IT service management

COBIT versus ITIL April 6, 2014 By Stephen.Ibaraki Microsoft MVP Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their … Continue reading “IT service management”

COBIT versus ITIL

Enterprises need to govern and manage their information and related technology assets and resources, and those arrangements customarily include both internal and external services to satisfy specific stakeholder needs. COBIT 5 aims primarily to guide enterprises on the implementation, operation and, where required, improvement of their overall arrangements relating to governance and management of enterprise IT (GEIT). ITIL provides guidance and good practice for IT service providers for the execution of IT service management from the perspective of enabling business value.

COBIT 5 describes the principles and enablers that support an enterprise in meeting stakeholder needs, specifically those related to the use of IT assets and resources across the whole enterprise. ITIL describes in more detail those parts of enterprise IT that are the service management enablers (process activities, organizational structures, etc.).

Generally speaking:

· COBIT is broader than ITIL in its scope of coverage (GEIT). It is based on five principles (meeting stakeholder needs; covering the enterprise end to end; applying a single, integrated framework; enabling a holistic approach; and separating governance from management) and seven enablers (principles, policies and frameworks; processes; organizational structures; culture, ethics and behavior; information; services, infrastructure and applications; people, skills and competencies).

· ITIL focuses on ITSM and provides much more in-depth guidance in this area, addressing five stages of the service life cycle: service strategy, service design, service transition, service operation and continual service improvement.

Also, COBIT and ITIL are well aligned in their approach to ITSM. The COBIT 5 Process Reference Model, as documented in COBIT 5: Enabling Processes, maps closely to the ITIL v3 2011 stages.

The distinction between the two is sometimes described as “COBIT provides the ‘why’; ITIL provides the ‘how.’” While catchy, that view is simplistic and seems to force a false “one or the other” choice. It is more accurate to state that enterprises and IT professionals who need to address business needs in the ITSM area would be well served to consider using both COBIT and ITIL guidance. Leveraging the strengths of both frameworks, and adapting them for their use as appropriate, will aid in solving business problems and supporting business goals achievement.

Root your Android 4.4 KitKat

How to Root your Android 4.4 KitKat device using TowelRoot Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app. Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root … Continue reading “Root your Android 4.4 KitKat”

How to Root your Android 4.4 KitKat device using TowelRoot

Step 1: Head over to TowelRoot.com and click on the lambda icon to download the TowelRoot app.
Step 2: Install the TowelRoot app on your phone and open it. Tap on “ Make it Ra1n” and wait for a few seconds for the app to root your phone.

installing-towelroot

Agile management

Agile management, or agile process management, or simply agile refer to an iterative, incremental method of managing the design and build activities for engineering, information technology, and other business areas that aims to provide new product or service development in a highly flexible and interactive manner; an example is its application in Scrum, an original … Continue reading “Agile management”

Agile management, or agile process management, or simply agile refer to an iterative, incremental method of managing the design and build activities for engineering, information technology, and other business areas that aims to provide new product or service development in a highly flexible and interactive manner; an example is its application in Scrum, an original form of agile software development.[1] It requires capable individuals from the relevant business, openness to consistent customer input, and management openness to non-hierarchical forms of leadership. Agile can in fact be viewed as a broadening and generalization of the principles of the earlier successful array of Scrum concepts and techniques to more diverse business activities. Agile also traces its evolution to a “consensus event”, the publication of the “Agile manifesto“, and it has conceptual links to lean techniques, kanban (????(??)?), and the Six Sigma area of business ideas.[1]

Agile X techniques may also be called extreme process management. It is a variant of iterative life cycle[2] where deliverables are submitted in stages. The main difference between agile and iterative development is that agile methods complete small portions of the deliverables in each delivery cycle (iteration)[3] while iterative methods evolve the entire set of deliverables over time, completing them near the end of the project. Both iterative and agile methods were developed as a reaction to various obstacles that developed in more sequential forms of project organization. For example, as technology projects grow in complexity, end users tend to have difficulty defining the long term requirements without being able to view progressive prototypes. Projects that develop in iterations can constantly gather feedback to help refine those requirements. According to Jean-Loup Richet (Research Fellow at ESSEC Institute for Strategic Innovation & Services) “this approach can be leveraged effectively for non-software products and for project management in general, especially in areas of innovation and uncertainty. The end result is a product or project that best meets current customer needs and is delivered with minimal costs, waste, and time, enabling companies to achieve bottom line gains earlier than via traditional approaches.[4] Agile management also offers a simple framework promoting communication and reflection on past work amongst team members.[5]

Agile methods are mentioned in the Guide to the Project Management Body of Knowledge (PMBOK Guide) under the Project Lifecycle definition:

Adaptive project life cycle, a project life cycle, also known as change-driven or agile methods, that is intended to facilitate change and require a high degree of ongoing stakeholder involvement. Adaptive life cycles are also iterative and incremental, but differ in that iterations are very rapid (usually 2-4 weeks in length) and are fixed in time and resources.[6]

Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s … Continue reading Tor

Tor is free software for enabling anonymous communication. The name is an acronym derived from the original software project name The Onion Router,[7] however the correct spelling is “Tor”, capitalizing only the first letter.[8] Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays[9] to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult for Internet activity to be traced back to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[10] Tor’s use is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Onion routing is implemented by encryption in the application layer of a communication protocol stack, nested like the layers of anonion. Tor encrypts the data, including the destination IP address, multiple times and sends it through a virtual circuit comprising successive, randomly selected Tor relays. Each relay decrypts a layer of encryption to reveal only the next relay in the circuit in order to pass the remaining encrypted data on to it. The final relay decrypts the innermost layer of encryption and sends the original data to its destination without revealing, or even knowing, the source IP address. Because the routing of the communication is partly concealed at every hop in the Tor circuit, this method eliminates any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

An adversary might try to de-anonymize the user by some means. One way this may be achieved is by exploiting vulnerable software on the user’s computer.[11] The NSA has a technique that targets outdated Firefox browsers codenamed EgotisticalGiraffe,[12] and targets Tor users in general for close monitoring under its XKeyscore program.[13] Attacks against Tor are an active area of academic research,[14][15] which is welcomed by the Tor Project itself.[16]

Theo Jansen’s Strandbeests

“A living being, but not alive.” The Dutchman artist Theo Jansen creates these structures which move through the strength of the winds. He uses wood, PET bottles and rags to transform wind energy in a synchronized motion that looks like their creations have a life of its own! Sensational! Posted by The Mind Unleashed on … Continue reading Theo Jansen’s Strandbeests

“A living being, but not alive.” The Dutchman artist Theo Jansen creates these structures which move through the strength of the winds. He uses wood, PET bottles and rags to transform wind energy in a synchronized motion that looks like their creations have a life of its own! Sensational!

Posted by The Mind Unleashed on Friday, November 28, 2014

ITIL

ITIL, formerly known as the Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published as a series of five core volumes, each of which covers a different … Continue reading ITIL

ITIL, formerly known as the Information Technology Infrastructure Library, is a set of practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. In its current form (known as ITIL 2011 edition), ITIL is published as a series of five core volumes, each of which covers a different ITSM lifecycle stage. Although ITIL underpins ISO/IEC 20000 (previously BS15000), the International Service Management Standard for IT service management, there are some differences between the ISO 20000 standard and the ITIL framework.

ITIL describes processes, procedures, tasks, and checklists which are not organization-specific, but can be applied by an organization for establishing integration with the organization’s strategy, delivering value, and maintaining a minimum level of competency. It allows the organization to establish a baseline from which it can plan, implement, and measure. It is used to demonstrate compliance and to measure improvement.

Since July 2013, ITIL has been owned by AXELOS Ltd, a joint venture between HM Cabinet Office and Capita Plc. AXELOS licenses organisations to use the ITIL intellectual property, accredits licensed Examination Institutes, and manages updates to the framework.

Solved game

From Wikipedia, the free encyclopedia A solved game is a game whose outcome (win, lose, or draw) can be correctly predicted from any position, given that both players play perfectly. Games which have not been solved are said to be “unsolved”. Games for which only some positions have been solved are said to be “partially … Continue reading Solved game

A solved game is a game whose outcome (win, lose, or draw) can be correctly predicted from any position, given that both players play perfectly. Games which have not been solved are said to be “unsolved”. Games for which only some positions have been solved are said to be “partially solved”. This article focuses on two-player games that have been solved.

A two-player game can be “solved” on several levels:[1][2]

Ultra-weak

Prove whether the first player will win, lose, or draw from the initial position, given perfect play on both sides. This can be a non-constructive proof (possibly involving astrategy-stealing argument) that need not actually determine any moves of the perfect play.

Weak

Provide an algorithm that secures a win for one player, or a draw for either, against any possible moves by the opponent, from the beginning of the game. That is, produce at least one complete ideal game (all moves start to end) with proof that each move is optimal for the player making it. It does not necessarily mean a computer program using the solution will play optimally against an imperfect opponent. For example, the checkers program Chinook will never turn a drawn position into a losing position (since the weak solution of checkers proves that it is a draw), but it might possibly turn a winning position into a drawn position because Chinook does not expect the opponent to play a move that will not win but could possibly lose, and so it does not analyze such moves completely.

Strong

Provide an algorithm that can produce perfect play (moves) from any position, even if mistakes have already been made on one or both sides.

Despite the name, many game theorists believe that “ultra-weak” are the deepest, most interesting and valuable proofs. “Ultra-weak” proofs require a scholar to reason about the abstract properties of the game, and show how these properties lead to certain outcomes if perfect play is realized.[citation needed]

By contrast, “strong” proofs often proceed by brute force — using a computer to exhaustively search a game tree to figure out what would happen if perfect play were realized. The resulting proof gives an optimal strategy for every possible position on the board. However, these proofs aren’t as helpful in understanding deeper reasons why some games are solvable as a draw, and other, seemingly very similar games are solvable as a win.

Given the rules of any two-person game with a finite number of positions, one can always trivially construct a minimax algorithm that would exhaustively traverse the game tree. However, since for many non-trivial games such an algorithm would require an infeasible amount of time to generate a move in a given position, a game is not considered to be solved weakly or strongly unless the algorithm can be run by existing hardware in a reasonable time. Many algorithms rely on a huge pre-generated database, and are effectively nothing more.

As an example of a strong solution, the game of tic-tac-toe is solvable as a draw for both players with perfect play (a result even manually determinable by schoolchildren). Games like nim also admit a rigorous analysis using combinatorial game theory.

