6 great Android features missing from iOS 11

6 great Android features missing from iOS 11

Credit: Ben Patterson

Call me a flip-flopper, but the new features in iOS 11 have me thinking of jumping back to iOS after switching to Android barely a year ago.

Indeed, the new version of iOS brings such enticing features as a revamped App Store, a customizable Control Center, and drag-and-drop for iPad users, plus such catch-up features as one-handed typing and easy person-to-person payments.

But returning to iOS would mean leaving behind many Android features I’ve grown to love, from the ability to set up multiple user profiles to one-touch Google searches on whatever’s onscreen at a given moment.

Read on for six awesome Android features that iOS 11 has yet to match, starting with…

Multiple user profiles

Given all the innovations coming to the iPad courtesy of iOS 11, from the ability to drag-and-drop elements from one side of the split screen to the other and the new, persistent app dock, you’d think Apple would toss in a feature that’s been standard on Android for years: user profiles, perfect for letting family members in a one-iPad household create their own personal iPad spaces.

Multiple user profiles

Ben Patterson

If you’ve been waiting for Android-like user profiles to arrive on iOS, bad news: they’re still missing in iOS 11.

For whatever reason, though (privacy concerns, perhaps?), Apple has yet again passed on adding user profiles to the iPhone or iPad. That means if you share your iPad with your toddler or teenager, you’re sharing all your iPad data, too, including your e-mail, your open browser tabs, your Facebook app, everything.

Multiple Do Not Disturb schedules

Android has really spoiled me with its “automatic rules” for Do Not Disturb mode. With automatic rules, you can set up multiple Do Not Disturb schedules for weeknights, weekends, meetings, and any other scenarios you dream up. For example, I have Do Not Disturb set to turn itself off early (as in 6 a.m.) on weekday mornings, while on weekends, Do Not Disturb keeps things quiet until about 8.

Multiple Do Not Disturb schedules

Ben Patterson

Android’s “automatic rules” let you create multiple Do Not Disturb schedules, as opposed to the single Do Not Disturb schedule in iOS 11.

In iOS 11, though, Do Not Disturb mode still lets you set only a single schedule, meaning you can’t set Do Not Disturb to give you more quiet time on weekends or during meetings.

Yes, the new “Do Not Disturb While Driving” feature (which automatically silences notifications whenever your iPhone senses you’re driving) is a nice innovation, but it’s too bad iOS 11 didn’t catch up to Android’s Do Not Disturb features.

Search the entire screen

As with previous versions of Apple’s mobile software, iOS 11 lets you perform quick web searches on selected text via Spotlight, iOS’s universal search feature. That’s helpful if you want a deep search on a narrow selection of text, but sometimes I’m looking for a broader search of everything on my screen.

Scan the screen

Ben Patterson

Android’s “screen search” feature lets you do a one-tap Google search on everything that’s on your screen, a feat that iOS 11 has yet to master.

Here’s where Android’s Screen Search feature comes in handy. With a single tap of the What’s on my screen button in Google Assistant, Android will scan the entire screen and return any relevant search results, handy if you want a quick, 360-degree cheat sheet on a news article or web page. Pretty neat, and there’s no real equivalent on iOS, not even once iOS 11 arrives.

Clear all app windows

Here’s an Android feature I’d sorely miss even though I know it’s more cosmetic than anything else. The “Clear All” button on Android’s Overview screen instantly closes all your open app windows, leaving you with a soothing “No recent items” message when you tap the Overview button again. For a neat-freak like me, tapping the Clear All button never gets old.

Clear all app windows

Ben Patterson

The “Clear All” button on Android’s Overview screen might be the feature that Android-to-iOS 11 switchers miss the most.

On iOS, though—and yes, this includes iOS 11—there’s no easy way to clear out the massive stack of app windows on the multitasking screen, forcing you to flick up on dozens of individual windows until the coast is clear.

Now, I’m sure iOS comes with marvelous under-the-hood tools that manage the resources used by your apps and automatically suspends those that have been sitting untouched in the background for too long.

Still, though, I know it’ll kill me the first time my thumb reaches for the non-existent Clear All button on my new iPhone 8 (assuming I actually make the big leap).

Delete all local photos & videos from the Photos app

You’ve probably heard about the new storage-saving features in iOS 11, particularly when it comes to the storage-hogging Photos app.

