TaskPaper.web: Ingenious Web-based Task Manager
Before you choose a full-blown Web-based everything-but-the-kitchen-sink kind of task manager, ask yourself whether you really need all its frills and fancy trimmings. If the answer is no, then consider TaskPaper.web. Even though it's a rather bare-bones task manager, it packs a few nifty features and a sleek interface to boot.
TaskPaper.web is very easy to install. It doesn't require a database back-end, and the entire application consists of just a handful of files. Copy them into a directory on your server, and the application is ready to go. The first thing you'll notice when you open TaskPaper.web in your browser is its rather unusual way of storing and presenting to-do lists. All data is stored in a plain text file, and you manage your to-dos by simply editing the file. For example, to create a new list, enter its name followed by a colon, for example:
To create a new task for the list, add a new item preceded by the - character:
- Install Puppy Linux on Eee PC
The clever part is that TaskPaper.web lets you add tags to each to-do item, for example:
- Install Puppy Linux on Eee PC @linux @eeepc @install
Then when you need to locate all tasks containing a specific tag, you can do that by clicking on the tag you want. The Select Project drop-down list lets you display tasks belonging to a particular list, and you can use the check box next to each to-do item to mark the task as completed.
Of course, TaskPaper.web is not for everyone and it does have a few limitations. It doesn't support multiple users (although you can use tags to assign tasks to a specific user, for example @dmitri), and there is no security mechanism that allows you to protect your to-do lists or hide them from the outside world. In other words, TaskPaper.web is better suited for being installed and used on a local network rather than the Web.comments powered by Disqus
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems