (AP Photo/Luca Bruno)

  • People stand in front of a collapsed building in Cavezzo, northern Italy, Wednesday, May 30, 2012. (AP Photo/Luca Bruno)

  • A woman walks on a cracked street in Concordia, northern Italy, Wednesday, May 30, 2012. (AP Photo/Luca Bruno)

  • Debris of a collapsed house are seen in Cavezzo, northern Italy, Wednesday, May 30, 2012. (AP Photo/Luca Bruno)

  • Italian firefighters work amid debris of a collapsed factory in Medolla, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • A damaged building is seen in Medolla, northern Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Italian civil protection volunteers prepare a tent camp in Mirandola, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Italian civil protection volunteers prepare a tent camp in Mirandola, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Relatives of missing workers wait in front of a collapsed factory in Medolla, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • An Italian firefighter walks past a collapsed factory in Medolla, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Italian firefighters work amid debris of a collapsed factory in Medolla, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Italian firefighters work amid debris of a collapsed factory in Medolla, northern Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Italian firefighters carry the body of a worker who died in a factory collapse in Medolla, Italy, Wednesday, May 30, 2012. (AP Photo/Gregorio Borgia)

  • Rescuers use dogs as they look for three workers who are reportedly missing at the Haemotronic factory in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • A woman is pushed on a wheelchair by an Italian Civil Protection volunteer in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A collapsed house is seen in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • Rescue teams use dogs as they look for three workers reported missing at the Haemotronic factory in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • A woman runs in front of Mirandola Dome during a minor shake, northern Italy, Tuesday, May 29, 2012. (AP Photo/Marco Vasini)

  • People rest in an Italian civil protection emergency tent set up in the earthquake hit town of Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Marco Vasini)

  • A cameraman films a collapsed building in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A dog strolls among debris in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A local police officer walks past collapsed buildings in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • Rescue teams use dogs asthey look for three workers tah are reportedly missing at the Haemotronic factory in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • Rescue teams use dogs asthey look for three workers tah are reportedly missing at the Haemotronic factory in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • A damaged building in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A damaged building in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • An Italian ranger, left, and a local police officer block a street near a collapsed building in Cavezzo, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • The damaged bell tower of Mirandola's Dome after an earthquake, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A motorcycle rides past a church that partially collapsed after an earthquake, in Mirandola, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • Elderly people lay on their beds after they were evacuated from the nearby hospital, in Mirandola, northern Italy, Tuesday, May 29, 2012. (AP Photo/Marco Vasini)

  • A street lamp is seen in front of the collapsed walls of Mirandola's Dome after an earthquake, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • The Mirandola church Dome after it collapsed after an earthquake, in Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • Holy Virgin statue of a collapsed church is seen in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Marco Vasini)

  • The collapsed roof of a factory after it was hit by an earthquake in Mirandola, Italy, Tuesday, May 29, 2012. (AP Photo/Gregorio Borgia)

  • A collapsed church is seen in Medolla, northern Italy, Tuesday, May 29, 2012. (AP Photo/Marco Vasini)

  • A man looks at a collapsed farm in Camposanto, northern Italy, Tuesday, May 29, 2012. (AP Photo/Luca Bruno)

  • A collapsed building is seen in Cavezzo, northern Italy, Tuesday, May 29, 2012. (AP Photo/Gianfilippo Oggioni, Lapresse)

  • Source: http://www.huffingtonpost.com/2012/11/12/italy-earthquake-budget-block_n_2116998.html

    chrome for android hatchet leah messer freedom riders 9th circuit court of appeals gisele bundchen tom brady randy travis arrested

    Clean Enameled Cookware with Laundry Detergent

    Clean Enameled Cookware with Laundry Detergent If you find it difficult to get enameled cast iron cookware clean try bringing water to a gentle boil, adding one tablespoon of liquid laundry detergent, and allow that to boil for six minutes. You should now be able to rinse it clean with warm water and a sponge.

    Culinary weblog Chow remarks that you'll want to first gently scrub off any food debris before using this method. Make sure you only use this on enamel-coated cookware.

    How to Clean Enamel Cookware | Chow

    Source: http://feeds.gawker.com/~r/lifehacker/full/~3/27qyW6eqmhg/clean-enameled-cookware-with-laundry-detergent

    collateral dick cheney heart umf peter frampton elite eight stephon marbury the lion king

    Is The Dotcom Secrets Home Study Education A Scam_ - PDF

    Is The Dotcom Secrets Home Study Education A Scam?

