Productivity Image

The Not-to-Do List — 7 Habits That Are Sabotaging Your Productivity

I saw an article recently that hit home with me.  The article, titled The Not-to-Do List — 7 Habits That Are Sabotaging Your Productivity and Happiness , was written by John Meyer, Co-Founder and CEO of Lemonly.

Here are Meyer’s seven recommendations for things you should stop doing, along with my thoughts:

1. Touching emails more than once.

While Meyer calls it “only hold it once” (or OHIO), I’ve also heard it called the “touch it once” rule or the “one touch rule”.  I personally use the latter (OTR).  Lots of productivity sites tout this as a key aspect of reaching another concept called “Inbox Zero”, which suggests that you should empty your inbox each day.  I question the value of this since an empty inbox at 5PM isn’t necessarily in the same state 30 minutes later.  It’s always seemed to me to make more sense to just try to get through your email as quickly and efficiently as possible.  If you clear it out, that’s great.  If you don’t, who cares? Read more

Automated Website Backup

Backup Your Web Site Automatically in cPanel

One of the services I perform for web clients is periodically making backups of their web site. This includes backing up the web directory (all of their HTML files including WordPress and any accompanying theme files and plugins) and taking a backup of their site’s MySQL database.

Rather than doing this manually, it’s easier (and more reliable) to just schedule the process in cPanel.  Unfortunately, if you’re using a reseller account like mine or if you have multiple sites, you can’t select a single web site in the native cPanel Backups module.  You’ll have to write a bash script and run it at your desired frequency through Cron. Read more

Sites with Security Hacks

How Many Times Have You Been Hacked?

Results: How many times have you been hacked?Half of American adults had their personal information exposed to hackers last year alone. In a recent attack at the federal Office of Personnel Management, hackers stole the most sensitive personal data for 21.5 million people.

The New York Times recently created a microsite that allows you to answer a few questions to learn which parts of your identity may have been stolen in some of the major hacking attacks over the last two years and what you can do about it. Not all attacks are included, and many attacks go undetected, so think of your results as a minimum level of exposure.

Here’s the link: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html

Karma Hotspot and MacBook Pro

How Not to Launch Your Product

I recently (well, not recently, more like 294 days ago) purchased a Karma Go wireless hot spot device for use when I travel.  My in-laws didn’t have wireless connectivity in their home (they used dial-up until when they switched to broadband last year, and finally installed a wireless router a couple months ago) and on more than one occasion I’ve had to drive around looking for a location with wireless because I had an emergency at work and needed internet access.

While I could get a wireless hot spot from work, I like the idea of having my own wireless connection and at $99, the device is tiny and fits in my briefcase or backpack.  More importantly, the data never expires and there is no monthly contract, so the fact that I would only use it as a last resort/contingency, makes the whole concept very affordable.

Getting the device was an adventure in and of itself. Read more

Connected Devices Map

A Map of Every Device Connected to the Internet

This isn’t exactly current (about a year old, actually) but I ran across a tweet recently by programmer and “Internet cartographer” John Matherly: Read more

Oliver Wendell Holmes

Simplicity

I would not give a fig for the simplicity this side of complexity, but I would give my life for the simplicity on the other side of complexity. — Oliver Wendell Holmes

OmniFocus dashboard

GTD Review: OmniFocus

Overview

I recently switched to OmniFocus as my GTD application for Mac OS X and iOS.  Now, I realize this goes against my initial criteria for finding a new GTD system, which included a requirement that the system be cross-platform, but my computer usage — even at work — has shifted to almost entirely Mac OS X.  Further, while I rely on an Android (Samsung Note 3) as my personal phone, there are a couple good applications — I currently use Quantus Tasks — that have been able to access the OmniFocus sync servers using an open API, meaning I can always access my todo list whether I’m on a computer or on the go.  This has also made me more reliant on my company iPhone and I ended up purchasing the OmniFocus iOS application as well.

OmniFocus is not a light investment, the Mac OS X application is $40 (upgrade to Pro version is another $40) and the iOS app is $40 (upgrade to the Pro version is another $20), which is a turn-off for many users, but it can be configured from a very simple workspace to one with significant complexity and features, making it a great choice for GTD practitioners of all skill levels and needs.  Personally, I’ve spent similar money on GTD applications ($50 for todoMatrix and another $20/year for its web interface, $20/year for Doit) and in my opinion, paid applications only increase the level and quality of support and enhancements from the developer over time.

Read more

Google Font

Google Font Library Project

Someone I follow on Twitter (CodeVixen) sent out a link to Font Library, an open source project intended to tag and organize Google Fonts.  If you’re a little typography-challenged at times like I am, you can shop by tag and the site displays a sample of each font on the page so that you can see how it looks.  Really helpful!

Two-Factor Authentication

Sites with Two-Factor Authentication

Looking for a way to keep your online accounts (cloud storage, banking, social media, email, etc.) as secure as possible?

Two-factor verification (also known as two-step authentication, abbreviated to TFA) is a process involving two stages to verify the identity of a user trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which might involve only one of the three authentication factors (a knowledge factor, a possession factor, and an inherence factor) for both steps. If each step involves a different authentication factor then the two-step authentication is additionally two-factor authentication. (Wikipedia) Read more

GTD Quick Reference

Can a GTD system be too simple?

I was reading an article the other day on Lifehacker that showcased how to use Apple Reminders for GTD.  The idea was that it’s so deeply embedded in iOS and OS X, that users of those platforms should find it beneficial to use it for GTD-based task management.

This raised another question in my mind, can a GTD system be too simple?  I’ve seen ways to deploy Outlook, Evernote, OneNote, Gmail and many other systems for GTD.  One of the founding principles of a GTD system is that it should be easy to use, or you won’t use it the way you should.  But isn’t there a balance between complexity and a lack of features?

It’s no secret that I have a very clear idea of what features are important to me, but each person will typically have their own idea of what is required and what is extraneous.

How do you balance the simplicity and complexity that both add to the usefulness of a GTD system?