The Comet Programming Language and System


Comet Book

MIT Press



Comet is an Award-winning tool for solving complex combinatorial optimization problems in areas such as resource allocation and scheduling. It may dramatically simplify the design and implementation of (stochastic) local search algorithms, while preserving the efficiency of low-level, problem-specific, implementations. Comet is described in the book "Constraint-Based Local Search" published by MIT Press and is the research platform of the optimization laboratory at Brown university.

One of the main innovations of Comet is Constraint-based Local Search, a computational paradigm based on the idea of specifying local search algorithms as two components: a high-level model describing the applications in terms of constraints, constraint combinators, and objective functions; a search procedure expressed in terms of the model at a high abstraction level. Constraint-based local search makes it possible to build local search algorithms compositionally, to separate modeling from search, to promote reusability across many applications, and to exploit problem structure to achieve high performance.

Comet is an object-oriented language featuring novel modeling and control abstractions to support constraint-based local search. Some of its modeling and control abstractions won a best paper award at CP'03 and a distinguished paper award at CP'04. Comet also features the concept of invariants which maintain complex expressions incrementally subject to changes to the underlying variables.

Comet also features high-level abstractions for nondeterministic programs and for parallel computing, including parallel loops, events, interruptions, and thread pools.


Latest Articles

Program Guide: How to install a shower head shower head guide on how to install a new shower head is not as easy as changing a light bulb, but almost.

Materials and tools

– New shower arm (optional)

– Replacement shower head

– Pipe Wrench

– thread sealing tape

– mastic or putty plumber


To start, decide whether or not to keep the shower arm, ie, the existing tube angle at which the shower head is connected. If the shower arm has become corroded over time, or does not match the finish of your new shower head, scrap. A socket wrench does the job when you’re hands fail. Note that while shower heads usually do not come with shower arms, you should find easily be appropriate for sale separately.


Omit this step if you opted to keep the existing shower arm. To install a new shower arm, start wrapping his threads, two or three times, with thread sealing tape. Stretch the tape slightly, and apply it . Then carefully turn the pipe in the wall fixture, and then sealing the wall opening with plumber ‘s putty. Slide shower flange arm and press the putty. Wipe off excess.


The next step depends on the type of shower head you have purchased. If yours is the type that is directly connected to the arm, this is what to do: Use sealing tape thread to wrap the wire in the base of the shower arm, then turn the shower head in position, being careful not to overtighten. (If clamps used instead of a key, protect the finish of installation with several layers of fabric or plastic tape.)

Homeowners who have purchased a handheld shower head probably is not necessary to add thread sealing tape on the base of the shower arm (if true, however, check the manufacturer’s instructions). In this case, the installation consists only of threading the hand on the shower arm, before threading the flexible hose hand shower in the holder.

Additional tips

• Arguably, handheld shower heads are more practical than fixed.

• A shower head low flow saves water and energy of your water heater should be used to provide a comfortable bathing experience.

• metal shower heads are usually better than plastic play. Look chrome finishes and brass construction. Easy adjustment and longevity without problems justify the added cost of such devices.

• metal hoses in hand-held shower heads are more flexible, and therefore easier to handle, plastic hoses.

• Shop online more choice, but visit the shops to have the opportunity to see and feel the products you are considering. Expect to pay at least $ 80 for a quality model.

Movies that every programmer should see

we hope you enjoy this new list of putlockers movies as much, as we have done while viewing them. To enjoy!

Ex Machina


Can you imagine if, as a programmer, you call the CEO of a multinational company like Google to test a prototype of artificial intelligence? Well, something like that happens to Caleb in the 2015 film, Ex Machina. Caleb is a programmer on the staff of the great BlueBook, a very important Internet company that has multiple services, including the most used Internet search engine (see simile with Google). On a day’s work, Caleb receives a mysterious email from the company’s CEO, who founded BlueBook at age 15 and is a computer genius who tells him to meet him. When arriving at the remote island where Nathan, the head of BlueBook, finds out that the purpose of the meeting is to make the test of Turing to a prototype of artificial intelligence that he himself has developed.

Background for a Programmer: Artificial Intelligence

Hard Candy

Starring Ellen Page and Pattrick Wilson, Hard Candy (2005) tells a story, a bit, truculent and not suitable for the whole public. I put you in situation, without revealing anything important of the film. It is the typical love story of the XXI century, boy meets girl on the Internet and they stay one day, to have a coffee. The thing up here is something normal, what is not normal is the age of the individuals, Jeff is 32 years old and Hayley is only 14 years old. Drinking coffee, Jeff, since she is a photographer, invites her to her house to make a book to Hayley and she accepts. Surely you’re wondering what will happen next, right? Well, the movie gives you a full turn so you’re stunned.

Background for a Programmer: Dangers of Internet Communication


Set in World War II, the film Enigma (2001) tells the story of Tom Jericho, a brilliant mathematician who is requested by the British secret services at Betchley Park. There code-breakers work there who have realized that the Nazis have changed the way their submarines communicate and also how they communicate with the German High Command. At the same time an important English ship with ten thousand passengers and valuable supplies is in danger of being attacked. Will Tom be able to decipher the Nazi communications with his Enigma machine?

Background for a Programmer: Encryption

Steve Jobs

You say, another movie Steve Jobs? And I’ll tell you, yes, but this is, to my liking, the best of all. Maybe it’s the performance of Michael Fassbender or the narrative of the film, but it seems to me a film that, all of us who are involved in the world of programming or computer science in general, should review. The film Steve Jobs (2015) does not tell anything new, who else and who least knows something of the life of which he was CEO of Apple, but is counted in a way that makes you can not lift the chair the two hours that lasts tape.

Background for a Programmer: Innovation

Who am i

Who Am I is a German film that tells the story of Benjamin, a typical guy who, in search of his own identity, decides to join a group of hacktivists with whom he intends to change the world. The modus operandi of this group of hackers and cyber-activist hacking groups is reminiscent of the universe currently in vogue. I’m not going to tell you that it’s a must-see movie, but if you like the hooded roll behind a computer to corrupt the current political system, I think this can be your movie.

Background for a Programmer: Hacktivism


Disconnection (2012) is a film that tells the story of five people. That of a lawyer who is so busy with his work and so stuck to his mobile phone that, incomprehensibly, does not have time to talk to his family. The one of a couple whose life is compromised to be exposed its secrets in the social networks. That of a policeman who tries to correct his son who bully a classmate. And finally a journalist who is believed to have found the bomb of his life in a story of minors and pages for adults. They are real strangers, and their lives are intertwined in this magnificent film.

Background for a programmer: Social networks

Perfect Blue

Satoshi Kon is one of the greats of Japanese adult animation, and works like Perfect Blue (1997), endorse him. Mima is the star of a Japanese music group, she is a true diva in the country of the rising sun, but since she does not sell as many albums as before, her manager has planned a new life for her and a change of course, Star of a television series to catapult his fame again. This is not to the liking of Mima who falls into a deep depression. If this is what we add, she discovers that her whole life is on the Internet and that someone is constantly watching her, we get a brutal cocktail. Mima reaches the point of confusing what is reality, what is fiction.

Background for a Programmer: Internet Privacy

Conceiving Ada

We have already spoken here several times of Ada Lovelace, the first programmer in the world, that is, the first person who designed an algorithm to be interpreted by a machine. In this film we do not follow Ada directly, but Emmy Coer, a computer genius who develops a method of communication with the past, resorting to immortal information waves. To worship his craft, he decides to approach Ada Lovelace, the founder of computer science.

Background for a Programmer: History of Programming

Open Windows

Open Windows (2014) is a Spanish film directed by Nacho Vigalondo, who already directed the phenomenal “The cronocrímenes”. It tells the story of Nick, a boy who has smiled his life as he will meet in person his favorite actress, Jill Goddard. Jill is promoting her latest movie and Nick has played with her in an online contest. But everything goes wrong and a call alerts her that the actress has canceled the appointment. That call also informs him that, in compensation, he has given her an access to spy Jill through her computer, all night.

Background for a Programmer: Internet Privacy

The signal

Three students disappear without a trace when they were investigating a hacker’s computer track. It all starts when Nic, his girlfriend Haley and his best friend Jonah, who travel by road through the Southwest, take a detour to locate a computer genius who has already managed to sneak into MIT systems and expose security breaches . The young people have aroused the curiosity of the mysterious hacker and vice versa. When you get in touch, everything suddenly becomes dark.

Mobile phone with interesting applications for sailing in kayak

And as they still continue (unfortunately) the days when I can not go out and enjoy this sport that I like so much, I have no choice but to continue imagining accessories in which to entertain myself to continue “sailing in dry land”, So seeing The possibilities that offer us the current mobile phones, I came across a terminal in which to install a GPS with complete navigation system, Plotter, Camera, Lunar and tide tables in the same device

The first step was to find a mobile terminal with Android that was strong enough for blows, and even submersible, and that did not shoot for price, “Voila”, after scrutinizing the network I decided on the Motorola Defy +

Another economic option is to provide your terminal with a waterproof case that will give you the same effect,
Or combine the two elements and wear it as I wear it with a wristband that is a forearm wristband.

The improved version of the Motorola Defy comes with more power and better resolution.
The new Motorola Defy + features Android 2.3 (Gingerbread). The power of your processor gets 1 GHz speed and its battery 7.1 hours of calls. 512 MB of RAM and 2 GB of internal memory. And if you still want more, you can expand it thanks to its microSD card.

In addition we can use it without SIM card, turning on the terminal and activating only the GPS. Like its younger brother, thanks to the certificate Defy +, this terminal is water resistant for half an hour and reaches up to 1 meter deep. In addition, its airtight housing, prevents the dust from entering inside.

5-megapixel camera and 3.7-inch display.

As for the applications that have installed this device are the following, which I summarize in this video I recorded, unfortunately I recorded with another mobile and sometimes does not focus well but serves to get the idea.


NAVIONICS   Mediterranean (thanks to my friend Estepa for discovering this application)

Requirements: Android 1.6 or higher
Description: Ideal for sailors, fishermen and water sportsmen of all kinds. You can plan your adventure, establish routes and markers, and search for marinas.

Capture geo-tagged images, and create a virtual adventurelogue of your entire trip and then share it with your friends and family via email, Facebook, Twitter and the Navionics community. Participation generated by the user.
Contents (UGC) With a few simple steps, you can modify the graphs to indicate local data such as rocks, wrecks, obstructions, buoys, headlamp and signal lights,

Shops and repairs, Ports and Marinas Moorings and anchors, and much more. By sharing your UGC, a community of users will benefit and is visible almost instantly
Marine charts of the Mediterranean

Share POI with the rest of the community Navionics

Tides and currents
Planning routes, waypoints and markers
The most up-to-date nautical (vector) with overlapping satellite charts
Marine database PI
wind forecasts
Correction of errors and optimization of routes.

Secondly a Great GPS tool.

GPS Essentials   for Android is another free GPS   that we add to our list of browsers, according to the information we have available seems quite complete, so it is worth adding.

Display navigation values  such as: Accuracy, Altitude, Speed, Battery, Bearings, Climb, Course, Date, Decline, Distance, ETA, Latitude, Longitude, Maximum Speed, Minimum Speed, Actual Speed, True Speed, Sunrise , Sunset, moon rise, Moonrise, lunar phase, destination, time, TTG, whirls.

Show the orientation of the earth’s magnetic field, shows an arbitrary tracking angle and the current target. Also a marine compass orientation, recording tracks and view them on the map.Export and import KML files into Google Maps. A HUD camera (heads-up display) to show your points of interest.

A map to show your waypoints. Convert  email addresses  from your referral contacts so they can be used within the application. A view of the sky from current positions showing satellites in view

Well I hope you liked this entry “Technological” I will soon put an invention that you have never seen on a best of 2016 kayak, everything is finished in the absence of the test of fire, or rather the water test.

a gym to train programmers

An online community that organizes competitions hacking algorithms and internationally. Is behind the company with the same name that channels this a good way to orient recruiters around the world, selling itself as a product to find the best.

Not surprisingly, among his clients are companies such as Intel , Facebook, Paypal, Fit Shop Pro or herself National Security Agency of the United States , which organize sponsored with various tests specially defined by them to any of us could access and display events the world their worth.

How to start

The first is register on the site. To do this we must enter the web ” Community ” and click on “Register Now”. Maybe what you’re thinking and no, no version in Spanish. It is an international environment and should be accessible to all, and if in the developing world have a default language that is English.

Once registered (and authenticated) have the possibility to consult the tutorials on the operation of TopCoder, algorithmic or competitions, but what is really interesting is just up to the left. There have icons of a menu where you can choose what type of competition we want. For algorithms must select just the first, whose icon is a “O (n)”.

To move forward we need to have installed JRE (downloadable from here: Java Download RE ) and clicking on the red button on the popup and entered the TopCoder-chat-tatami-IDE application.