    There are home see courses all over the Internet that promise to explain you how to become rich a
    sufficient quantity of to quit your day job while work from home. No doubt you have seen numerous
    yourself and are looking for a equal lifestyle that they offer.
    However, the dilemma the person face is placing trust in the author and judging if the product can
    work for you.
    There is no doubt which often selling information products is a dream business for many reasons. It
    gives such a relaxed and own paced lifestyle and undertaking , and gives you the freedom you
    usually wanted.
    Indeed really one of the best businesses to be of a bond with due to the low overheads while
    automation aspect. You don't need to always at the computer all day long to make it work.
    The dotcom Home Study course generates an exact blueprint for being that may grow your own
    online business. You will find there's far more to an online business than simply creating an ebook
    and then aiming to increase your click through on the internet Adwords.
    There is yet another lot more to do besides quite frankly emailing your opt in report every day or
    every week on new offers (which is that may many gurus teach).
    The importance of treating your undertaking as a business cannot be completed emphasised. This is
    the primary trigger of so many people failing on the Internet right this moment. There are ways to
    have things forex trading and outsource certain factors, ultimately you need to be in control while
    manage the process. These are particular concepts that you will learn internally the dotcom home
    study course.
    There are many gurus charging money for tips and tricks to make a few pounds here and there, but if
    you want to realistically quit your day job making your living from the Internet, in which case you must
    adopt a solid undertaking strategy from the start.
    There are also many facets to be able to your products sell. Things which include the website copy,
    the be attractive , directing the customer and then preceding up with them, are all excellent and
    explained in detail internally the dotcom home study course.
    These are all critical concerns that should not be overlooked. More to the point this, you need to
    become somebody who your prospects and borrowers can trust.
    In conclusion, if you are looking to establish your store online, then an information-based company is
    the way to go. Preparing multiple products and supplying the same customers again and again could
    possibly be faster way to a solid financing future. If you are interested in making a time-tested
    business, instead of just income making a few extra dollars in which case you should at least read the
    dotcom home study course and listen to what it offers you. It may demonstrate to be a very wise
    move.

    Click Here To Fire Your Boss


    Source: http://pdfcast.org/pdf/is-the-dotcom-secrets-home-study-education-a-scam-1

    BET Awards 2012 declaration of independence 4th Of July 2012 Zach Parise Spain Vs Italy Euro 2012 tiger woods erin andrews

    Schizophrenia genetic networks identified; Connection to autism found

    [ Back to EurekAlert! ] Public release date: 11-Nov-2012
    [ | E-mail | Share Share ]

    Contact: Karin Eskenazi
    ket2116@columbia.edu
    212-342-0508
    Columbia University Medical Center

    New computational analysis identifies gene networks affected in schizophrenia and shows that schizophrenia and autism share related genetic networks, each composed of hundreds of genes

    New York, NY (November 11, 2012) Although schizophrenia is highly genetic in origin, the genes involved in the disorder have been difficult to identify. In the past few years, researchers have implicated several genes, but it is unclear how they act to produce the disorder. A new study by researchers at Columbia University Medical Center identifies affected gene networks and provides insight into the molecular causes of the disease.

    The paper was published today in the online edition of the journal Nature Neuroscience.

    Using an unbiased collection of hundreds of mutations associated with schizophrenia, the Columbia researchers applied a sophisticated computational approach to uncover hidden relationships among seemingly unrelated genes. The analysis revealed that many of the genes mutated in schizophrenia are organized into two main networks, which take part in a few key processes, including axon guidance, synapse function, neuron mobility, and chromosomal modification.

    The study also uncovered an intriguing connection between schizophrenia and autism. "If we hadn't known that these were two different diseases, and had put all the mutations into a single analysis, it would have come up with very similar networks," said the study's senior author, Dennis Vitkup, PhD, associate professor in the Department of Biomedical Informatics, the Center for Computational Biology and Bioinformatics, and the Columbia Initiative in Systems Biology at Columbia University Medical Center. "It shows how closely the autism and schizophrenia genetic networks are intertwined," he added.

    Although it will take time to translate the findings into practical treatments, the study provides insight into the molecular causes of schizophrenia. It also suggests that mutations associated with schizophrenia, autism, and probably many other psychiatric disorders, are likely to converge on a set of interrelated molecular processes.

    Computer analysis uncovers genetic networks

    To discover potential connections among genes mutated in schizophrenia, Dr. Vitkup and colleagues developed a computational approach, called NETBAG+, to identify networks of genes likely to be responsible for the same genetic phenotype. They then gathered the strongest mutations that had been observed in schizophrenia by other researchersincluding a set of de novo mutations recently described by a team of Columbia researchers led by Maria Karayiorgou, MD, and Joseph A. Gogos, MD, PhDand fed them into the program.

    The program uncovered two genetic networks. Genes in the first network are involved primarily in axon guidance, synapse function, and cell migration. Genes in the second network are involved in chromosomal organization and remodeling.

    Parts of both networks are highly active during prenatal development, suggesting that changes in the brain that cause schizophrenia later in life are laid down very early in life.

    Connection to autism

    Dr. Vitkup also compared his schizophrenia networks with networks found in neurodevelopmental disorders such as autism. One schizophrenia network is strongly related to an autism network he described in a study published last year. Both networks contain genes involved in axon guidance, synapse function, and cell migration.

    "Our recent mutational analysis showed that this overlap includes primarily genes that are important for early fetal development. This is not surprising, because some cases of schizophrenia and likely many cases of autism have neurodevelopmental origin," said Dr. Karayiorgou.

    The close relationship between genetic networks involved in autism and schizophrenia raises an intriguing question: How can mutations in the same or related genes cause two different disorders?

    "I like to use the analogy of car brakes," said Dr. Vitkup. "Different mechanical malfunctions of the brake mechanism can have very different functional consequences, from rapid acceleration to stalling."

    Dr. Vitkup looked at large mutations called copy number variants (CNVs) that can lead to either schizophrenia or autism. CNVs involve long stretches of the genome containing several genes that have been either duplicated or deleted. Duplication of a region increases the "dosage" of its genes; deletion of a region decreases the dosage.

    In CNVs involved in the growth of dendrites, or dendritic spines, at the ends of neurons, he found decrease in growth to be more common in schizophrenia and increase in growth more common in autism. "That's consistent with what's been found by postmortem brain studies," he said.

    "Evidence of functional convergence among risk genes is consistent with the notion that schizophrenia and autism are both primarily diseases of neuronal communication. However, they have distinct clinical features and the challenge remains to identify the critical neural circuits and mechanisms that differentiate them," said Dr. Joseph A. Gogos. "This is a step in that direction."

    Dr. Vitkup predicts that many more genes involved in schizophrenia and autism will eventually be foundpossibly up to 1000 genes for each disorderbut a significant fraction of them will likely fall into the networks and pathways identified in the current study.

    "Until a few years ago, people were looking for just a handful of genes responsible for autism and schizophrenia, so the idea that many hundreds of genes are involved is a big change in thinking," Dr. Vitkup said. "Our study and the studies of our collaborators suggest that in the search for the causes of complex genetic disorders, it will be more productive to look for common pathways and gene circuits than for a handful of causal genes. This type of network analysis gives us a way to begin to make sense of what's happening."

    Study points way to future approaches to gene discovery

    "To uncover all of the processes and molecular pathways involved in schizophrenia and related disorders, more gene searches are clearly necessary," said Dr. Vitkup.

    Until recently, the hunt for disease genes was focused primarily on analyses of common genetic mutations, using so-called genome-wide association studies (GWAS). But according to Drs. Vitkup, Karayiorgou, and Gogos, a complementary, possibly less expensive, approach may be more fruitful. "By looking at individuals with schizophrenia who are born into families with no history of the disorder," Dr. Vitkup said, "we can identify de novo mutations that are likely to have caused their disorder."

    Drs. Karayiorgou and Gogos recently used this approach to uncover many dozens of new schizophrenia mutations from several hundred families; nearly every mutation was unique to one patient.

    "Our study demonstrates that through network-based analyses of rare de novo mutations, it is possible to implicate relevant molecular processes," said Dr. Vitkup. "Applying similar methods to larger cohorts of patients, we should be able to delineate all of the pathways and molecular processes underlying complex psychiatric disorders such as schizophrenia."

    ###

    The paper is titled, "Diverse types of genetic variation converge on functional gene networks involved in schizophrenia." The other contributors are Sarah R. Gilman, Jonathan Chang, Bin Xu, Tejdeep S. Bawa, Joseph A. Gogos, and Maria Karayiorgou (all at CUMC).

    This work was supported in part by a grant from the Simons Foundation (SFARI award number SF51), US National Centers for Biomedical Computing (MAGNet) grant U54CA121852 to Columbia University, US National Institute of Mental Health grants MH061399 (to M.K.) and MH077235 (to J.A.G.) and the Lieber Center for Schizophrenia Research at Columbia University. S.R.G. was supported in part by US National Institute of General Medical Sciences training grant T32 GM082797. B.X. was partially supported by a US National Alliance for Research in Schizophrenia and Depression (NARSAD) Young Investigator Award.

    The authors declare no financial or other conflict of interest.

    Columbia University Medical Center provides international leadership in basic, pre-clinical and clinical research, in medical and health sciences education, and in patient care. The medical center trains future leaders and includes the dedicated work of many physicians, scientists, public health professionals, dentists, and nurses at the College of Physicians and Surgeons, the Mailman School of Public Health, the College of Dental Medicine, the School of Nursing, the biomedical departments of the Graduate School of Arts and Sciences, and allied research centers and institutions. Established in 1767, Columbia's College of Physicians and Surgeons was the first institution in the country to grant the M.D. degree and is among the most selective medical schools in the country. Columbia University Medical Center is home to the largest medical research enterprise in New York City and State and one of the largest in the United States. www.cumc.columbia.edu

    The Columbia University Department of Biomedical Informatics is the second-oldest in the nation and among the largest. Its 38 faculty members and 60 trainees work in a highly collaborative environment, applying informatics from the atomic level to global populations. Its goals are to discover new information methods, to augment the biomedical knowledge base, and to improve the health of the population. It is consistently identified as among the best programs in the field.

