whoisjoe.com

Time Management with the Pomodoro Technique

  

October 8, 2009

Home About Projects Blog LinkedIn ReThink Security

About 6 months ago it seemed like the internet was infatuated with a new time management technique called “Pomodoro.” Developed by Francesco Cirillo, The Pomodoro Technique is a good way to increase focus, manage time and improve time estimations. If you’re curious, the term “Pomodoro” comes from the Italian word for tomato, which is the type of kitchen timer the author of the technique used to time his sessions, more on this later.

The Pomodoro technique taps into a few important principles to help increase focus and results:

  1. We can attain a laser-like focus for a short period of time, after that time focus deteriorates and results diminish
  2. Minimizing distractions is paramount for finding a flow state
  3. Taking short breaks can help increase focus
  4. Using a prioritized task list helps minimize downtime due to task selection between tasks

The author did some experimentation to find out how long a person can focus on a single task and discovered that it’s generally about 25 minutes. After which point the person becomes increasingly distracted by other things.

The cycle of the pomodoro technique goes like this.

  1. Create a Priority weighted task list.
  2. Select the first task, set a timer for 25 minutes, and begin working on it.
  3. Turn off all distractions. No phone, e-mail, IM. Close your door and focus.
  4. At the end of 25 minutes stop working completely. Pencils down; like at the end of a gradeschool test
  5. Walk away from the task and do something else unrelated and calming for 5 minutes
  6. This means no checking e-mail, phones, etc. Go play with the dog, or get a glass of water.
  7. At the end of the 5 minutes,
  8. Return to your desk
  9. Place a checkmark next to the task you were working on, on your task list
  10. Set your timer for 25 minutes
  11. Return to your task and continue working with laser like focus for 25 minutes
  12. If you complete a task draw a line through the entire task on your sheet

If you complete a task before the 25 minutes are up, use the last few minutes of the “pomodoro” to review your work and improve it, or learn from your experience so you can do it better next time. If you complete a task, but you’ve used fewer than 10 minutes of your pomodoro, consider that part of the previous pomodoro and move on to your next task immediately.

Does this really work? I’ve found that this works well for me when working on certain types of tasks, but like almost any time management technique I’ve had to modify it for my own uses.

It works when I am writing, testing or reviewing. I think it works with these classes of problems because I don’t need to hold enormous amounts of information in my memory, and taking short breaks periodically allows me to step back and reframe the issue I’m working on for added clarity.

When I have a task that I estimate should take an hour I will sometimes use a single pomodoro to complete the task in half the time. I’ve found when all distractions are removed that this 50% estimation is fairly accurate.

I’ve found this can be very distracting when I find myself solving large problems, while programming complex systems, or need to keep a large amount of information in my head. All this thrashing every 25 minutes only serves to defocus me. Stopping every 25 minutes makes it nearly impossible to enter into a “flow state” which can increase productivity significantly. If I find myself in that kind of a state, and I’m feeling good I won’t take a Pomodoro break. I’ll pop my head up four or five hours later to discover I’ve made significant headway on all my tasks.

Just think how well you work when right at the end of a major deadline. The Pomodoro Technique attempts to tap into that focus (or frenzy) and allow you to harness it all day. Give it a shot for a few days, maybe you’ll find a source of energy and focus you never knew you had.

Posted By: Joe Basirico

  • 81 More Posts
  • So, You're a Manager Now
  • A Mixtape in 2022
  • The Middle Path of Planning and Reflection
  • Micromanagement and Trust
  • On Giving Advice
  • Emergency Preparedness During Coronavirus Frenzy
  • Mind Map Your Life
  • Start With the Hard Part
  • Delight in the Details
  • Introducing ReThink Security
  • Newsletter & Recommendations
  • Take a Moment
  • Triage Decision Making
  • Show Your Work
  • Getting Back Up
  • Max Out vs. Continuous Development
  • Mental Diet and Exercise
  • Asking for Help Part 2 - Alerting
  • High Water Mark
  • Who Do You Want to Be
  • Presentation Tips
  • Asking for Help
  • China Hijacking the Internet
  • Recording Audio with AirPods in Imovie
  • Active Decisions
  • Create/Publish Scripts
  • Specialize or Do Not Specialize
  • Exactis Breach
  • Optimizing Images
  • What I Track
  • What I’m Thinking About May
  • What I’m Thinking About March
  • What I’m Thinking About January
  • Building a Collaborative & Social Application Security Program
  • Lazy Days in the Cloud
  • Delegate Then Do
  • So you want to be a better programmer
  • Project Success
  • Don't Short Circuit a Lesson
  • Scale Your Solution to the Problem
  • Digital Currencies
  • Fortnightly
  • Why You Should Have Trust Issues with Pokemon Go, and Every Other App on Your Phone
  • In Defense of Reverse Engineering and Responsible Disclosure
  • Ruby open allows command injection if user controlled
  • New Mac Install Guide
  • Understanding Customer Needs and Helping Them Mature
  • My Experiences with IOS8 and Yosemite so far
  • The Importance of Vulnerability Disclosure Programs and Bug Bounties
  • My New Record Player and Beck - Morning Phase (The Vinyl Experience)
  • An Hour of Code with Code.org
  • Gmail Changes to Displays Images by Default
  • Why I Donated to Help Jailbreak iOS7 & You Should Too
  • Email Strategy
  • Shutdown
  • Anatomy of a Distributed Denial of Service (DDoS) Attack
  • NASA Forced to Suspend All Public Outreach & Education Programs
  • Joe_CMS Open Source!
  • Mobile Application Security Testing FAQs: Post #1
  • How Much Security Does Obfuscation Get You?
  • Why Privacy Matters Even if You Have 'Nothing to Hide'
  • What LinkedIn Should Have Done with Your Passwords
  • Constant Vigilance
  • Boeing Paying Hackers to Break into Their Systems
  • My Reading Cycle
  • Developing Tools for Professional Hackers
  • Finding Your Inner Evildoer (4/4): An Evil Streak
  • Finding Your Inner Evildoer (3/4): A Good Imagination
  • When to Rebuild Your Process from Scratch
  • Finding Your Inner Evildoer (2/4): Complete Knowledge of the System
  • Continuous Incremental, Personal Improvement
  • Finding Your Inner Evildoer: Part 1
  • CISCO Password Revealer
  • Battling with Word and Excel
  • Which is More Secure: Windows or Linux?
  • The High Cost of an Application Security Data Breach
  • Using the ConfigurationManager to Access your ConnecitonStrings in the Web.Config
  • New WikiRater Features
  • When is it OK to Build up Technical Debt
  • Time Management with the Pomodoro Technique
  • Manage Energy Not Time
  • Goals, Results and Activities - defining your productivity
© 2022 whoisjoe.com