Practice rooms

For my taste, little competitive spirit, here is the grace of the matter. The first impression is that we are in a IRC to chat and waste time. Nothing is further from reality. In the top menu we can find an area to compete, that we can only enter when there are competitions, and also some rooms for practices where we can revive the old challenges and disputed , but with the same spirit: solve a problem and you can not escape nothing.

To access the practice rooms must select an issue, after which it will show us we must choose between the problems that make it up, sorted by score and difficulty, so it is good idea to start with the easiest (250 points) and then go up the difficulty gradually.

At the top we show the problem statement and the data of the class must implement, the input parameters and the format of what needs to be repaid. We must devote significant time to this part and take notes, because we must also check the consistency of data input and validate absolutely everything. At the end of the sentence examples show, interesting to verify that we understood our task.

To solve the problems we can choose between Java (preferred by the vast majority of participants), C ++, C # and even Visual Basic. At the moment only I could try Java so you do not know the operation of other languages, their options, etc.

At first you may stoke us often, so we have the option of consulting solutionscontestants proposed at the time of the contest. This action blow to all those in the room who are consulting the exercise solution, but it should not matter to usbecause this is also part of our training.

Plugins for the editor

In the window to encode us we are a simple editor but we can change it tosomething we feel like more. In my case I have installed the Kawigiedit , which allows better organize unit tests, you can even compile the program with JDKpremises of our machine and, best of all, we mounted the skeleton application using the problem statement.


We are, after all , one of the best tools that have been created to improve our skills as a developer. The team of Topcoder has made a genuine community of geeks and hackers where it is good to spend hours researching and challenging the best on equal terms. After testing, hooked, and I think every programmer should have a regular appointment with this tool to further improve and fun in equal parts.

Send emails from a website

Although today almost all pages are conversant in either language server: ASP , PHP ,JSP , … there is a wide range of pages developed in HTML . Almost always with the invaluable help of a web editor. And it is a lot of people with a basic knowledge of theInternet, launches this to tell something to cyberspace. And even where there will be sites Could we insert code HTML and that does not allow use another language

For that matter, once we have carefully worked a website, we want people to share with us your opinion on it. Or simply contact us.

Once in this situation, the easiest thing would be to put a text that is a link (or not) with our email address. Here, we are giving the caller only our management and the use to tell us what you want. If you want to take this option Leete article “email append best practices” which will help to give more power to your email links.

Of course, it may be that we want, when we write, fill out some information that the email never know if us will send or not. To do this we have the forms. And that is when we want to send us filling in the form.

At this point we have two options. Or throw some language server (for alluded, not wasted Send emails with JavaMail )

For the user to send us the form using HTML only we have to do one thing. Put “mailto: [email protected]” in the action of the form. Lagging a code HTML like this, using the tag FORM :

  1. <FORM action = “mailto: [email protected]” >

With this get the user to send us an email with the structure of the form.

After riding our form we see that if we give send the received text can be something like this:

textfield = victor & textfield2 = victor% & textarea = cojonuda

The problem is that to differentiate the different parts of the message, the browser uses the identifiers of the fields. That is why it is quite convenient to modify. To this end you have to modify the name field of the form fields. We could put this way:

  1. <input type = “text” name = “name” >

Now, the chain received, would be:

name = victor & email = victor% & review = cojonuda

Although still a cryptic chain, it is somewhat clearer than the last.

We also have to keep in mind a few things. The first is that this will only work if the user has an email program on your computer (Outlook, Outlook Express, Eudora …). One must be careful, because although it is rare that the computer does not have an email program, it may be the case.

The second is that although we have given him the fields (including by making compulsory how we might use JavaScript -), the user has the ability to modify the email before sending it .

Even with all this is a good solution to get in touch with us easily.

Learning English is essential to being a great programmer

Although we make a great effort in creating content in quantity and quality in Spanish, is not a secret that the best programming material (books, tutorials, video tutorials, conferences, etc.) is in English.

For example, right now Laracasts is publishing a series of fundamentals laravel  in English, theofficial laravel documentation is in English, the API and comments from laravel and other frameworks are in English. StackOverflow , a great source of technical expertise, is also in English. Every time you encounter a “bug” or “issue”, I write my question on Google in English, and the chances of getting response soar 1000% also the best work you can get as adeveloper are in countries like Canada, USA and England. Need more motivation?

Tools to learn English online

Fortunately Internet is a wonderful place if you know how to use it, and today have at your disposal different free tools to start your goal to learn English today:

Duolingo is a platform that acts as a social network on como aprender ingles de verdade and other languages and works! In my family we even have a competition about who has more points or consecutive days of use. If you use it or want to start using it, add me, my user is duilio.pal.

Inglés With Jennifer  is a Youtube channel with more than a dozen Playlists and hundreds of videos for all levels. I recommend you to be part of the quarter million subscribers that has Jennifer.

Most modern courses often forget the importance of learning the grammar rules. That is why I like to do lessons in  aulafacil .

WordReference is a great resource support to learn English, find definitions with examples, context, pronunciation, etc. Definitely you can not miss one of my lashes every time I learn a new language.



There are many pages of tutorials in video, audio and / or text that may help you, to not let doubt consult Google or your favorite search engine.

No, Arthas not going to teach English, but play video games (in English) and watch movies and series (in English) are an excellent resource. Above all RPG type games (like Final Fantasy) where the talks are keys to achieving goals are a great incentive to want to learn the language.

You wanna be a programmer but I do not like coffee at nite?

What is the first thing you do in the morning? Probably  make a good cup of coffee  or other beverage to wake always at the top of the list.Whether you prefer tea, coffee or energy drinks, the caffeine has become part of our lives  and in many cases it is a must to survive the day.
If you are one of those people who panics when the jar is empty coffee, read on recommended list with espresso makers to discover other ways to  stimulate your nervous system  and keep you awake.

5. Eat right
Since there is coffee, the better we are filled with something else.After all, somewhere you have to  obtain energy  to function during the day. But this does not mean you can eat anything. Avoid eating large amounts of food at a time, as it only will give more sleep.Furthermore, while  sugary foods  can give you an energy boost when the effect ends fatigue can be much worse than before. Best stick to snacks  like nuts and fruits.


4. Take plenty of fluids
without caffeine , do not go to cheat the idea here was to overcome a little addiction!
The  dehydration  can cause  fatigue and lack of concentration , so be a water – filled glass at hand. A  survey  recently conducted in the United Kingdom indicated that only 4% of doctors believe their patients are aware of the  amount of water that must be taken daily (1.5 to 2 liters, but surely you knew that ).
Also, if you drink enough water, you have to stand up to go to the bathroom quite often, which leads to the next point …

3. Move!
Looking for any excuse to get up and walk around the office or  at least moves a little feet under the desk . Move will stimulate blood circulation  in your body and that will allow you to stay alert. Also, it sits for too long can cause your  metabolism enlentezca  and lead to various health problems .