    Columbia Psychiatry is ranked among the best departments and psychiatric research facilities in the Nation and has contributed greatly to the understanding of and current treatment for psychiatric disorders. Located at the New York State Psychiatric Institute on the NewYork-Presbyterian Hospital/Columbia University Medical Center campus in the Washington Heights community of Upper Manhattan, the department enjoys a rich and productive collaborative relationship with physicians in various disciplines at Columbia University's College of Physicians and Surgeons. Columbia Psychiatry is home to distinguished clinicians and researchers noted for their clinical and research advances in the diagnosis and treatment of depression, suicide, schizophrenia, bipolar and anxiety disorders, and childhood psychiatric disorders. http://columbiapsychiatry.org/



    [ Back to EurekAlert! ] [ | E-mail | Share Share ]

    ?


    AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


    [ Back to EurekAlert! ] Public release date: 11-Nov-2012
    [ | E-mail | Share Share ]

    Contact: Karin Eskenazi
    ket2116@columbia.edu
    212-342-0508
    Columbia University Medical Center

    New computational analysis identifies gene networks affected in schizophrenia and shows that schizophrenia and autism share related genetic networks, each composed of hundreds of genes

    New York, NY (November 11, 2012) Although schizophrenia is highly genetic in origin, the genes involved in the disorder have been difficult to identify. In the past few years, researchers have implicated several genes, but it is unclear how they act to produce the disorder. A new study by researchers at Columbia University Medical Center identifies affected gene networks and provides insight into the molecular causes of the disease.

    The paper was published today in the online edition of the journal Nature Neuroscience.

    Using an unbiased collection of hundreds of mutations associated with schizophrenia, the Columbia researchers applied a sophisticated computational approach to uncover hidden relationships among seemingly unrelated genes. The analysis revealed that many of the genes mutated in schizophrenia are organized into two main networks, which take part in a few key processes, including axon guidance, synapse function, neuron mobility, and chromosomal modification.

    The study also uncovered an intriguing connection between schizophrenia and autism. "If we hadn't known that these were two different diseases, and had put all the mutations into a single analysis, it would have come up with very similar networks," said the study's senior author, Dennis Vitkup, PhD, associate professor in the Department of Biomedical Informatics, the Center for Computational Biology and Bioinformatics, and the Columbia Initiative in Systems Biology at Columbia University Medical Center. "It shows how closely the autism and schizophrenia genetic networks are intertwined," he added.

    Although it will take time to translate the findings into practical treatments, the study provides insight into the molecular causes of schizophrenia. It also suggests that mutations associated with schizophrenia, autism, and probably many other psychiatric disorders, are likely to converge on a set of interrelated molecular processes.

    Computer analysis uncovers genetic networks

    To discover potential connections among genes mutated in schizophrenia, Dr. Vitkup and colleagues developed a computational approach, called NETBAG+, to identify networks of genes likely to be responsible for the same genetic phenotype. They then gathered the strongest mutations that had been observed in schizophrenia by other researchersincluding a set of de novo mutations recently described by a team of Columbia researchers led by Maria Karayiorgou, MD, and Joseph A. Gogos, MD, PhDand fed them into the program.

    The program uncovered two genetic networks. Genes in the first network are involved primarily in axon guidance, synapse function, and cell migration. Genes in the second network are involved in chromosomal organization and remodeling.

    Parts of both networks are highly active during prenatal development, suggesting that changes in the brain that cause schizophrenia later in life are laid down very early in life.

    Connection to autism

    Dr. Vitkup also compared his schizophrenia networks with networks found in neurodevelopmental disorders such as autism. One schizophrenia network is strongly related to an autism network he described in a study published last year. Both networks contain genes involved in axon guidance, synapse function, and cell migration.

    "Our recent mutational analysis showed that this overlap includes primarily genes that are important for early fetal development. This is not surprising, because some cases of schizophrenia and likely many cases of autism have neurodevelopmental origin," said Dr. Karayiorgou.

    The close relationship between genetic networks involved in autism and schizophrenia raises an intriguing question: How can mutations in the same or related genes cause two different disorders?

    "I like to use the analogy of car brakes," said Dr. Vitkup. "Different mechanical malfunctions of the brake mechanism can have very different functional consequences, from rapid acceleration to stalling."

    Dr. Vitkup looked at large mutations called copy number variants (CNVs) that can lead to either schizophrenia or autism. CNVs involve long stretches of the genome containing several genes that have been either duplicated or deleted. Duplication of a region increases the "dosage" of its genes; deletion of a region decreases the dosage.

    In CNVs involved in the growth of dendrites, or dendritic spines, at the ends of neurons, he found decrease in growth to be more common in schizophrenia and increase in growth more common in autism. "That's consistent with what's been found by postmortem brain studies," he said.

    "Evidence of functional convergence among risk genes is consistent with the notion that schizophrenia and autism are both primarily diseases of neuronal communication. However, they have distinct clinical features and the challenge remains to identify the critical neural circuits and mechanisms that differentiate them," said Dr. Joseph A. Gogos. "This is a step in that direction."

