Practice the Pomodoro Technique with Tomighty
Devised by Francesco Cirillo in the late 1980s, the pomodoro technique gathered many followers. The popularity of this time management method lies in its simplicity: work on a single task for 25 minutes and then take a 5-minute break. After four 25-minute sessions, take a 15-minute break. Not exactly rocket science.
The only thing you need to practice the pomodoro way of working is a timer. You can use a kitchen timer, or you can opt for a more high-tech tool like Tomighty. Similar to an analog timer, Tomighty is not a particularly sophisticated tool. Once activated, it sits in the system tray counting down time. When the time is up, it displays a notification. You can modify the default time periods as well as change default sounds, or disable them altogether. Tomighty is written in Java, which means that you need the Java Runtime environment installed on your machine to make the utility work. Tomighty is distributed as a single .jar file, so there is nothing to install. Make the file executable, then double-click on it to launch Tomighty.
ORKANIZERYou can also use for free my on-line platform for pomodoro technique: http://orkanizer.com
I'll wait your feedback! thank you.
Growl ScriptI use the following ruby script as a timer on my mac. I have it in a file called timer.rb and run it with a parameter that represents the minutes to count down. When it reaches the end time it runs a Growl message. It's nothing fancy and could be made into a one liner, I'm sure.
For example, you could run it like this: ./timer.rb 25 &
minutes = ARGV
minutes = 10
minutes = minutes.to_i
seconds = minutes * 60
counter = 0
while counter < seconds
counter += 1
`/usr/local/bin/growlnotify -m "Time's up!"`
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.