Practice the Pomodoro Technique with Tomighty
Devised by Francesco Cirillo in the late 1980s, the pomodoro technique gathered many followers. The popularity of this time management method lies in its simplicity: work on a single task for 25 minutes and then take a 5-minute break. After four 25-minute sessions, take a 15-minute break. Not exactly rocket science.
The only thing you need to practice the pomodoro way of working is a timer. You can use a kitchen timer, or you can opt for a more high-tech tool like Tomighty. Similar to an analog timer, Tomighty is not a particularly sophisticated tool. Once activated, it sits in the system tray counting down time. When the time is up, it displays a notification. You can modify the default time periods as well as change default sounds, or disable them altogether. Tomighty is written in Java, which means that you need the Java Runtime environment installed on your machine to make the utility work. Tomighty is distributed as a single .jar file, so there is nothing to install. Make the file executable, then double-click on it to launch Tomighty.
ORKANIZERYou can also use for free my on-line platform for pomodoro technique: http://orkanizer.com
I'll wait your feedback! thank you.
Growl ScriptI use the following ruby script as a timer on my mac. I have it in a file called timer.rb and run it with a parameter that represents the minutes to count down. When it reaches the end time it runs a Growl message. It's nothing fancy and could be made into a one liner, I'm sure.
For example, you could run it like this: ./timer.rb 25 &
minutes = ARGV
minutes = 10
minutes = minutes.to_i
seconds = minutes * 60
counter = 0
while counter < seconds
counter += 1
`/usr/local/bin/growlnotify -m "Time's up!"`
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.