2. Listen to music
Ponte headphones and looking for a good playlist to wake you . It not necessarily has to be loud music, just something that  stimulates your brain  to keep you awake  without preventing you to concentrate on the tasks you perform . No matter if what works for you is Wachiturros or Lord Bieber, nobody will judge … Except that the sound of your headphones to leak, then  get ready for trial , but at least be awake!

1. Turn on the air conditioning
and carrying blankets for your teammates, that between this and Baby One More Time  and you will be hating, but  the important thing is to avoid the heat . The cold makes your body must  regulate its temperature  and this must be awake. You can also try washing your face with some cold water.
We hope these tips allow you to  stay awake . Of course, if none of this works, you can always fall back and run to the corner bar to ask for a good black espresso .

Weight loss programming: Diet Hacking

Most Silicon Valley bigwigs are not super worried about losing weight.What do you care? Optimize performance and work that includes “diet piracy” to find out exactly what to eat to thrive in the workplace, such as El Corte discussed in a recent article.

In short, these hackers diet look at their bodies as machines and try to determine the best way to feed those machines, using the same techniques used to design applications or create new startups: innovation, optimization and efficiency. They do blood tests, cholesterol tests and body scans to find out what causes their bodies work the way they do and what they need to eat to empower them more energy and possible brain.

Often this means that they end up eating a lot of food-kale power, whey proteins, that sort of thing. But some remain mostly Soylent, a protein rice and starch-based batter recently developed by a guy named Rob Reinhart. The idea is that is supposed to have all the nutrients it needs to function so that you do not have to waste time eating (since you can only drink this time). Since switching to a Soylent, Reinhart says he has much more energy and do better in cognitive and reaction-based tests.

Another Silicon Valley entrepreneur, Julie Fredrickson, developed a program called Feasibility Minimum fitness, which has to do with work and eat as efficiently as possible. It includes an application, coaching one-on-one training and plans that focus on weight lifting (because so much time is needed as cardio). “There are no good or bad [food or training],” Frederickson told The Cut. “It’s not just what you will get in the way of you and your goals.”

Would you agree that eating and exercise should be all about efficiency and optimization of results, not your delight? Do you getyour body hacked to figure out exactly how to maximize your energy and weight loss? Or is it a bit much for you? Sound off below!

A programmer created a code to automate almost all your work. And send messages to his wife

Even he gave instructions distance to a coffee machine rental sg


When we hear the word ‘programmers’ we are not come to mind fun. In many cases they are these strange creatures sitting in a corner and surrounded by computers and electronic equipment.

However, a funny story became popular in GitHub, the website that hosts all kinds of software to share with others, and deals with a worker automated much of their work and personal life. And to send a text message can be exhausting.


The story was shared by a programmer named Nihad Abbasov, known as “Narkoz” on GitHub. It consists of a lot of software scripts with some funny names but unfit to see at work.

Narkoz says the scripts came from another programmer.

“There was a programmer who went to another company, it was the kind of person that if something requires more than 90 seconds of your time, write a script (command file) to automate that.”


After the boy went to the new job, his former teammates were searching through your files and discovered that he had automated all kinds of crazy things, including parts of your job, your relationships and make coffee.

The man wrote a script that sends the text message “working late” to his wife and automatically selects reasons from a preset list describes Narkoz. This text was sent at any time when logged in toa computer company after 9:00 pm.

He wrote another script related to a customer who did not like, and this new script is saved with the name of that person.

What makes the script is to analyze the inbox of your email looking emails client using words like “help”, “problems” and “sorry” and automatically sends a reply: “No friend worry, be careful next time”.

If he was not at work and connected to the servers of the company at 8:45 am, another script called “hangover” automatically gave an excuse by email as “I do not feel well, working from home”.


But there is still one better:

The former worker wrote a code that waits 17 seconds and then hacks into a coffee machine to order a latte.

The script tells the machine to wait another 24 seconds before pouring coffee into a cup, the exact time it takes to walk from desk man to the coffee machine. His coworkers did not even know the coffee machine was in the net and it was hackable.


So this serves for programming?

It is the setting of a computer on a dangerous carpet?

Travel and falls

Falls are one of the five leading causes of fatal accidents in the home, according to the website of Living With My Home. Setting up a laptop or desktop computer tower on the ground in the path of foot traffic creates a potential risk of tripping. Even if the computer is in a more discreet area, such as next to a table or sofa, you can still create a barrier and make someone switch to trip and fall.

Physical damage

An injury can not happen if someone trips over the team, but the machine itself can be damaged if someone kicked or struck by falling accidentally. If the impact is strong enough, the hard drive or other components may be damaged or parts may be released from the motherboard, causing them to malfunction. An animal or a child that the team is on the ground could play with it and damage the keyboard, cables or the connected devices.

Dust and debris

No matter how clean you keep a team out, dust still accumulates inside the box. Rugs and carpets are a known source of dust and lint. Positioning equipment on the carpet is sure to greatly increase accumulated debris on the computer. Dust accumulation L ‘can eventually obstruct the vents and cause overheating of the CPU. Dust can also spoil other moving parts, such as disk tray in an optical drive, leading to premature failure.

Static electricity

Leaving a computer on a carpet will make it more susceptible to damage from electrostatic discharge.Carpets are one of the main sources of static electricity and an accidental discharge can damage some components, especially the CPU and memory. This risk increases significantly if the case is opened, for example, installing a memory upgrade or a new sound card. From time to time check it and use carpet cleaner.

Massage, yoga and travel to retain technology employees

What software firms offer to entice programmers. It is a sector with full employment. And they gave 35% wage hikes.


Sebastian Bell [email protected]

To overcome fierce contracture in the back there are two possible paths. Entered in pilates classes or a computer programmer career. In their desperation to retain employees in one of the hottest sectors of the economy, technology companies are offering office massages and yoga classes . That, plus travel and salary increases, in the most demanded items, reach 35%.

In recent months, the landing of multinationals decided to install in Argentina their own development centers, such as Motorola, Intel, Avaya, EDS and Google, dried even more a place in which there isvirtually full employment , account Leonardo Savelli, of CreativeJobsCentral, a company specializing in human resources computer consultant.

a Jaime Tesone took him months to 45 engineers to the newly opened development center Avaya software, which exports technological solutions from Buenos Aires to the world. “We must devise policies motivating staff permanently , ” says Tesone.