Whether a game is solved is not necessarily the same as whether it remains interesting for humans to play. Even a strongly solved game can still be interesting if its solution is too complex to be memorized; conversely, a weakly solved game may lose its attraction if the winning strategy is simple enough to remember (e.g. Maharajah and the Sepoys). An ultra-weak solution (e.g. Chomp or Hex on a sufficiently large board) generally does not affect playability.

In non-perfect information games, one also has the notion of essentially weakly solved[3]. A game is said to be essentially weakly solved if a human lifetime of play is not sufficient to establish with statistical significance that the strategy is not an exact solution. As an example, the poker variation heads-up limit Texas hold ‘em have been essentially weakly solved by the poker bot Cepheus[3][4][5].

Perfect play

In game theory, perfect play is the behavior or strategy of a player that leads to the best possible outcome for that player regardless of the response by the opponent. Based on the rules of a game, every possible final position can be evaluated (as a win, loss or draw). By backward reasoning, one can recursively evaluate a non-final position as identical to that of the position that is one move away and best valued for the player whose move it is. Thus a transition between positions can never result in a better evaluation for the moving player, and a perfect move in a position would be a transition between positions that are equally evaluated. As an example, a perfect player in a drawn position would always get a draw or win, never a loss. If there are multiple options with the same outcome, perfect play is sometimes considered the fastest method leading to a good result, or the slowest method leading to a bad result.

Perfect play can be generalized to non-perfect information games, as the strategy that would guarantee the highest minimal expected outcome regardless of the strategy of the opponent. As an example, the perfect strategy for Rock, Paper, Scissors would be to randomly choose each of the options with equal (1/3) probability. The disadvantage in this example is that this strategy will never exploit non-optimal strategies of the opponent, so the expected outcome of this strategy versus any strategy will always be equal to the minimal expected outcome.

Although the optimal strategy of a game may not (yet) be known, a game-playing computer might still benefit from solutions of the game from certain endgame positions (in the form of endgame tablebases), which will allow it to play perfectly after some point in the game. Computer chess programs are well known for doing this.

Solved games

Awari (a game of the Mancala family)
The variant of Oware allowing game ending “grand slams” was strongly solved by Henri Bal and John Romein at the Vrije Universiteit in Amsterdam, Netherlands (2002). Either player can force the game into a draw.
Checkers
See “Draughts, English”
Chopsticks
The second player can always force a win.[6]
Connect Four
Solved first by James D. Allen (Oct 1, 1988), and independently by Victor Allis (Oct 16, 1988).[7] First player can force a win. Strongly solved by John Tromp’s 8-ply database[8](Feb 4, 1995). Weakly solved for all boardsizes where width+height is at most 15[7] (Feb 18, 2006).
Draughts, English (Checkers)
This 8×8 variant of draughts was weakly solved on April 29, 2007 by the team of Jonathan Schaeffer, known for Chinook, the “World Man-Machine Checkers Champion“. From the standard starting position, both players can guarantee a draw with perfect play.[9] Checkers is the largest game that has been solved to date, with a search space of 5×1020.[10] The number of calculations involved was 1014, which were done over a period of 18 years. The process involved from 200 desktop computers at its peak down to around 50.[11]

The game of checkers has roughly 500 billion billion possible positions (5 × 1020). The task of solving the game, determining the final result in a game with no mistakes made by either player, is daunting. Since 1989, almost continuously, dozens of computers have been working on solving checkers, applying state-of-the-art artificial intelligence techniques to the proving process. This paper announces that checkers is now solved: Perfect play by both sides leads to a draw. This is the most challenging popular game to be solved to date, roughly one million times as complex as Connect Four. Artificial intelligence technology has been used to generate strong heuristic-based game-playing programs, such as Deep Blue for chess. Solving a game takes this to the next level by replacing the heuristics with perfection.

Unicode

Unicode does not fit into 8 bits, not even into 16. Although only 110,116 code points are in use, it has the capability to define up to 1,114,112 of them, which would require 21 bits. However, computers have advanced since the 1970s. An 8 bit microprocessor is a bit out of date. New computers now […]

Unicode does not fit into 8 bits, not even into 16. Although only 110,116 code points are in use, it has the capability to define up to 1,114,112 of them, which would require 21 bits.

However, computers have advanced since the 1970s. An 8 bit microprocessor is a bit out of date. New computers now have 64 bit processors, so why can’t we move beyond an 8 bit character and into a 32 bit or 64 bit character?

The first answer is: we can!

A lot of software is written in C or C++, which supports a “wide character”. This is a 32 bit character called wchar_t. It is an extension of C’s 8 bit char type. Internally, modern Web browsers use these wide characters (or something similar) and can theoretically quite happily deal with over 4 billion distinct characters. This is plenty for Unicode. So –internally, modern Web browers use Unicode.

Unicode in chrome can be fickle, especially when working outside of the BMP.

So if browsers can deal with Unicode in 32 bit characters, where is the problem? The problem is in the sending and receiving, and reading and writing of characters.

The problem remains because:

  1. A lot of existing software and protocols send/receive and read/write 8 bit characters
  2. Using 32 bits to send/store English text would quadruple the amount of bandwidth/space required

Although browsers can deal with Unicode internally, you still have to get the data from the Web server to the Web browser and back again, and you need to save it in a file or database somewhere. So you still need a way to make 110,000 Unicode code points fit into just 8 bits.

There have been several attempts to solve this problem such as UCS2 and UTF-16. But the winner in recent years is UTF-8, which stands for Universal Character Set Transformation Format 8 bit.