    Dr. Vitkup predicts that many more genes involved in schizophrenia and autism will eventually be foundpossibly up to 1000 genes for each disorderbut a significant fraction of them will likely fall into the networks and pathways identified in the current study.

    "Until a few years ago, people were looking for just a handful of genes responsible for autism and schizophrenia, so the idea that many hundreds of genes are involved is a big change in thinking," Dr. Vitkup said. "Our study and the studies of our collaborators suggest that in the search for the causes of complex genetic disorders, it will be more productive to look for common pathways and gene circuits than for a handful of causal genes. This type of network analysis gives us a way to begin to make sense of what's happening."

    Study points way to future approaches to gene discovery

    "To uncover all of the processes and molecular pathways involved in schizophrenia and related disorders, more gene searches are clearly necessary," said Dr. Vitkup.

    Until recently, the hunt for disease genes was focused primarily on analyses of common genetic mutations, using so-called genome-wide association studies (GWAS). But according to Drs. Vitkup, Karayiorgou, and Gogos, a complementary, possibly less expensive, approach may be more fruitful. "By looking at individuals with schizophrenia who are born into families with no history of the disorder," Dr. Vitkup said, "we can identify de novo mutations that are likely to have caused their disorder."

    Drs. Karayiorgou and Gogos recently used this approach to uncover many dozens of new schizophrenia mutations from several hundred families; nearly every mutation was unique to one patient.

    "Our study demonstrates that through network-based analyses of rare de novo mutations, it is possible to implicate relevant molecular processes," said Dr. Vitkup. "Applying similar methods to larger cohorts of patients, we should be able to delineate all of the pathways and molecular processes underlying complex psychiatric disorders such as schizophrenia."

    ###

    The paper is titled, "Diverse types of genetic variation converge on functional gene networks involved in schizophrenia." The other contributors are Sarah R. Gilman, Jonathan Chang, Bin Xu, Tejdeep S. Bawa, Joseph A. Gogos, and Maria Karayiorgou (all at CUMC).

    This work was supported in part by a grant from the Simons Foundation (SFARI award number SF51), US National Centers for Biomedical Computing (MAGNet) grant U54CA121852 to Columbia University, US National Institute of Mental Health grants MH061399 (to M.K.) and MH077235 (to J.A.G.) and the Lieber Center for Schizophrenia Research at Columbia University. S.R.G. was supported in part by US National Institute of General Medical Sciences training grant T32 GM082797. B.X. was partially supported by a US National Alliance for Research in Schizophrenia and Depression (NARSAD) Young Investigator Award.

    The authors declare no financial or other conflict of interest.

    Columbia University Medical Center provides international leadership in basic, pre-clinical and clinical research, in medical and health sciences education, and in patient care. The medical center trains future leaders and includes the dedicated work of many physicians, scientists, public health professionals, dentists, and nurses at the College of Physicians and Surgeons, the Mailman School of Public Health, the College of Dental Medicine, the School of Nursing, the biomedical departments of the Graduate School of Arts and Sciences, and allied research centers and institutions. Established in 1767, Columbia's College of Physicians and Surgeons was the first institution in the country to grant the M.D. degree and is among the most selective medical schools in the country. Columbia University Medical Center is home to the largest medical research enterprise in New York City and State and one of the largest in the United States. www.cumc.columbia.edu

    The Columbia University Department of Biomedical Informatics is the second-oldest in the nation and among the largest. Its 38 faculty members and 60 trainees work in a highly collaborative environment, applying informatics from the atomic level to global populations. Its goals are to discover new information methods, to augment the biomedical knowledge base, and to improve the health of the population. It is consistently identified as among the best programs in the field.

    Columbia Psychiatry is ranked among the best departments and psychiatric research facilities in the Nation and has contributed greatly to the understanding of and current treatment for psychiatric disorders. Located at the New York State Psychiatric Institute on the NewYork-Presbyterian Hospital/Columbia University Medical Center campus in the Washington Heights community of Upper Manhattan, the department enjoys a rich and productive collaborative relationship with physicians in various disciplines at Columbia University's College of Physicians and Surgeons. Columbia Psychiatry is home to distinguished clinicians and researchers noted for their clinical and research advances in the diagnosis and treatment of depression, suicide, schizophrenia, bipolar and anxiety disorders, and childhood psychiatric disorders. http://columbiapsychiatry.org/



    [ Back to EurekAlert! ] [ | E-mail | Share Share ]

    ?


    AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert! system.


    Source: http://www.eurekalert.org/pub_releases/2012-11/cumc-sgn110912.php

    tim tebow taylor swift post grad arpaio carol burnett neil degrasse tyson neil degrasse tyson davy jones death

    Syracuse beats No. 11 Louisville 45-26

    SYRACUSE, N.Y. (AP) ? Ryan Nassib gave his hometown fans a memorable going away present.