In 2006, Google, the search giant on the Internet, was the top of the ranking of Great Place to Work USA (an annual study that identifies the best companies to work), among other things, to give free massages to employees in the office. Savelli note that this offer, along with yoga classes and open spaces for games like foosball and ping pong , as is being seen in local software companies. They are added to wage hikes above the average of the economy, which in the most tense areas of the market reached 35% in 2006, and the return of bonus year – end for productivity, “a mode that had been removed during the crisis and had not been standardized since her time of Y2K, the (false) the millennium virus in 1999 “.

the high demand generates starting salaries to inexperienced people, the order of 2,000 pesos a month , but in the sector software programadores¿estrella talking about no more than 23 years take up to7,000 pesos per month to their pockets. “There is still a dual market with higher wages in those companies that export , ” says Angel Perez Puletti, president of Baufest, a firm middle software that operates from the neighborhood of Núñez, “this situation will take one or two years mate. ”

higher wages cause an adverse effect : tempt many students to leave school to join the labor market before. “We encourage you to received ,” says Perez Puletti, “in exchange for the degree give two additional weeks of vacation and we encourage them to do the backpacking trip a month to Europe.”

In Argentina there are 52,000 employees related technology segment, according to calculations Paula Nahirñak, researcher IERAL. The sector turnover 5,000 million pesos a year . Check our website here at fitshop.

When the movie talks about computers. Alan Turing and the development of computers.

A few days ago I went to the cinema to see the movie on the putlocker ‘The Imitation Game’ about the life of mathematician Alan Turing. He has always troubled me computer science, computing, to the point that my work well into old decided to pursue a technical career related to computing. The film gave me sane to reflect on some aspects recounted there.

One of the questions that arose me is if Turing had really built a computer, since in all computer manuals always referred to ENIAC , built in 1946 by Eckert and Mauchly at the University of Pennsylvania, as the first electronic computer general purpose hardware history.

Turing machine building in the film is not a general purpose computer, but a machine designed only to decipher codes, which was inspired by another Polish machine, the Bombe. The first design a Turing Bombe improved was assembled in 1940 and was named Victoria. However, in the film give the name of Christopher. Surely with this change they accentuate the poetic because Christopher is the name of a close friend of the childhood of Turing, but to me that name change seems to me a mistake because it gives the character an extra emotional charge, and quite disturbed take forever in film scientists.

Bombe machine.

Bombe machine.

Another license used in the film is call the Turing team members ‘crossword solvers’ when they were cryptanalysts ringside. I think that gives a false impression of the kind of work they did, because the public can see it as a matter of entertainment, when they are very complex things.

With these questions I started to seek information about the first computers. By 1943 it was building a computer that used electronic valves, by engineer Tommy Flowers on an initial idea of the mathematician Max Newman, whom the Turing himself contacted. Blenchley Park did not initially supported the project until the machine was assembled and saw her running. It was the Colossus , finished building in January 1944, who managed to decrypt all messages encrypted with the German Lorenz SZ 40/42, also known as Tunny, a much more complex than the Enigma encryption.



It is curious that the ten copies of Colossus had disappeared. Eight planes were destroyed and burned by order of Churchill after the war. The other two were dismantled back in the 50s and 60s for military and political reasons there were a total secrecy about the activities and achievements of contracifrado. Information on the existence of the machine was banned for many decades. In June 2000 the British government finally declassified information. That secrecy made the Colossus was not included in the history of computing hardware for a long time. And not only that, but the important role that these machines did, changing the course of the war and avoid a much greater loss of life was not known.

As I said earlier, Eckert and Mauchly ENIAC was presented to the public in 1946 as the first electronic computer machine. An interesting thing is that the ENIAC was programmed by a team of six women: Betty Holberton, Jean Bartik, Kathleen Antonelli, Marlyn Meltzer, Ruth Teitelbaum and Frances Spence. They did not go to history, as if they did the engineers who built the machine. Until the 80s it was said that those women who appear in the photos with the machine were “Refrigerators ladies”. However, his work was crucial in the development of programming in the 50s and 60s.

ENIAC and programmers

ENIAC and programmers

However, computer history , there have been many. The Analytical Engine of Babbage , conceived in 1816, is considered the first computer in history, although it was never finish ever built by financing difficulties and technology (its antecedent, the difference engine , itself was built in 1991 according the plans of Babbage own and there is a copy in the Science Museum in London). The machine was operated with a steam engine and according to the plans occupy a space of 30 m long and 10 m wide. It was soft and it was Ada Lovelace (daughter of Lord Byron, the poet) who designed what today might be considered the first software of history, so Ada is considered the first programmer in the world. The US Defense Department gave its name, ‘ADA’ a programming language.

And what about the famous ‘Turing machine’? The so – called ‘ Turing machine ‘ is not a physical machine but a concept related to the algorithms and computability (thesis Church-Turing ), emerged in response to the problem raised by David Hilbert in 1920 on whether mathematics is or not decidable , and it has had great importance in the subsequent development of materials such as computational complexity.

Turing machine

Turing machine

With all these ideas flitting through my head I read an article by Javier Sampedro in El País Semanal on “Geniuses between inspiration and madness” where it extends over the two recent films about scientists ‘theory of everything’ about Stephen Hawking and ‘the Imitation Game’ on Alan Turing, who recently saw and is the germ of this post. Sampedro proposes more names of great scientists to go closer to the general public through film, since it seems to be a good method of disclosure.

Sampedro in his article reports that, after the war, Turing designed the first electronic digital computer of general purpose stored – program, the ACE (Automatic Computing Engine). I mean yes, finally it seems that Turing himself who designed a real computer, to 1946. Searching the Internet can find some of the history of the ACE , where you will also find information EDVAC John von Newmann, designed in 1945 , and built a little after the ENIAC at the same University of Pennsylvania and Eckert and Mauchly which collaborated with Von Newman. The EDVAC was already using binary code, as the current machines, unlike the ENIAC used decimal code.



It seems that there was simultaneously a crowd of studies and designs, as they always occur at each technological advance. Scientists and technology were ripe to make the leap to digital computing. Perhaps, on the other hand, motivated by political and social moment triggers. An investigation that, as we see was intensive and extensive, in terms of economic, armamentísticas, social and even gender implications.

Mini SEO guide for web programmers

It is important during the development of any web project take into account the page optimization for search engines. Otherwise you may find that by hiring SEO to end the web told there to reschedule much of the development.

To prevent an SEO inspection buries all the work done, and thus save time and money, from Interdigital, we want to give a series of guidelines to be followed by programmers when a web project is tailored so that although the SEO is not complete, no errors that would result Comenter reprogram the web again.