UTF-8 is a clever. It works a bit like the Shift key on your keyboard. Normally when you press the H on your keyboard a lower case “h” appears on the screen. But if you press Shift first, a capital H will appear.

UTF-8 treats numbers 0-127 as ASCII, 192-247 as Shift keys, and 128-192 as the key to be shifted. For instance, characters 208 and 209 shift you into the Cyrillic range. 208 followed by 175 is character 1071, the Cyrillic ?. The exact calculation is (208%32)*64 + (175%64) = 1071. Characters 224-239 are like a double shift. 226 followed by 190 and then 128 is character 12160: ?. 240 and over is a triple shift.

UTF-8 is therefore a multi-byte variable-width encoding. Multi-byte because a single character like ? takes more than one byte to specify it. Variable-width because some characters like H take only 1 byte and some up to 4.

Best of all it is backward compatible with ASCII. Unlike some of the other proposed solutions, any document written only in ASCII, using only characters 0-127, is perfectly valid UTF-8 as well – which saves bandwidth and hassle.

Unicode chart


Three ways to enter Unicode characters in Windows

In Microsoft Word you can insert Unicode characters by typing the hex value of the character then typing Alt-x. You can also see the Unicode value of a character by placing the cursor immediately after the character and pressing Alt-x. This also works in applications that use the Windows rich edit control such as WordPad and Outlook.

First create a registry key under HKEY_CURRENT_USER of type REG_SZ called EnableHexNumpad, set its value to 1, and reboot. Then you can enter Unicode symbols by holding down the Alt key and typing the plus sign on the numeric keypad  followed by the character value. When you release the Alt key, the symbol will appear.

Another option is to install the UnicodeInput utility.


Microsoft Standard English (United States 101) Keyboard

Typing International & Special Characters using the <Alt> key and the right-side numeric keypad.
<Num Lock>key must be on!

NOTE* Not all characters are available in all font faces or in all browsers – the following table is based on the Times-New Roman or Arial font face and Internet Explorer v5.5. Consult the Microsoft Character Map to see what special characters are available for different fonts on your system. These special characters also work with the Microsoft English US-International keyboard.

Press and hold the <Alt> key while typing the numbers shown to make the special characters:
Alt 0128 Euro currency symbol Alt 0195 Ã A tilde
Alt 0131 ƒ Florin, Guilder or Gulden  Alt 0196
Alt 142
Ä A umlaut
Alt 0132 Base line double quote Alt 0197
Alt 143
Å A ring
Alt 0133 Ellipsis Alt 0198
Alt 146
Æ AE ligature
Alt 0134 Dagger Alt 0199
Alt 128
Ç C cedilla
Alt 0135 Double Dagger Alt 0200 È E grave
Alt 0136 ˆ Circumflex Alt 0201
Alt 144
É E acute
Alt 0137 Permille Alt 0202 Ê E circumflex
Alt 0138 Š S caron (hacek) Alt 0203 Ë E umlaut
Alt 0139 Left single guillemet Alt 0204  Ì I grave
Alt 0140 Œ OE ligature Alt 0205 Í I acute
Alt 0142 Ž Z caron (hacek) Alt 0206 Î I circumflex
Alt 0145 Left single quote Alt 0207 Ï I umlaut
Alt 0146 Right single quote Alt 0208 Ð Capital Eth
Alt 0147 Left double quote Alt 0209
Alt 165
Ñ N tilde
Alt 0148 Right double quote Alt 0210 Ò O grave
Alt 0149 Bullet Alt 0211 Ó O acute
Alt 0150 En dash Alt 0212 Ô O circumflex
Alt 0151 Em dash Alt 0213 Õ O tilde
Alt 0152 ˜ Tilde Alt 0214
Alt 153
Ö O umlaut
Alt 0153 Trademark Alt 0215 × Multiply sign
Alt 0154 š s caron (hacek) Alt 0216 Ø O slash
Alt 0155 Right single guillemet Alt 0217 Ù U grave
Alt 0156 œ oe ligature Alt 0218 Ú U acute
Alt 0158 ž z caron (hacek)    LINK Alt 0219 Û U circumflex
Alt 0159 Ÿ Y umlaut Alt 0220
Alt 154
Ü U umlaut
Alt 0161
Alt 173
¡ Inverted exclamation Alt 0222 Þ Capital thorn
Alt 0162
Alt 155
¢ Cent Alt 0223
Alt 225
ß Esszet
(sz ligature)
(sharp “s”)   LINK
Alt 0163
Alt 156
£ Pound sterling Alt 0224
Alt 133
à a grave
Alt 0164 ¤ Currency Alt 0225
Alt 160
á a acute
Alt 0165
Alt 157
¥ Yen Alt 0226
Alt 131
â a circumflex
Alt 0166 ¦ Broken vertical bar Alt 0227 ã a tilde
Alt 0167 § Section sign Alt 0228
Alt 132
ä a umlaut
Alt 0168 ¨ Umlaut (dieresis) Alt 0229
Alt 134
å a ring
Alt 0169 © Copyright Alt 0230
Alt 145
æ ae ligature
Alt 0170
Alt 166
ª Feminine ordinal Alt 0231
Alt 135
ç c cedilla
Alt 0171
Alt 174
« Left guillemet Alt 0232
Alt 138
è e grave
Alt 0172
Alt 170
¬ Logical Not sign Alt 0233
Alt 130
é e acute
Alt 0173 Soft hyphen (html: &shy;) Alt 0234
Alt 136
ê e circumflex
Alt 0174 ® Registered trademark Alt 0235
Alt 137
ë e umlaut
Alt 0175 ¯ Macron Alt 0236
Alt 141
ì i grave
Alt 0176
Alt 248
° Degree sign Alt 0237
Alt 161
í i acute
Alt 0177
Alt 241
± Plus or minus Alt 0238
Alt 140
î i circumflex
Alt 0178
Alt 253
² Superscript 2 Alt 0239
Alt 139
ï i umlaut
Alt 0179 ³ Superscript 3 Alt 0240 ð Small Eth
Alt 0180 ´ Acute accent Alt 0241
Alt 164
ñ n tilde
Alt 0181
Alt 230 
µ Mu or micro Alt 0242
Alt 149
ò o grave
Alt 0182 Paragraph (pilcrow) Alt 0243
Alt 162
ó o acute
Alt 0183
Alt 250
· Middle dot Alt 0244
Alt 147
ô o circumflex
Alt 0184 ¸ Cedilla mark Alt 0245 õ o tilde
Alt 0185 ¹ Superscript 1 Alt 0246
Alt 148
ö o umlaut
Alt 0186
Alt 167
º Masculine ordinal Alt 0247
Alt 246
÷ Division sign
Alt 0187
Alt 175
» Right guillemet Alt 0248 ø o slash
Alt 0188
Alt 172
¼ One quarter Alt 0249
Alt 151
ù u grave
Alt 0189
Alt 171
½ One half Alt 0250
Alt 163
ú u acute
Alt 0190 ¾ Three quarters Alt 0251
Alt 150
û u circumflex
Alt 0191
Alt 168
¿ Inverted question mark Alt 0252
Alt 129
ü u umlaut
Alt 0192 À A grave Alt 0253 ý y acute
Alt 0193 Á A acute Alt 0254 þ Lower case thorn
Alt 0194 Â A circumflex Alt 0255
Alt 152
ÿ y umlaut