    The senior quarterback threw for 246 yards and three touchdowns in his final home game, and moved into second on the school's career passing list as Syracuse handed No. 11 Louisville its first loss of the season in a 45-26 victory on Saturday.

    Nassib directed an offense that gained 524 total yards. He went 15 of 23 and passed Donovan McNabb to move into second place on the Orange's passing yards list behind Marvin Graves.

    He also set a Big East record by pushing his career completions to 738 and established an Orange single-season record for total offense (3,114).

    "We played mistake-free football, just tried to play our game and not do too much and had fun doing it," Nassib said. "Having success early on puts the pressure on the opposing team. It gets the momentum going and that's what happened today."

    The Orange (5-5, 4-2 Big East) blew the game open with three touchdowns in the second quarter and Louisville (9-1, 4-1) allowed more points than it had in any game this season. Syracuse is a win away from bowl eligibility with road games against Missouri and Temple left.

    Jerome Smith ran for 144 yards for Syracuse and Prince-Tyson Gulley added 98 yards rushing and two touchdowns.

    Teddy Bridgewater completed 36-of-49 passes for 426 and three touchdowns for Louisville, who fell into second place behind Rutgers in the Big East race.

    "This was the worst game we ever played. They came out and got us," Louisville defensive back Hakeem Smith said. "There's not a lot of talking (in the locker room) right now. We just have to push on. We're going to bounce back."

    The Cardinals, who are off next Saturday, still play Connecticut and Rutgers.

    "They played well today. You have to give them credit for playing so hard," Cardinals linebacker Preston Brown said of the Orange. "It's disappointing having all this (a perfect season) down the drain. But we can still win the Big East."

    The Orange racked up 339 yards of total offense in the first half while breezing to a 31-13 lead at half. Smith piled up 72 yards of those yards on the ground, and Nassib completed 10 of 17 for 185 yards and two touchdowns to Alec Lemon.

    Gulley broke around the right side for a 55-yard touchdown romp to put the Orange up by 21 with 2:13 left in the half. He also had an 8-yard touchdown run in the first quarter.

    Louisville's John Wallace nailed a 35-yard field goal with 9 seconds left to set the halftime score.

    Lemon roamed free through the Cardinals secondary all day, catching nine passes for 176 yards.

    "We knew coming in Louisville plays man-to-man. It came down to who wanted it more. We harped on it a lot. We need to win every play," Lemon said.

    The Orange were content to trade scores with the Cardinals in the third. Smith rumbled for a 35-yard touchdown to make it 38-13 with 9:47 left in the third, and Louisville responded with a 44-yard touchdown pass from Bridgewater to Eli Rogers with 1:49 remaining to pull within 38-19.

    In the fourth, Nassib hit Lewellyn Coker for a 3-yard scoring pass with 11:14 remaining, and Bridgewater countered with an 8-yard touchdown pass to DeVante Parker with 8:53 left.

    Source: http://news.yahoo.com/syracuse-beats-no-11-louisville-45-26-205324613--spt.html

    mary louise parker mary louise parker cher morgellons nhl all star draft touch nitrous oxide

    Hollande makes 'friendly' mistake in note to Obama

    In this photo provided by the French Presidential Palace on Wednesday, Nov. 7, 2012, a letter written by French President Francois Hollande addressed to U.S. President Barack Obama congratulating him on his reelection bears a handwritten salutation reading, "Friendly, Francois Hollande". The congratulatory note written by Hollande to Obama for his reelection has been lost in translation, overshadowing the note?s serious political message, after the letter went viral on Twitter. (AP Photo)

    In this photo provided by the French Presidential Palace on Wednesday, Nov. 7, 2012, a letter written by French President Francois Hollande addressed to U.S. President Barack Obama congratulating him on his reelection bears a handwritten salutation reading, "Friendly, Francois Hollande". The congratulatory note written by Hollande to Obama for his reelection has been lost in translation, overshadowing the note?s serious political message, after the letter went viral on Twitter. (AP Photo)

    French President Francois Hollande, left, is handed a report entitled, "For a democratic renewal" from former French prime minister Lionel Jospin, right, at the Elysee Palace in Paris, Friday, Nov. 9, 2012. (AP Photo/Bertrand Langlois, Pool)

    (AP) ? French President Francois Hollande's attempt to sign a note congratulating Barack Obama for getting re-elected wound up lost in translation ? and all over Twitter.

    In the great Gallic tradition of murdering the English language, Hollande ended the letter to the U.S. president in his own hand, writing: "Friendly, Francois Hollande."

    The mistake was a literal translation of the French "amicalement," instead of what probably should have been "kind regards."

    It went viral on Twitter, overshadowing the rest of the note, which fleetingly touched on topics such as the Middle East and the economy.

    According to local media, former French President Nicolas Sarkozy was also weak in English. To excuse bad weather in January 2010, Sarkozy told U.S. Secretary of State Hillary Clinton, "Sorry for the time."