Delete all local photos & videos from the Photos app

Ben Patterson

iCloud Photo Library will help shave some of the storage space consumed by your iPhone snapshots, but Google Photos for Android can wipe all local pictures and videos, perfect for keeping photo storage to an absolute minimum.

For example, Apple announced support for a new image format (HEIF, for “High Efficiency Image Format”) that can halve the amount of storage gobbled up by your snapshots.

Also coming in iOS 11: shortcuts that do a better job of recommending storage-saving features like iCloud Photo Library, which uploads all your pictures and videos to the cloud and then automatically pares down the number of images sitting on your iPhone or iPad.

Those are worthwhile improvements, but here’s something I’d sorely miss if I went back to iOS: the “free up space” feature in Android’s Photos app, which instantly zaps each and every local snapshot and video stored on your handset.

Thanks to the “free up space” feature, photos take up less than 100MB of space on my 16GB Nexus 5X. On the other hand, the Photos app on my old iPhone 6 consumes a ridiculous 17GB of storage, even with iCloud Photo Library turned on (and yes, with the Optimize iPhone Storage option enabled).

Bonus tip: The iOS version of Google Photos has a “free up space” feature just like its Android counterpart, meaning you could clear up tons of storage space on your iPhone or iPad by uploading your photos to Google and then using the “free up space” option to delete your local copies. Keep in mind, though, that if you’re using Google Photos and iCloud Photo Library at the same time, wiping your local images and videos with Google Photo’s “free up space” feature will also delete those photos from iCloud, so make sure all your local image files are safely backed up first.

Symbol shortcuts on iPhone letter keys

As with the latest version of Google Keyboard for Android, iOS 11 will bring symbol shortcuts to letter keys on the iPad keyboard, handy for saving a few keystrokes when you need to type a number key, an ampersand, or another common symbol.

Symbol shortcuts on iPhone letter keys

Ben Patterson

Thanks to iOS 11, symbol shortcuts on letter keys (shown here on Google Keyboard for Android phones) are finally coming to the iPad; not so for iPhone, unfortunately.

That’s a welcome change, but unfortunately, iOS 11’s so-called “QuickType” keyboard is only coming to iPad, not iPhone. Now, you could argue that the iPhone keypad is too small for symbol shortcuts, but the shortcuts on Google Keyboard work just fine on my five-inch Nexus 5X.


Firefox Focus Browser With Built-in Ad Blocker Comes to Android

Firefox Focus Browser With Built-in Ad Blocker Comes to Android


  • Firefox Focus now available for Android users
  • It was launched for iPhone and iPad users last year
  • It comes with built-in ad blocker

Mozilla last year launched the Firefox Focus privacy-minded browser for the iPhone and iPad. The new browser from Mozilla is finally available on Android.

Much like the iPhone and iPad version, the new Firefox Focus app for Android allows users to browse the Internet without being tracked by “tracking ads,” which essentially track user behaviour without any consent, and also slow down the Web on a mobile device. The biggest attraction of the browser is that it comes with built-in ad blocker which means it works automatically without the need to switch on the feature. Apart from blocking ad trackers, Firefox Focus can also block analytic trackers and social trackers.

Mozilla has introduced some new features to Firefox Focus for Android like ad tracker counter, which counts the number of ads that are blocked per site while using the app; disable tracker blocker, which lets users disable the tracker blocker for some sites that are not loading correctly, and notification reminder, which reminds users when the Focus browser is running in the background. The Focus browser will also users erase browsing history, passwords, and cookies with just one tap.

After being available on App Store for over six months, the Firefox Focus is now available to download via Google Play.

Barbara Bermes, Product Manager, Firefox Mobile announcing the Android availability said, “I’m thrilled to announce that we’re launching our Firefox Focus mobile app for Android. For Android users we also made Focus a great default browser experience. Since we support both custom tabs and the ability to disable the ad blocking as needed, it works great with apps like Facebook when you just want to read an article without being tracked. We built Focus to empower you on the mobile web, and we will continue to introduce new features that make our products even better.