Inserting characters by using hexidecimal Unicode values

If you know the *Unicode (hexadecimal) value of any character, you can use the “ALT X” keyboard shortcut to enter the character directly in your document in some programs such as Microsoft Word. This is particularly useful for all special characters that are not included in the list above (such as the R-hacek  ? (0158 ALT X )). (You must press and HOLD DOWN the “ALT” key while pressing the X)

1. Type the 4-digit Unicode (hexadecimal) value of the character, including the leading zero if applicable. (Optionally, the value string can also begin with U+)
2. Press “ALT X” – this is the ALT key and the X key at the same time.
Microsoft Word, Wordpad and some other applications will replace the string to the left of the insertion point with the character you specified.
*(Unicode: A character encoding standard developed by the Unicode Consortium. By using more than one byte to represent each character, Unicode enables almost all of the written languages in the world to be represented by using a single character set.)

http://www.alt-codes.net/

Symbol Number
? 1
? 2
? 3
? 4
? 5
? 6
7
? 8
? 9
? 10
? 11
? 12
? 13
? 14
? 15
? 16
? 17
? 18
? 19
20
§ 21
? 22
? 23
? 24
? 25
? 26
? 27
? 28
? 29
? 30
? 31
space 32
! 33
34
# 35
$ 36
% 37
& 38
39
( 40
) 41
* 42
+ 43
, 44
45
. 46
/ 47
0 48
1 49
2 50
3 51
4 52
5 53
6 54
7 55
8 56
9 57
: 58
; 59
< 60
= 61
> 62
? 63
@ 64
A 65
B 66
C 67
D 68
E 69
F 70
G 71
H 72
I 73
J 74
K 75
L 76
M 77
N 78
O 79
P 80
Q 81
R 82
S 83
T 84
U 85
Symbol Number
V 86
W 87
X 88
Y 89
Z 90
[ 91
\ 92
] 93
^ 94
_ 95
` 96
a 97
b 98
c 99
d 100
e 101
f 102
g 103
h 104
i 105
j 106
k 107
l 108
m 109
n 110
o 111
p 112
q 113
r 114
s 115
t 116
u 117
v 118
w 119
x 120
y 121
z 122
{ 123
| 124
} 125
~ 126
? 127
Ç 128
ü 129
é 130
â 131
ä 132
à 133
å 134
ç 135
ê 136
ë 137
è 138
ï 139
î 140
ì 141
Ä 142
Å 143
É 144
æ 145
Æ 146
ô 147
ö 148
ò 149
û 150
ù 151
ÿ 152
Ö 153
Ü 154
¢ 155
£ 156
¥ 157
? 158
ƒ 159
á 160
í 161
ó 162
ú 163
ñ 164
Ñ 165
ª 166
º 167
¿ 168
? 169
¬ 170
Symbol Number
½ 171
¼ 172
¡ 173
« 174
» 175
? 176
? 177
? 178
? 179
? 180
? 181
? 182
? 183
? 184
? 185
? 186
? 187
? 188
? 189
? 190
? 191
? 192
? 193
? 194
? 195
? 196
? 197
? 198
? 199
? 200
? 201
? 202
? 203
? 204
? 205
? 206
? 207
? 208
? 209
? 210
? 211
? 212
? 213
? 214
? 215
? 216
? 217
? 218
? 219
? 220
? 221
? 222
? 223
? 224
ß 225
? 226
? 227
? 228
? 229
µ 230
? 231
? 232
? 233
? 234
? 235
? 236
? 237
? 238
? 239
? 240
± 241
? 242
? 243
? 244
? 245
÷ 246
? 247
° 248
? 249
· 250
? 251
? 252
² 253
? 254
255

End of the alt key codes list.

