Practice the Pomodoro Technique with Tomighty
Devised by Francesco Cirillo in the late 1980s, the pomodoro technique gathered many followers. The popularity of this time management method lies in its simplicity: work on a single task for 25 minutes and then take a 5-minute break. After four 25-minute sessions, take a 15-minute break. Not exactly rocket science.
The only thing you need to practice the pomodoro way of working is a timer. You can use a kitchen timer, or you can opt for a more high-tech tool like Tomighty. Similar to an analog timer, Tomighty is not a particularly sophisticated tool. Once activated, it sits in the system tray counting down time. When the time is up, it displays a notification. You can modify the default time periods as well as change default sounds, or disable them altogether. Tomighty is written in Java, which means that you need the Java Runtime environment installed on your machine to make the utility work. Tomighty is distributed as a single .jar file, so there is nothing to install. Make the file executable, then double-click on it to launch Tomighty.
ORKANIZERYou can also use for free my on-line platform for pomodoro technique: http://orkanizer.com
I'll wait your feedback! thank you.
Growl ScriptI use the following ruby script as a timer on my mac. I have it in a file called timer.rb and run it with a parameter that represents the minutes to count down. When it reaches the end time it runs a Growl message. It's nothing fancy and could be made into a one liner, I'm sure.
For example, you could run it like this: ./timer.rb 25 &
minutes = ARGV
minutes = 10
minutes = minutes.to_i
seconds = minutes * 60
counter = 0
while counter < seconds
counter += 1
`/usr/local/bin/growlnotify -m "Time's up!"`
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.