    Associated Press

    Source: http://hosted2.ap.org/APDEFAULT/aa9398e6757a46fa93ed5dea7bd3729e/Article_2012-11-09-EU-France-Friendly-Francois/id-e611698c6fb94ca9a4c431333c759bb7

    2012 draft colt mccoy arbor day mike adams janoris jenkins john edwards trial brandon weeden

    Literature Review Workshop for TESOL | Learning at the - Education

    This virtual handout is a research guide accompanying the TESOL Literature Review Workshop presented to the Masters students in the TESOL program on Thursday, October 25th (taught by Anne Hays). The below resources provide a starting point for finding books and articles as well as an overview of resources available through the TC Gottesman Libraries.

    Library Resources

    Library Services and Publications

    All students, faculty, and researchers also have access to a number of important library services and publications provided to support and facilitate research and study in their particular programs and disciplines.

    FINDING BOOKS

    Library of Congress Subject Headings (LCSH) are the official subject terms prescribed by the Library of Congress for the cataloging of books and are in use in essentially all academic libraries. To find works pertaining to linguistic foundations of Teaching English as a Second Language and related subjects, it may be useful to use some of the subject terms, or combinations of terms, listed below when searching the online catalogs of libraries at Teachers College, Columbia University, and other institutions. To search by subject rather than by keyword, simply enter one of the below terms (or try your own) under ?subject? under a basic or advanced search.

    Call numbers:

    EDUCAT ? The most definitive record of the holdings of the Gottesman Libraries at Teachers College, including books, e-books, journals, e-journals, dissertations, media, and other specialized collections of all kinds.

    CLIO ? The union catalog of Columbia University Libraries (exclusive of the libraries of Teachers College, the Columbia Law School, and Jewish Theological Seminary), providing the most definitive record of individual libraries? holdings of books, e-books, journals, e-journals, dissertations, media, and other specialized collections of all kinds.

    WorldCat ? The union catalog of the contents of over 10,000 libraries worldwide, providing the means to do exhaustive searching by author, title, subject, and numerous other criteria and to find locations for specific items in libraries nearby and elsewhere.? Also freely accessible at worldcat.org.

    FINDING ARTICLES

    Journals ?> Databases ?> Federated Searching

    Academic Search Premier ? A multidisciplinary database providing full text for more than 4,600 journals, including nearly 3,900 peer-reviewed titles.? PDF backfiles to 1975 or further are available for well over one hundred journals.? See also Academic Search Complete (CU), a scholarly, multidisciplinary full-text database, with more than 8,500 full-text periodicals, including more than 7,300 peer-reviewed journals.? The database features PDF content going back as far as 1887.

    Anthropology Plus ? Provides worldwide indexing of journal articles, reports, commentaries, and edited works in the fields of social, cultural, physical, biological, and linguistic anthropology, ethnology, archaeology, folklore, material culture, and interdisciplinary studies.

    AnthroSource ? Covers current issues of the American Anthropology Association?s journals and bulletins, as well as archived issues of all of the AAA? s journals, newsletters, and bulletins.

    Communication Abstracts ? A comprehensive source of information about communication-related publications on a world-wide scale. Containing over 244,000 records, Communication Abstracts covers major journals in communication, mass media, and other closely-related fields of study to create a research and reference resource that encompasses the breadth of communication discipline and depth encompasses the breadth of the communication discipline.

    ERIC ? Sponsored by the U.S. Department of Education to provide extensive access to educational-related periodical literature, ERIC (which stands for Educational Resources Information Center) provides coverage of conferences, meetings, government documents, theses, dissertations, reports, audiovisual media, bibliographies, directories, books, and monographs.? In addition to this version, made available via the ProQuest platform, also accessible via the U.S. government ERIC site and through Ebsco ERIC.

    Education Full Text ? Provides comprehensive coverage of an international range of English-language periodicals, monographs, and yearbooks. Indexing coverage begins June 1983; abstracts are included beginning spring 1994; full text of some journals is available beginning in January 1996.

    Education Research Complete ? Provides indexing and abstracts for more than 2,100 journals, as well as full text for more than 1,200 journals, and includes full text for nearly 500 books and monographs.

    HAPI Online ? The Hispanic American Periodicals Index (HAPI) covers journal articles on Central America, South America, the Caribbean, Mexico, Brazil, and Hispanics/Latinos in the United States; currently provides over 60,000 links to the full text of articles appearing in more than 600 key social science and humanities journals published throughout the world.

    Linguistics and Language Behavior Abstracts ? Abstracts and indexes the international literature in linguistics and related disciplines in the language science, including phonetics, phonology, morphology, syntax, and semantics; coverage from 1973 to present.

    MLA International Bibliography ? Indexes critical materials on literature, languages, linguistics, and folklore; provides access to citations from worldwide publications, including periodicals, books, essay collections, working papers, proceedings, dissertations and bibliographies.? Now searchable via the Ebsco interface in addition to the ProQuest one.