Table A-1. Latin letters and ligatures

Name of character Alt-X Alt-n Word HTML Notes
Á A with acute c1 0193 Ctrl-’ A &Aacute; Note 1
? A with breve 102 258 &#258;
 A with circumflex c2 0194 Ctrl-Shift-6 A &Acirc; Note 1
Ä A with dieresis c4 0196 Ctrl-Shift-; A &Auml; Note 1
À A with grave c0 0192 Ctrl-` A &Agrave; Note 1
? A with macron 100 256 &#256;
? A with ogonek 104 260 &#260;
Å A with ring c5 0197 Ctrl-Shift-2 A &Aring; Note 1
? A with ringand acute 1fa 506 &#506;
à A with tilde c3 0195 Ctrl-~ A &Atilde; Note 1
Æ AE c6 0198 Ctrl-Shift-7 A &AElig; Note 1
? AE with acute 1fc 508 &#508;
? C with acute 106 262 &#262;
? C with caron 10c 268 &#268;
Ç C with cedilla c7 0199 Ctrl-, C &Ccedil;
? C with circumflex 108 264 &#264;
? C with dot above 10a 266 &#266;
? D with caron 10e 270 &#270;
? D with stroke 110 272 &#272; Croatian
Ð Eth d0 0208 Ctrl-’ D &ETH; Icelandic
É E with acute c9 0201 Ctrl-’ E &Eacute; Note 1
? E with breve 114 276 &#276;
? E with caron 11a 282 &#282;
Ê E with circumflex ca 0202 Ctrl-Shift-6 E &Ecirc; Note 1
Ë E with dieresis cb 0203 Ctrl-Shift-; E &Euml; Note 1
? E with dot above 116 278 &#278;
È E with grave c8 0200 Ctrl-` E &Egrave; Note 1
? E with macron 112 274 &#274;
? E with ogenek 118 280 &#280;
? G with breve 11e 286 &#286;
? G with cedilla 122 290 &#290;
? G with circumflex 11c 284 &#284;
? G with dot above 120 288 &#288;
? H with circumflex 124 292 &#292;
? H with stroke 126 294 &#294; Maltese
Í I with acute cd 0205 Ctrl-’ I &Iacute; Note 1
? I with breve 12c 300 &#300;
Î I with circumflex ce 0206 Ctrl-Shift-6 I &Icirc; Note 1
Ï I with dieresis cf 0207 Ctrl-Shift-; I &Iuml; Note 1
? I with dot above 130 304 &#304;
Ì I with grave cc 0204 Ctrl-` I &Igrave; Note 1
? I with macron 12a 298 &#298;
? I with ogonek 12e 302 &#302;
? I with tilde 128 296 &#296;
? ligature IJ 132 306 &#306; Dutch
? J with circumflex 134 308 &#308;
? K with cedilla 136 310 &#310;
? L with acute 139 313 &#313;
? L with caron 13d 317 &#317;
? L with cedilla 13b 315 &#315;
? L with middle dot 13f 319 &#319;
? L with stroke 141 321 &#321; Polish
? N with acute 143 323 &#323;
? N with caron 147 327 &#327;
? N with cedilla 145 325 &#325;
Ñ N with tilde d1 0209 Ctrl-Shift-` N &Ntilde; Note 1
? Eng 14a 330 &#330; Sámi
Ó O with acute d3 0211 Ctrl-’ O &Oacute; Note 1
? O with breve 14e 334 &#334;
Ô O with circumflex d4 0212 Ctrl-Shift-6 O &Ocirc; Note 1
Ö O with dieresis d6 0214 Ctrl-Shift-; O &Ouml; Note 1
? O with double acute 150 336 &#336; Hungarian
Ò O with grave d2 0210 Ctrl-` O &Ograve; Note 1
? O with macron 14c 332 &#332;
Ø O with obliquestroke d8 0216 Ctrl-/ O &Oslash; Danish
? O with stroke andacute 1fe 510 &#510;
Õ O with tilde d5 0213 Ctrl-Shift-` O &Otilde; Note 1
Œ ligature OE 152 0140 Ctrl-Shift-7 O &OElig; Note 1
? R with acute 154 340 &#340;
? R with caron 158 344 &#344;
? R with cedilla 156 342 &#342;
? S with acute 15a 346 &#346;
Š S with caron 160 0160 &Scaron;
? S with cedilla 15e 350 &#350;
? S with circumflex 15c 348 &#348;
? T with caron 164 356 &#356;
? T with cedilla 162 354 &#354;
? T with stroke 166 358 &#358; Sámi
Þ Thorn de 0222 &THORN; Icelandic
Ú U with acute da 0218 Ctrl-’ U &Uacute; Note 1
? U with breve 16c 364 &#364;
Û U with circumflex db 0219 Ctrl-Shift-6 U &Ucirc; Note 1
Ü U with dieresis dc 0220 Ctrl-Shift-; U &Uuml; Note 1
? U with double acute 170 368 &#368; Hungarian
Ù U with grave d9 0217 Ctrl-` U &Ugrave; Note 1
? U with macron 16a 362 &#362;
? U with ogonek 172 370 &#370;
? U with ring above 16e 366 &#366;
? U with tilde 168 360 &#360;
? W with circumflex 174 372 &#372;
Ý Y with acute dd 0221 Ctrl-’ Y &Yacute; Note 1
? Y with circumflex 176 374 &#374;
Ÿ Y with dieresis 178 376 Ctrl-Shift-; Y &Yuml; Note 1
? Z with acute 179 377 &#377;
Ž Z with caron 17d 381 &#381;
? Z with dot above 17b 379 &#379;
á a with acute e1 0225 Ctrl-’ a &aacute; Note 1
? a with breve 103 259 &#259;