Sega launches free retro game collection for iPhone and Android

Image result for Sega launches free retro game collection for iPhone and Android

Sega is bringing some of its best retro games to your smartphone. Today the company announced a new service called Sega Forever, which is essentially a lineup of classic games from the company that will be available on both iOS and Android. Each game will be available for free — you can pay $1.99 to turn off ads — and will include modern features like cloud saves, Bluetooth controller support, and online leaderboards. (Sega notes, however, that you can still play each game offline.)

At launch, five Sega Genesis games will be available, including the original Sonic the Hedgehog (which was already previously available on mobile), Comix Zone, Altered Beast, Kid Chameleon, and Phantasy Star II. “As the Sega Forever collection expands through months and years,” the company explains, “it will include both official emulations and ported games that pan all Sega console eras, each adapted specifically for mobile devices while remaining faithful to the original games.”

The developer says that following the launch of the first five games, additional titles will be added to the collection every two weeks. The debut Sega Forever games will launch tomorrow globally on both iOS and Android.


NEET 2017 Latest News Update: Delays and stays, here is how CBSE and HRD Ministry is trying to solve the NEET Controversies

NEET 2017, 15 June, 2017 news upate

 NEET 2017 controversies continue to increase panic among students. At present, the students who appeared in the National Eligibility cum Entrance Test on May 7 are divided into two groups. One group which is hoping that the NEET 2017 is cancelled. Another group is praying desperately for the turmoil to get over and get on with their lives. In the meanwhile, anxious parents, students and teachers keep searching for latest news update about NEET 2017. Between the delays in the NEET 2017 Results, the Stays imposed by the Madras HC and the plea pending in Supreme Court, we bring to you how CBSE and HRD Ministry is trying to solve the NEET Controversies.

That is right. Sources close to the ministry and the Central Board of Secondary Education have shared that CBSE and the HRD Ministry is working overtime to figure out the best possible solution. Though CBSE has not commented on the disparity and the controversy regarding regional language papers, it is not ignorant to the fact. While the official update is awaited from CBSE, sources have revealed that HRD Ministry has also offered to help CBSE ride through the problems. A senior official suggested that if CBSE would have been confident that cancelling the paper was the best step forward, it would have done so by now. The ambiguity of the situation where incidents were localized makes the decision to cancel the entire paper unreasonable. On the other hand, not addressing the concerns of the students voiced is also not an option. An expert panel of professors of respective subjects as well as regional language experts has been called on by the CBSE. Source reveals that the answer keys are being evaluated and concerns being marked after discussion. Related News | CBSE 12th Board Results Delay & NEET 2017 re-exam: HRD Minister Prakash Javadekar assures students of fair assessment

HRD Ministry, on the other hand is trying to reason with the various State Governments and council. Only yesterday, HRD Minister, Mr. Prakash Javadekar met with Gujarat Education Minister to discuss the matter. Around 40 students from the state had also filed a plea in the respective High Court against the difference in difficulty level. News also confirms that HRD Ministry is talking with West Bengal to understand the concern and find a solution.

In the meanwhile, CBSE is troubled with releasing multiple results including the CBSE Class 12 Board Results 2017. The results are also delayed due to on-going row over moderation. The many concerns at the Board are keeping the Chairman and the Core Committee very busy, commented an official who did not wish to be named. CBSE only has the best interests of the student at its heart and would do whatever it takes to find a solution that best fits all. An expert has reiterated that cancelling NEET 2017 may not be the best solution. CBSE is mindful of the concerns and is contemplating releasing the NEET 2017 Answer Keys and OMR Sheets soon to further the process.

However the events turn out, what is clear is that with each passing day, the anxiety increases. The fate of around 12 lakh students from across the country hangs in the balance while the controversies are sorted out. Supreme Court is all set to hear a plea by an NGO to cancel NEET 2017 next week. How the events unfold would be shared with you. The status at present is in utter chaos. There is no confirmation or affirmation from CBSE in regards. Also read |NEET 2017 to be cancelled? SC to hear please next week.

NEET or National Eligibility cum Entrance Test was conducted by CBSE on May 7, 2017. The examination is the entrance criteria for MBBS and BDS courses across all private and government Medical and Dental Colleges in the country. The controversies that arose immediately afterwards have caused delay in the process. CBSE was to release the NEET 2017 Answer Keys by May 20 and the NEET 2017 Results by June 8, as per initial updates. However, NEET 2017 Results have been stayed by Madras HC till June 7. Whether it would cause a delay in NEET 2017 Answer Keys or not is not certain. In the meanwhile, a plea is being prepared to be presented in Supreme Court, asking for NEET 2017 to be cancelled. Stay updated with the latest news, videos and updates about National Eligibility cum Entrance Test here.