1 – clean Links

The links between the different pages have to be clean, ie should not include any internal code in JavaScript, intermediate page or counter, a link to another page is labeled <a text href=”paginadestino”> </a> link without frills.

2 – Same link = Same content

The same link always has to have the same content to follow. If you miss a link to a client, this has to do the same as you at any time.

If ever displays different content is likely the target page serving us to do SEO. They have to avoid using cookies to display options such as languages, configuration factors …


3 – Without internal redirections

Should not make redirections between internal pages.

If necessary, it is correct to use a 301 redirect to correct pages that no longer exist. However, although there redirection from our web pages we should not link to answering with a redirect to another page of our website.

The right thing is to link directly to the final page.

4 – friendly URLs

Many times SEO is related only to get friendly URLs, and nothing could be further from the truth.

Yes it is true that one of the tips that will give you a SEO is that your website has friendly urls, but if it means losing many hours of programming and is a major barrier to development is not the main factor and can make web positioning less friendly urls.

5 – No temporary URLs

We must avoid creating pages (urls) based on cookies or factors that change often so that every day we have the content in different urls (eg using session cookies or the date the url).

Remember: We want to give you a URL when a client is the same as we see even pass this time or in another country.


6 – Ability to change elements

One thing you always appreciate an SEO consultant is that you facilitate the work of changing the main elements of the page, especially the following:


  • Page title
  • major labels such as <h1>
  • Meta tag description
  • You could turn off indexing a page using the tag “noindex”
  • Cannonical to apply the label to a URL
  • Content with text instead of images (detail many designers overlook, but make it very difficult positioning Goolge)


7 – Consider the SEO from the start

When a web project start, you should be aware of a basic knowledge of SEO (or SEO technician template) to address properly the project.

A SEO technician can work better if you are able to see the development process and advise on the process before this is closed. It is much better to wait for the development and then invest time to undo any errors that might have carried out programmers.

By the way, a note:

Friday is not published

Unless you want to be the weekend fixing bugs …

8 – The Web search “noindex”

In order to avoid duplicates, we recommend that the results of the internal search engine of the page are the meta tag “noindex” by default.

This will also apply it to any category of the web that is empty of content.

9 – The pages that do not exist have to give 404

Find pages that do not have to return the browser to that URL http header 404. Avoid making redirections or use other tricks to show 404 error.

That does not mean we can not work in a creative way mostar a 404 error page that shows the user can be friendly and at the same time send 404 error correctly.


10 – Make sure that Google not index your development environment

One of the most common mistakes is not to protect the development environment from the claws of google. What may seem a trivial matter ceases to be when you indexes the web in testing and putting it into production considers the page just released a plagiarism of which is in their development server.

To avoid this, you can apply a lock to robots in the robots.txt page, or apply the tag “noindex” even if the best is possible that the web is developing only be accessed by username and password.

IMPORTANT NOTE : When moving to the production environment, you must remember to remove all the blocks that we have put. Many newly released pages have trouble booting because inadvertently, maintain blockade seekers …

With these tips we hope to have reconciled with some web programmers sometimes difficult companions: the SEO technicians. Visit this website for more.

Many of the tips above can be summarized in this mantra: a URL for each unique content and unique content in each URL .

How to write a SEO text position

Everything they’ve told you about writing SEO texts is a lie. Label passes, passes semantic latency and keyword stuffing. TAGS less, more FLOW.

Writing a SEO text is simple : SEO is good content that best answers the question of a user. White and bottle.

Google earns money by being the best search engine there -after our mother, as she has to go and look, cobras-, and for this you need propocorcionarte the content that best answers your question, that you raise him as search.

Optimize the technical elements helps a little, but not required and is not, even remotely as important as making a content that is like.

Now, how does a SEO article writing?


Do not worry, we will not go into technical things; it is common sense applied, like everything in SEO.



  1. Keywords : It is true that generally an item has to be directed to a keyword or subject that is being sought . It is therefore important toknow if you have to put the focus on “car rental”, “car loans” or “rent a car”. Do you know what to look for more? As in principle you have no idea nor I either- what you do is go to tools like übersuggest to give you ideas, and the Keyword Planner of Google to tell you the volume of each.If you can not use them , you can find more information in our guide keywords for SEO .When you have identified several that have good, do the search yourself on Google and look what they have the strongest competition .At first glance you can identify it by seeing if they are powerful or websites (better compete against blog Paco against Amazon), and if indoubt, you can use tools like ahrefs to look at the links that each URL: if you have many links will be stronger if you have few or none.
  1. The URL matter much : The URL must be fully optimized for the keyword. Eliminates the words that do not provide SEO value, including conjunctions, prepositions and other stop words. Mal : / the-10-best-cars-electrical-to-the-petaran-in-the-2014 / Well : / best-cars- electric-2014 /

Regarding the extension, there is no maximum recommended, although the ideal is that the depth of content does not exceed 3 levels.

Mal : / level1 / level2 / level3 / level 4 / content Well : / level 1 / level 2 / content

Obviously when we speak of posts on a blog, the ideal is that the part of the URL referred to the content is at a first level.

  • The title has to molar . Then comes the SEO: How many posts have been made on how to write a SEO text? You have to add something that differentiates it from the other 50,000 equals, and the title has to be your statement of intent. Mal : How to write texts SEO Good : 10 Secrets For Writing SEO anyone else you diráTen note that the title has to have between 50 and 70 characters to display entirely on the search engines, but you know what? A longer title can have greater engagement on social networks, encouraging you generate traffic, links and social signals (and this will mean that better positions).
Often content with high competition have to fight for delivering maximum value, not have the keywords in the title. In the example, the first result does not have the key term in the title or description. And it is a PDF!
  • The description is your secret weapon : the meta-description tag is the text displayed under the title on the results of Google. No influence how positions the content, influence, if molan, people click on them, and if not molan do not. And when people click on your content rather than in that of others, your content up positions as foam . Mal : In this article you will learn to write texts optimized for brisbane search engine optimisation. Well : you want to write texts optimized for SEO? Well you’ve come to the right place. You learn the 15 secrets of SEO that you become an expert.
  • The structure must be consistent . Imagine you read a newspaper where first is the news, half reading you see the title and the subtitle is to final.Si for you makes no sense for either Google H1 ever before the H2, H3 within H2, and counting . Beyond the H2 or H3 much should not have excessive needs to continue ordering information, so do not seek to force the reach H6, really, it is not necessary.