â a with circumflex e2 0226 Ctrl-Shift-6 a &acirc; Note 1
ä a with dieresis e4 0228 Ctrl-Shift-; a &auml; Note 1
à a with grave e0 0224 Ctrl-` a &agrave; Note 1
? a with macron 101 257 &#257;
? a with ogonek 105 261 &#261;
å a with ring e5 0229 Ctrl-Shift-2 a &aring; Note 1
? a with ringand acute 1fb 507 &#507;
ã a with tilde e3 0227 Ctrl-Shift-` a &atilde; Note 1
æ ae e6 0230 Ctrl-Shift-6 a &aelig; Note 1
? ae with acute 1fd 509 &#509;
? c with acute 107 263 &#263;
? c with caron 10d 269 &#269;
ç c with cedilla e7 0231 Ctrl-, c &ccedil;
? c with circumflex 109 265 &#265;
? c with dot above 10b 267 &#267;
? d with caron 10f 271 &#271;
? d with stroke 111 273 &#273; Croatian
ð eth f0 0240 Ctrl-’ d &eth; Icelandic
é e with acute e9 0233 Ctrl-’ e &eacute; Note 1
? e with breve 115 277 &#277;
? e with caron 11b 283 &#283;
ê e with circumflex ea 0234 Ctrl-Shift-6 e &ecirc; Note 1
ë e with dieresis eb 0235 Ctrl-Shift-; e &euml; Note 1
? e with dot above 117 279 &#279;
è e with grave e8 0232 Ctrl-` e &egrave; Note 1
? e with macron 113 275 &#275;
? e with ogenek 119 281 &#281;
ƒ f with hook 192 0131 &fnof; Florin
? ligature fi fb01 64257 &#64257;
? ligature fl fb02 64257 &#64257;
? g with breve 11f 287 &#287;
? g with cedilla 123 291 &#291;
? g with circumflex 11d 285 &#285;
? g with dot above 121 289 &#289;
? h with circumflex 125 293 &#293;
? h with stroke 127 295 &#295; Maltese
í i with acute ed 237 Ctrl-’ i &iacute; Note 1
? i with breve 12d 301 &#301;
î i with circumflex ee 0238 Ctrl-Shift-6 i &icirc; Note 1
ï i with dieresis ef 0239 Ctrl-Shift-; i &iuml; Note 1
ì i with grave ec 0236 Ctrl-` i &igrave; Note 1
? i with macron 12b 299 &#299;
? i with ogonek 12f 303 &#303;
? i with tilde 129 297 &#297;
? dotless i 131 305 &#305;
? ligature ij 133 307 &#307; Dutch
? j with circumflex 135 309 &#309;
? k with cedilla 137 311 &#311;
? kra 138 312 &#312; Greenl.
? l with acute 13a 314 &#314;
? l with caron 13e 318 &#318;
? l with cedilla 13c 316 &#316;
? l with middle dot 140 320 &#320;
? l with stroke 142 322 &#322; Polish
? n preceded byapostrophe 149 329 &#329; Afrikaans
? n with acute 144 324 &#324;
? n with caron 148 328 &#328;
? n with cedilla 146 326 &#326;
ñ n with tilde f1 0241 Ctrl-Shift-` n &ntilde; Note 1
? eng 14b 331 &#331; Sámi
ó o with acute f3 0243 Ctrl-’ o &oacute; Note 1
? o with breve 14f 335 &#335;
ô o with circumflex f4 0244 Ctrl-Shift-6 o &ocirc; Note 1
ö o with dieresis f6 0246 Ctrl-Shift-; o &ouml; Note 1
? o with double acute 151 337 &#337; Hungarian
ò o with grave f2 0242 Ctrl-` o &ograve; Note 1
? o with macron 14d 333 &#333;
ø o with stroke f8 0248 Ctrl-/ o &oslash; Danish
? o with strokeand acute 1ff 511 &#511;
õ o with tilde f5 0245 Ctrl-Shift-` o &otilde; Note 1
œ ligature oe 153 0156 Ctrl-Shift-6 o &oelig; French
? r with acute 155 341 &#341;
? r with caron 159 345 &#345;
? r with cedilla 157 343 &#343;
? s with acute 15b 347 &#347;
š s with caron 161 0154 &scaron;
? s with cedilla 15f 351 &#351;
? s with circumflex 15d 349 &#349;
? long s 17f 383 &#383; Historical
ß sharp s df 0223 Ctrl-Shift-6 s &szlig; Note 1
? t with caron 165 357 &#357;
? t with cedilla 163 355 &#355;
? t with stroke 167 359 &#359; Sámi
þ thorn fe 0254 &thorn; Icelandic
ú u with acute fa 0250 Ctrl-’ u &uacute; Note 1
? u with breve 16d 365 &#365;
û u with circumflex fb 0251 Ctrl-Shift-6 u &ucirc; Note 1
ü u with dieresis fc 0252 Ctrl-Shift-; u &uuml; Note 1
? u with double acute 171 369 &#369; Hungarian
ù u with grave f9 0249 Ctrl-` u &ugrave; Note 1
? u with macron 16b 363 &#363;
? u with ogonek 173 371 &#371;
? u with ring above 16f 367 &#367;
? u with tilde 169 361 &#361;
? w with circumflex 175 373 &#373;
ý y with acute fd 0253 Ctrl-’ y &yacute; Note 1
? y with circumflex 177 375 &#375;
ÿ y with dieresis ff 0255 Ctrl-Shift-; y &yuml; Note 1
? z with acute 17a 378 &#378;
ž z with caron 17e 382 &#382;
? z with dot above 17c 380 &#380;