Ransomware attack needs global solution

WannaCry is a computer worm, which locks up computers until a ransom is paid.

WannaCry is a computer worm, which locks up computers until a ransom is paid.

OPINION: Last weekend’s global ransomware attack, “WannaCry”, has raised many questions – from quirky economics questions such as “Is $300 just the right amount for a ransom?” to “Should we pay the ransom?” What we do know is that the malicious software has now spread to at least 150 countries, with reports of serious impacts on the National Health Service (NHS) in the UK, and a range of other government and private sector activity, including reported impacts on big companies like Telefonica, FedEx Corp. and the French car manufacturer Renault.

New Zealand appears to have avoided the worst effects so far, with Russia, India, Spain, Taiwan and Ukraine some of the most affected countries. The computer worm, which locks up computers until a ransom is paid, is expected to infect millions more computer systems in the coming days through newly emerged variants, and will likely cause direct and indirect costs running into the billions of dollars globally.

There are some basic but important lessons that we can learn from the attack, even at this early stage. First, there are still many computers using Windows XP, which was discontinued by Microsoft since 2014. Discontinuation means that in the time between 2014 until now, there have been no security updates to patch the holes discovered in the system – leaving open doors for hackers to enter into. What is truly scary is that 95% of ATMs in the world are still running Windows XP. Imagine the field-day the hackers can have when they can access the ATMs. In fact, the late Kiwi hacker Barnaby Jack demonstrated how to spew cash from the ATMs through a simple hack at the hacker conference Black Hat 2010. In the last few days as a global response to the attack, Microsoft (finally) released software updates for all old Windows systems including Windows XP and Windows 2003.

Cyber security researchers say North Korea might be linked to the WannaCry ransomware cyber attack that has infected ...

Cyber security researchers say North Korea might be linked to the WannaCry ransomware cyber attack that has infected more than 300,000 computers worldwide.

This brings us to the second point. When it threatens their business reputation, software companies can offer software updates to very old software just to save the day (and their reputation). Microsoft has successfully demonstrated their true capability in doing just that.

Third, despite the importance of data, many people do not back up their data in external hard drives, cloud computing environments such as Dropbox, or other computers. This basic human flaw has been a huge enabler of these types of ransomware attacks.

Fourth, attributing attackers is a difficult problem in cyber space. That said, the WannaCry hackers may not be as sophisticated as the original writers of the USA National Security Agency (NSA) cyber weapons this ransomware is based upon. When the vigilante group Shadow Brokers released the leaks about these NSA cyber weapons, it was only a matter of time before some malicious party modified this software into a malware. This has happened in the past with other global attacks such as the Blaster worm more than a decade ago.

In WannaCry, hackers left behind a few trails, such as a URL which serves as a kill-switch to stop the spread of the ransomware, and patterns which shows a certain style of software coding. Some researchers from Google suspect that this is linked to North Korea, due to the coding style bearing similarity to the notorious Lazarus group, responsible for hacks into South Korea (2013 DarkSeoul operation) and the Sony Pictures hack in 2014.

These issues aside, the crisis demonstrates the dangers posed by a growing tendency in national security establishments to develop “cyber weapons” that can be used to disrupt and destroy computer systems, and the corresponding need for enhanced global co-operation on cyber security threats.

Since the terrorist attacks on 9/11, the NSA has taken a lead role in developing offensive cyber weapons to deploy against foreign adversaries. This has been widely revealed through leaks by WikiLeaks, Edward Snowden and others. The problem is these capabilities can be hacked themselves. As with most weapons, they can also be used back against us and we witnessed this irony in WannaCry.

The proliferation of malicious cyber tools from states to non-state actors is as much of a danger as the collateral damage that malicious software can cause. The malware used in the infamous Stuxnet attack against Iranian nuclear centrifuges, likely by the US and Israel, spread to more than 60 countries and is still being modified and used for malicious purposes. It is very difficult to isolate targets when using offensive cyber capabilities without that malware spreading and/or being reverse engineered. Those states that are at the cutting edge of developing malicious cyber tools should expect to become more likely targets for hackers themselves.