And you’re done! It seems impossible, but if you meet these points your post will be optimized for SEO . Obviously that is not everything, you also have to avoid making rookie mistakes …


  1. The keyword density . Or the number of times it appears a keyword for every 100 words If you talk about a subject is normal to appear named throughout the entire post , and that will better position, but there is no correct keyword density, or should increase the time you enter a term if it does not come to cuento.De done, Matt Cuts, head of Google search, and made it clear that is not a factor of positioning . (And we do not trust him, we tested and is confirming its version).

  1. Extension : There are 100 words content that can work superbly and another 3000 as well. It is true that the longer content tends to better position , but also because it tends to address an issue in more depth, not because it is artificially extended. Note that in the time it takes to write a post 3000 words may write 30 100 , so you have to be very sure that you’re going to get a return on write largos.Como items advice, do not force the extension : your post however long it has to last, do not belike Peter Jackson in the return of the King, not unnecessarily lengthen your posts.
  2. The Meta Keywords : Google confirmed in 2009 , which is said suddenly that does not use the meta keywords tag to position the content and there is nothing to suggest that can mentir.A good Google ignores it and are spending absurdly code . a bad if you look, but only to penalize those sites that put meta keywords that are not in its content(who knows) and it costs a disappointment.

Although it is a cliché and almost ashamed to say, remember to write for people, not robots .

It is imperative that your content, in addition to the above, fall in love, captivates and, basically, to answer in the best possible way the question that makes you the user to a search engine. And for that we have to write the best content.


This is the hard part to optimize text for SEO. You really want that position? Get give the user what no one else is giving .

  1. Be the best : If after doing competitive analysis you think there is room to improve the present, do. A simple way is to use the techniqueskyscrapper : Basically is to detect what is working to competition and multiply it by a thousand . What do the top 5 SEO tools? I make a list with 100. What do you have a list with 200 but only name them ? I’ll take the 10 essential and will analyze the detail.The aim should always provide maximum value to the person who comes to our post .
  2. Be unique : If everyone is talking about how to do SEO in 2014, make a post on how to do SEO in 2015 to analyze trends in the industry. If everyone is applauding what they are integrated Social Media and SEO, make a post saying it’s a hoax. Most issues can be approached from very different perspectives but neither is wrong.
  3. Uses the language of your user : Please note that the user searching you use your own words and jargon that characterizes him. It is essential that we take into account not only for us to increase traffic through those terms, but because the user will be easier to read, share and link a text intended for him .For example, suppose you’re doing an article for biologists on frogs: Mal : frogs are animals that live both in water and on land. They are green, have 4 legs and make “croak”. Well : Anurans incorrectly labeled with the term “frog” or “toad” are a group of amphibians with taxonomic rank of order. Now imagine that it is a page for children 5 years : Mal : anurans incorrectly labeled with the term “frog” or “toad” are a group of amphibians with taxonomic rank of order.Well : frogs are animals that live both in water and on land. They are green, have 4 legs and make “croak” .Tener these differences into account is especially important to turn to niche , to countries withdifferent uses of the same language (not the same Spain that Latam) and ranges of different age.
    For example, Renfe adapts perfectly to the language of its users.
  4. Invites the comment : When you comment on your post, they are adding new content, which has two effects: causes the page to refresh and extend the written content on this subject . A good commentary can generate great value for readers asking questions necessary or giving a new perspective and initiating a valuable discussion, but is also generating 50 or 100 words of text, for practical purposes to Google, you will be adding to your post. That is, they also improve the SEO of your content .So a post of 100 words to generate 20 good comments is easily converted into a large post of 2100 words that will position much better. The best? Others have done the work for you .Eye, does not come free, for this you have to be constantly responding to comments, solving questions, and generally making people has reason to post comments on your blog.
  5. I am varied : If you spend just to write, you’ll never make content that really outweigh the others. One way to offer something different is touse other formats : video, infographics, presentations, etc. which is better than what you want to tell and are different from what they are doing others.For example, upload a video to Youtube and insert it into the post fit: so you can use a combination of keywords complementary in each case as videos Youtube also position, and while improvements the value of your contenido.En this sense, never forget to put bold, links, quotes, pictures, videos and presentations that can make more pleasant and useful reading the content.
  6. Share the content : In the end, one of the things that will make your text, place great or not, is the number of links pointing to it. So if it is relevant and useful will come into more compilations, and as a tool in other posts of the theme. If it is not, you will get many visits (because Ihave a good master image or a good title) but will not get the links.Así craved, what I can do when writing the article to generate more links? Think about that always as a resource, the value it brings to webmaster needs to provide greater educational value, or fun, or have a post exactly like yours, and make it better with this in mind.Additionally, remember to communicate several times and well . Unlike what we usually think, not usually viralizar Internet content to the first change: usually needed more attempts. It is therefore important that you work well in 4 or 5 different texts to share the blog on Social Media that generate interest and invite to click.
  7. Links help you find things : If you ‘re composing a digital text will not be good unless you take advantage of the benefits offered by this entorno.Cada link you put give the option to your users find information that complements what they are looking for and if you link to content themselves because they are relevant, you are generating links to them.Which means: more visits, more links, more authority and ultimately more traffic.
  8. Order your content : Make sure your content, and well written, well cataloged and etiquetado.Esto will give SEO traffic category pages and labels, but also enhance your web interbonding, which will be easier to find and improve your potential SEO.

In short, returning to the beginning of this post: The best you can do to make your content search engine position is perfectly answer to the question of the user.

But answer is not just to provide more information than others : You canalso make it more attractive, easier to interpret and synthesize, which will provide more advanced features if you need them , keep it more up to date, that offers interaction with the community … and above all it is well connected .

Do you know your users well? You know what they expect from you and you can respond to perfection? If the answer is no, I can only recommend that you investigate and analyze until you have clear, because until we’re sure you will not be able to create a coherent online strategy, much less a SEO strategy (and theme, tone and format content is an essential part of both points).

So, you know your audience, ensures technical and some do better than others . That’s the secret of writing SEO texts.

Internet use is already assessed with language and mathematics

An international test will measure the ability of students to new electronic formats with an application that simulates the operation of the Web

The student, 15, plays the flash drive in the computer. Here you will find the questions and delving into the computer as if it did on the Internet, you will find clues to answer them . Upon completion, the student will deliver the memory key with the answers, the evaluator. This is the information society and communication entering the Pisa report of the Organisation for Economic Co-operation and Development (OECD , a forum for the world’s richest countries), which this year will measure for the first time the abilities of students to manage in the digital age through a reading test in electronic format.