    Professional Development Collection ? Designed for professional educators, this database provides a highly specialized collection of nearly 520 high-quality education journals, including more than 350 peer-reviewed titles. The database also contains more than 200 educational reports.

    ProQuest ? Provides broad multidisciplinary coverage of scholarly? journals, newspapers, dissertations, and other types of publications; for international coverage and access to full texts of dissertations only, search Digital Dissertations, a subset of ProQuest.

    SocINDEX with Full Text ? Offers comprehensive coverage of sociology, encompassing all sub-disciplines and closely related areas of study.? The database contains full text for more than 860 journals dating back to 1908, more than 830 books and monographs, and over 16,800 conference papers.

    Sociological Abstracts ? Abstracts and indexes the international literature in sociology and related disciplines in the social and behavioral sciences, covering such major areas as culture and social structure, family and social welfare, history and theory of sociology, radical sociology, rural and urban sociology, and the sociology of the arts, business, and education.

    Search Terms Within Databases

    Searching by keyword will often quickly lead to productive results, however, it is useful to note that databases, like online book catalogs, also use subject headings (or descriptors). To search by subject you will need to locate the link to the database?s ?thesaurus? or ?subjects.? Once you?re here, simply enter terms and click search to locate the official authorized term in the thesaurus. Note too that articles are linked by subject terms or descriptors within the article itself. These terms will appear as links, which you can use to find other ?like? articles. Specific search methods vary by database.

    Subject Terms to try in Linguistics and Language Behavior Abstracts:

    Subject Terms to try in ERIC:

    Keywords:

    Super Search (via Gottesman Libraries) ? To search some or all of our periodical indexes, plus EDUCAT and CLIO, simultaneously for books, journal articles, reports, dissertations, etc.

    Google Scholar ? Provides the means to search for scholarly research across many disciplines and sources: articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities, and other web sites.

    Concise Encyclopedia of Sociolinguistics (2001) ? Includes numerous rather extensive entries on topics within ten sections, dealing with (1) foundations of society and language; (2) language and interaction; (3) language variation:? style, situation, function; (4) language variation and change:? dialects and social groups; (5) language contact; (6) language, power, and inequality; (7) language planning, policy, practice; (8) language and education; (9) methods in sociolinguistics; and (10) the profession.? Also includes profiles of major sociolinguists.

    Encyclopedia of Diversity in Education (2012) ? With about 700 signed entries with cross-references and recommended readings, the Encyclopedia of Diversity in Education presents research and statistics, case studies, best practices, policies, and programs relating to diversity in U.S. education at pre- and postsecondary levels.

    Related posts:

    1. Literature Review Workshop for TESOL | Learning at the Library
    2. Literature Review Workshop for TESOL | Learning at the Library
    3. Literature Review Workshop for TESOL | Learning at the Library
    4. Literature Review Workshop for TESOL | Learning at the Library
    5. Literature Review Workshop for TESOL | Learning at the Library

    Source: http://www.earic.com/history/classic-literature/literature-review-workshop-for-tesol-learning-at-the-education-younghiram520s-blog.html

    reba mcentire acm awards the killing april fools global payments eli young band wrestlemania

    $KYAK $PCLN Brodsky & Smith, LLC Announces Investigation of ...

    Law Office of Brodsky & Smith, LLC Announces Investigation of Kayak Software Corporation

    BALA CYNWYD, Pa., Nov. 10, 2012 /PRNewswire/ ??Law office of Brodsky & Smith, LLC announces that it is investigating potential claims against the Board of Directors of Kayak Software Corporation (?Kayak? or the ?Company?) (Nasdaq- KYAK-News) relating to the proposed acquisition by Priceline.com Inc. (?Priceline?).

    Under the terms of the transaction, Kayak shareholders may elect to receive either cash or stock with a value of $40.00 for each share on Kayak common stock they own. The investigation concerns possible breaches of fiduciary duty and other violations of state law by the Board of Directors of Kayak for not acting in the Company?s shareholders? best interests in connection with the sale process to Priceline. Specifically, the investigation seeks to determine if conflicts of interest played a role in the transaction as, following the merger, Kayak?s current management team will continue to manage Kayak?s operations.

    If you own shares of Kayak stock and wish to discuss the legal ramifications of the proposed transaction, or have any questions, you may e-mail or call the law office of Brodsky & Smith, LLC who will, without obligation or cost to you, attempt to answer your questions.? You may contact Jason L. Brodsky, Esquire or Evan J. Smith, Esquire at Brodsky & Smith, LLC, Two Bala Plaza, Suite 602, Bala Cynwyd, PA 19004, by e-mail at investorrelations@brodsky-smith.com visiting http://brodsky-smith.com/502-kyak-kayak-software-corporation.html, by calling toll free 877-LEGAL-90.

    SOURCE Brodsky & Smith, LLC

    Source: http://wallstreetlivechat.com/kyak-pcln-brodsky-smith-llc-announces-investigation-of-kayak-software-corporation/

    Black Mesa NFL.com matt ryan matt ryan att wireless nfl nfl