Another major problem, which can only be solved by global cyber co-operation, is information sharing. In the case at hand it appears that the NSA knew about the existence of the Windows software vulnerability that has been so ruthlessly exploited, but did not disclose that information until it was too late. The need for governments to share information with the private sector and vice versa also happens too slowly in many cases. This lack of trust and transparency has been a feature of the way cyber security has been dealt with and has precluded effective cross-sector responses to cyber security issues. A global information sharing platform may be needed to immunise the impacts of these types of cyber attacks.

A final problem is the lack of global investment in cyber security in both the government and private sectors. The political row that has erupted in the UK over investment in NHS digital infrastructure is noteworthy in this context. When public sector organisations are starved of funding there is little incentive to invest in upgraded software and hardware. If some NHS computers were not operating on outdated Windows XP operating systems then the effects on the NHS’s ability to keep frontline services running, including X-ray and chemotherapy services, might have been less severe.

The New Zealand government has done a great job in that respect by recognising the need for sustained funding for cyber security research such as STRATUS ) and has taken big strides in recent years in enhancing our own cyber security capabilities and institutions, including the recent establishment of our own national Computer Emergency Response Team (CERT NZ). However, these kinds of cyber attacks cannot be dealt with by countries working in isolation. The global ransomware attack demonstrates a pressing need for global solutions.


Why the solution to ransomware may be predictive analytics

Ransomware is quickly becoming a problem for both businesses and personal computer users. It is also becoming more sophisticated; users may not even have to click or download something to become victim to this scam. Ransomware can spread between networked PCs and servers quite quickly, which leaves the owners of these machines at the mercy of hackers demanding money for access to the owner’s’ most valuable files.

As these threats to steal information and hold technology hostage become more real, so does the need for a way to stop such attacks. Predictive analytics may be the key to preventing ransomware from getting a hold on computers and servers. Here are several reasons why predictive analytics may be the most essential tool to use when trying to avoid ransomware.

Predictive analytics have a good track record

It may be a new tool in the fight against hacking, but predictive analytics have actually been used by the U.S. military to combat cyber threats and to make real world decisions. They have used predictive analytics to help them dive through massive amounts of data in order to make better and more informed decisions about the possible tactics they will use.

This data can include things like past military engagements, social and economic factors and a myriad of other information. Diving through this data by hand would take an incredible amount of time, but with predictive analytics, they have been able to drill down to the most essential predictive data. The military has used this information to prepare for eventualities they may not have seen coming otherwise, which in turn helps avoid costly mistakes.

Predictive analytics stops the problem before it starts

Traditional antivirus programs treat often the problem after it has already infected your computer. Many of these programs do have some preventive options, but they often rely on their users to avoid viruses and hacking programs.

As malware and ransomware evolve, avoidance is becoming trickier, since some ransomware is able to infect a computer without the user making grave errors.  Though human intervention may still be required, predictive analytics can empower users and companies with the information they need to steer clear of the potential threats that ransomware can pose.

It can be used on large, complicated systems

Though ransomware can affect individual users, this kind of malware tends to target larger collectives of users, like companies or parts of the government. The larger the network, the harder it can be to protect that network against cyber threats. Predictive analytics can easily be used on large networks, because it can be modified to dig through large amounts of data. Once that data is analysed, it can be turned over to IT employees and from there, who can further analyse the essential data and ensure that their company or department is safe against ransomware and other threats.

The cost of this technology has also gone down over the last several years, like with converged systems and the hybrid cloud, so it has become a much more cost effective way to deal with problems like ransomware. This decrease in cost has also caused more cyber security companies to start adding predictive analytics to the list of solutions they offer their clients.

Ransomware is evolving constantly

10 years ago, few people knew what ransomware was. Now it is not only making real world headlines, but has also been the main plot point in many TV shows and movies, making it a household name. As people try to stop its effects, hackers using this technology will ensure that ransomware evolves to overcome such defences. Most current cyber defences are mato defeat current versions of ransomware, but they are not made to defeat evolved versions of it.

Predictive analytics is able to account for this evolution. It can be used to predict what sorts of evolutions may occur and then those predictions can be used to avoid the next-generation of ransomware or other malware. It is also very likely that as other preventative software evolves to stop things like ransomware, that predictive analytics will continue to be a part of these steps to ensure cyber safety.