The next May, the boys and girls in 60 countries around the world will again take the test of Pisa report , but with the novelty test electronic reader, which will add to the reviews that have been done so far ( math, science and reading) and that caused many debates in previous editions by the mediocre results obtained by Spain (the notes of this fourth edition will arrive in 2010). Not all countries participating in Pisa 2009 assess their students of this new competition, because it is quite expensive for the technical and human resources required, explains a spokesman for the OECD. They will 17 countries, including Spain, France, Korea and Japan.

For the first time this evaluation will include aspects such as the handling and application of computer tools to solve slogans
For the first time this evaluation will include aspects such as the handling and application of computer tools to solve slogans. Photo: Courtesy extraketchup / Flickr

It is to measure the necessary resources to “access, manage, integrate and evaluate information, construct new knowledge from electronic texts” something “quite different to do with printed texts,” explains the director of Pisa, Andreas Schleicher report. Thus the aim of this test goes beyond mere reading ability, as commonly understood, although “it is not so much about technology, but rather on cognitive skills that are needed for the effective use of technology,” adds Schleicher.

All these explanations are understood very well to know the details of the test. This is not simply read texts that appear on the screen of a computer, but students will have to search for information in an electronic application that simulates Internet and helps answer questions. As you browse the Web, of information to another interconnected, the student will, for example, to navigate to a text, read it, get the information needed to answer and respond through the screen.

“Good readers in digital format should be able to navigate around the texts through explicit information and hyperlinks, in addition to master the tools of Internet browsing, such as menus”, they explained at a conference Juliette Mendelovits, Tom Lumley and Barry McCrae, educational research institute of Cyber Security Portal, which also participates in the digital version of Pisa 2009.

In addition, the test will try to assess whether young people are able to “judge the relevance and correctness of information ( which is necessary to use tools such as Google or Wikipedia ), unlike the use of an encyclopedia where information is already sorted and assumed to be correct , “adds Schleicher. “Of course, all these skills are somehow correlated with the traditional reading, but much less than often assumed , ” continues the director of Pisa. In fact, the results of the test will be offered electronic reading independently of printed reading.

In 2009, only a small number of students will make the digital test (about 2100 of the 25,000 students who will Pisa tests in Spain). They will have 40 minutes to complete 27 questions, unlike the two hours they have to complete tests on paper math, science and reading. Each year the test has more questions about one of them and this time will be reading.

The language of machines or Internet of things

Internet de las cosas

We’re at a fascinating technological time. Today we begin to see the first robots that offer services, expanding artificial intelligence, drones are beginning to fly and disabilities or serious injury of some people already are practically “impossible” barriers. Another revolution progressing “adequately” is the “internet of things” (IoT) or communication between machines and devices.

We also begin to live a moment of very powerful market with forecasts of $ 8.89 billion by 2020 for this sector.

Today we already start to familiarize ourselves with the refrigerator alert to the supermarket when the yogurt will finish us or butter, with sensors that regulate the temperature and of course our home lighting. What you think control state is of gas, through sensors that alert us to our mobile leaks or damage? It is therefore possible. And if the oven was broken and we had us account at the time that we are going to put the Turkey?This already not going to recur, with IoT.

Who hasn’t dreamed of once in any big city have “oversight” to know where there was a “bloody” parking place. We have gone so far as to make distinction between “classes of people”: which are parking and which not. It is over. Car “is going to blow” in real time the holes available for Park and not get home desperate, with the car in a double row.

It is sure computers know all they have to know about the “stuff” through the use of data that you collect, monitor, count and geolocalicen that need us around. Can the exercise of thinking that would save costs, and above all losses?

Experts predict that by 2020 there will be more than 26,000 million devices adapted the IoT and another 30,000 million wireless devices connected to the web. They say that a person is surrounded of between 1,000 and 4,000 objects throughout his life, so imagine the Web of interaction, company providing SEO marketing wastes no time and proposes the “smart buttons” and independents (Thinking Things Open), which work with a SIM card anywhere in the world to use a Global SIM, and integrated so easily the user click and get the service. So the telephone company has launched along with pizza delivery , Click & Pizza, a new concept of order service of home delivery of pizza, executed through one click. In this way, have joined capabilities in its commitment to technological innovation adapted to the Internet of things.

Click & Pizza is an autonomous button with battery which may accede to refrigerator in customers and just press it, may be your favorite pizza order from any location. In this way, the customer will receive your pizza without having to do anything else or make any call or additional processing via mobile or PC. Who hasn’t dreamed of this! I say the push of a button and obtain a service!

All this translates into efficiency, of energy, of business, of time, of resources, leverage the intelligence of many teams, improving operations, and most importantly the satisfaction of the customer, people, that is what has to serve all this means. Consider for a moment as our can improve all this already excellent health service or transport in the country.

We are going to go collecting benefits in three lines, mainly, they are: the substantial improvement in communications, control, and of course, a third in which all converge, which is a significant cost saving.

But not everything is done, of course. Let us not forget the barriers or challenges of this transition: an ecosystem shared for all devices, a standard protocol for hardware and software, the problem of the batteries that are exhausted, and of course, control data (Privacy and marketing).

In any case, there is less. It is not so much about imagination, but the power of Science (and funding)

For the Oxford Dictionary, the word 2014 in the English language is …


As is tradition, in November the Oxford Dictionary announced which was, for its consideration, the most emblematic word of English in the year that is ending.

A year ago the choice was “selfie” , and as we know, the term madness unleashed a whole during 2013 and 2014.

Now the Oxford Dictionary of English chose the verb Vape (vaporear), as the word of the year. This term is used to refer to the action of inhaling best electronic cigarette in the UK. This is what he told the editors of the dictionary in a statement:

“The word of the year is a term or expression which has aroused great interest. In the past five years, sales of electronic cigarettes have increased from virtually nothing to a multibillion dollar industry. “

They also pointed out how necessary it was to have a word to distinguish the activity of electronic cigarettes inhale smoke a conventional cigarette, therefore, the word Vape has come to fill a linguistic egg that was increasingly evident.


Electronic cigarettes were invented in 2003 in China, and although just have a decade of the market, the Anglo – Saxon term Vape already used for 30 years, in fact its first reference was to Article Why do People Smoke , published by the magazine British New Society in 1983.

The text was written by Rob Stepney, and he, proposed the use of an electronic smoking device that did not exist:

“An inhaler or a cigarette” no fuel “that closely resembles the real thing but … to deliver a metered dose of nicotine vapor (the new habit, if successful, should be called ‘vaporear’)”.

Maybe in Mexico this word still we find it outside, as this product still has very little penetration. Anyway, we’ll see if the same thing happened with selfie occurs, and ended up hearing the word vape everywhere.

*** Via EFE