Though ransomware may not be going away anytime soon, we may see its negative impact lessening as more government departments and private companies invest in solutions that include predictive analytics.

By using predictive analytics to explore exploitative eventualities, companies can solve more complex problems that threaten the security of their computers and the security of their networks.


Server General Announces a Key Management Service for MySQL Customers

Cloud MySQL ServerServer General Inc., a pioneer in data security, today announced the availability of Server General KMS™ for MySQL, a fully managed key management service for customers who want to encrypt their MySQL data using the embedded encryption functionality available within their MySQL database servers.

“Up until now customers had two choices – leave the MySQL master encryption key on the server or buy an expensive key vault to store their encryption keys. Our service empowers customers to save money while ensuring the highest levels of security for their encryption keys,” said Raj Sharma, CEO, Server General Inc.

Server General KMS for MySQL is a pay as-you-go service that starts at $199.99/server/month. The service relieves customers of having to worry about scalability and availability issues related to key management while ensuring the ultimate protection for their MySQL encryption keys. Customers also have the option of deploying a managed on-premises key locker appliance to store their keys.

“Our customers want to control their own encryption keys at all times,” said Gahn Lane, VP, Software Industry at CenturyLink. “But they don’t want to set up a key management infrastructure. That’s where Server General KMS comes in. We are happy that our customers will be among the first to get automated access to this capability through the CenturyLink Cloud Marketplace.”

The Server General KMS service is ideal for small-to-medium sized businesses that use or want to use encryption capabilities of their MySQL server to satisfy HIPAA, PCI GDPR requirements.

ClickToTweet: .@CenturyLink customers can now control their own encryption keys no matter where their servers are hosted with help of @ServerGeneral KMS http://ctt.ec/sO4U7

A photo accompanying this release is available at http://www.globenewswire.com/NewsRoom/AttachmentNg/abc20f15-0fbf-42aa-a67f-869e812ac125

The key benefits of using Server General KMS for MySQL service are:

  • Encrypt MySQL data quickly
  • Eliminate your key and log management headaches
  • Comply with PCI, HIPAA, and GDPR with ease

The service is available now. Click here to store the first MySQL master encryption key for free.

About Server General:
Server General is a data encryption and key management service that enables customers to protect their sensitive information. The service can be used on any cloud platform. Customers retain full control over their own encrypted data and the associated encryption keys. Server General Inc. is based in New York, USA.


MySQL devs take cache behind shed, shot heard

Image result for MySQL devs take cache behind shed, shot heardThe developers of MySQL Server have decided its Query Cache feature is a bottleneck and killed it off.

Looking over the number of results (and the diversity of advice offered) if you search “tuning MySQL query cache”, it’s not entirely surprising.

The problem is scalability, as MySQL Server product manager Morgan Tocker writes here.

The operation of the cache looks simple enough: SELECT commands are stored in a hash table, and if a incoming query matches the hash, the server can return the results from the last time the query executed (with protection so the server doesn’t return stale results).

The problem, Tocker writes, is that the cache “is known not to scale with high-throughput workloads on multi-core machines”.

Even if that could be fixed, he continues, the fix wouldn’t make the query cache’s performance more predictable, and that’s often more important than peak throughput for user-facing systems.

Instead of persisting with fixing the cache, MySQL Server’s developers have decided “to invest in improvements that are more generally applicable to all workloads.”

Developers who need caching can use ProxySQL, and other users upgrading to MySQL 8.0 “will be encouraged to use either Server-side Query Rewrite”. ®


How to connect LibreOffice Base to a remote MySQL database


Image: Jack Wallen

LibreOffice Base is a user-friendly GUI tool that makes working with databases fairly simple. The tool has the built-in ability to work on both local databases or even remote databases. However, when you attempt to connect to a remote MySQL database server, you’ll run into a couple of issues. I’m going to show you how to overcome those problems, so you can work with your remote MySQL databases with ease.

I’ll be demonstrating with LibreOffice on the client side and MySQL 5.7.17 running on Ubuntu Server 16.04.

Configuring the server

The first thing you must do is enable remote connections on your server. To do this, log into your MySQL server, change to the /etc/mysql/mysql.conf.d/ directory, and open the file mysql.cnf for editing. Locate the line:


Change the above line to:


Save and close that file. Now, restart MySQL with the command:

systemctl restart mysql.service

Once the service successfully restarts, you’re done on the server.

Configuring LibreOffice

Out of the box, LibreOffice does not have a functioning JDBC Connector. To add this, you must first download the Platform Independent connector (from the MySQL Downloads page) and then extract that file. The extraction will create a new folder that contains the necessary .jar file. Open up LibreOffice and go to Tools | Options | LibreOffice | Advanced | Class Path (Figure A).

Figure A

Figure A

Adding the JDBC Connector to LibreOffice.

In the resulting window, click the Add Archive button and then navigate to the folder containing the .jar file. Select the mysql-connector-java-XXX-bin.jar file (where XXX is the release number) and click OK. Click OK to exit out of the Options window and you’re ready to connect to your remote database.

Connecting to the remote database

Open up LibreOffice Base and the database wizard will start. From the window, select Connect to an existing database and, from the drop-down, select MySQL. Click Next and then make sure Connect using JDBC is selected (Figure B).

Figure B

Figure B

You must connect to your remote MySQL database using JDBC.

Click Next and then fill out the necessary information for your remote MySQL database (Figure C).

Figure C

Figure C

Adding the information for your remote connection.

You must know the name of the database you want to work with and the IP address of your MySQL server (enter that address for the Server option). Once you’ve filled out this section, click the Test Class button to make sure the JDBC driver is functioning. This should pass. Click Next and, in the resulting window, enter the MySQL user name that has proper privileges to work with the database in question. Click the checkbox for Password required and click the Test Connection button. When prompted, type the password for the MySQL user and click OK. This test should also pass. Click Next and then click Finish. You will then be prompted to save a local copy of the database. Don’t worry, any work you do will be reflected on both the local and remote copies of the database. When you’re finished with the wizard, LibreOffice base will open, ready to work on the remote database.

Congratulations, you’ve successfully connected LibreOffice Base to a remote MySQL database.

Power made simple

If you’ve ever needed to work with MySQL, but didn’t want to have to tackle the command line, you now have the ability to manage your databases with the help of a powerful, user-friendly GUI tool. That is power made simple.


How a property management company helps with quality renters

Image result for How,a,property,management,company,helps,with,quality,renters

One of the most important tasks of a property investor is to find an excellent tenant to fill his vacancy. What makes a tenant excellent is his ability to pay the rent on time and to take care of the property like an ordinary prudent man would take, if the property would have been his own.

According to experts, placing a quality tenant is more important in a property than an old saying of location, location and location when investing in a rental property market. A professional property management company will not only find you quality renters who will pay rent on time but also who will take care of the property and prevent it from any harm like their own.

Property management companies do everything in their power to make the dream tenant a reality. Some of the most important steps a firm can take to protect you and your investment are highlighted ahead.

The primary step to finding a quality renter is a screening process. A reputable property management company will utilize a nationwide screening company to ensure that the most qualified candidates are found. When screening a potential renter several factors come into play like criminal records, any pending court proceeding, credit history, past evictions etc. by thoroughly researching potential tenants, one can feel confident while allowing him to stay at his space.

The property management’s ability to take applications online 24/7, they are able to swiftly process applications received and get a quality tenant in the property faster than any landlord. It also allows the landlord to save the time and energy which will enable him to focus on more important things which needs his consideration.

A reputable property management company will also likely have a marketing department that will utilize as many resources possible to reach potential renters. This is usually important as quality renters seek out a reputable company that appears more legitimate rather than work with an individual one on one. With ongoing marketing process quality renters will move towards properties represented by the professional property management company.

A good property management company will always follow the code of ethics while dealing with their clients. They will treat the tenants with utmost respect and address their needs swiftly. Their ultimate aim should be to make the tenants feel that the home they buy is more than just a place to hang their hat, they should care for the property as much as their own.

By working with the tenant, a property management company helps to keep the tenant happy and willing to do little extras that keep up your investment. It is not possible for many investors and landlords to build this kind of relationship themselves. Hence, by letting the management company take over the work, you can save abundant time and money.

Lastly, keeping a good quality and excellent tenant can increase the chance of renewal, which in turn will keep the cost down and keep steady stream of income from the reliable tenant.