 

 

Table A-2. Greek letters and tone marks

Name of character Alt-X Alt-n Word HTML Notes
? Greek tonos 384 900 ;? &#900; Note 1
? Greek dialytika tonos 385 901 W? &#901; Note 1
? Alpha 391 913 A &Alpha;
? Alpha with tonos 386 902 ;A &#902;
? Beta 392 914 B &Beta;
? Gamma 393 915 G &Gamma;
? Delta 394 916 D &Delta;
? Epsilon 395 917 E &Epsilon;
? Epsilon with tonos 388 904 ;E &#904;
? Zeta 396 918 Z &Zeta;
? Eta 397 919 H &Eta;
? Eta with tonos 389 905 ;H &#905;
? Theta 398 920 U &Theta;
? Iota 399 921 I &Iota;
? Iota with dialytika 3aa 938 :I &#938;
? Iota with tonos 38a 906 ;I &#906;
? Kappa 39a 922 K &Kappa;
? Lamda 39b 923 L &Lambda;
? Mu 39c 924 M &Mu;
? Nu 39d 925 N &Nu;
? Xi 39e 926 J &Xi;
? Omicron 39f 927 O &Omicron;
? Omicron with tonos 38c 908 ;O &#908;
? Pi 3a0 928 P &Pi; ? product
? Rho 3a1 929 R &Rho;
? Sigma 3a3 931 S &Sigma; ? sum
? Tau 3a4 932 T &Tau;
? Upsilon 3a5 933 Y &Upsilon;
? Upsilon with dialytika 3ab 939 :Y &#939;
? Upsilon with tonos 38e 910 ;Y &#910;
? Upsilon with hook symbol 3d2 978 &upsih; ??WGL4
? Phi 3a6 934 F &Phi;
? Chi 3a7 935 X &Chi;
? Psi 3a8 936 C &Psi;
? Omega 3a9 937 V &Omega; ? ohm
? Omega with tonos 38f 911 ;V &#911;
? alpha 3b1 945 a &alpha;
? alpha with tonos 3ac 940 ;a &#940;
? beta 3b2 946 b &beta;
? gamma 3b3 947 g &gamma;
? delta 3b4 948 d &delta;
? epsilon 3b5 949 e &epsilon;
? epsilon with tonos 3ad 941 ;e &#941;
? zeta 3b6 950 z &zeta;
? eta 3b7 951 h &eta;
? eta with tonos 3ae 942 ;h &#942;
? theta 3b8 952 u &theta;
? theta symbol 3d1 977 &thetasym; ??WGL4
? iota 3b9 953 i &iota;
? iota with dialytika 3ca 970 :i &#970;
? iota with dialytika and tonos 390 912 Wi &#912;
? iota with tonos 3af 943 ;i &#943;
? kappa 3ba 954 k &kappa;
? lamda 3bb 955 l &lambda;
? mu 3bc 956 m &mu; ? micro
? nu 3bd 957 n &nu;
? xi 3be 958 j &xi;
? omicron 3bf 959 o &omicron;
? omicron with tonos 3cc 972 ;o &#972;
? pi 3c0 960 p &pi;
? pi symbol 3d6 982 &piv; ??WGL4
? rho 3c1 961 r &rho;
? sigma 3c3 963 s &sigma;
? final sigma 3c2 962 w &sigmaf;
? tau 3c4 964 t &tau;
? upsilon 3c5 965 y &upsilon;
? upsilon with dialytika 3cb 971 :y &#971;
? upsilon with dialytika and tonos 3b0 944 Wy &#944;
? upsilon with tonos 3cd 973 ;y &#973;
? phi 3c6 966 f &phi;
? chi 3c7 967 x &chi;
? psi 3c8 968 c &psi;
? omega 3c9 969 v &omega;
? omega with tonos 3ce 974 ;v &#974;

 

 

Table A-3. Other commonly needed characters

Name of character Alt-X Alt-n Word HTML Notes
Superscripts
¹ Superscript one b9 0185 &sup1;
² Superscript two b2 0178 &sup2:
³ Superscript three b3 0179 &sup3;
Fractions
½ One half bd 0189 1/2 &frac12;
¼ One quarter bc 0188 1/4 &frac14;
¾ Three quarters be 0190 3/4 &frac34;
? One eighth 215b 8539 &#8539;
? Three eighths 215c 8540 &#8540;
? Five eighths 215d 8541 &#8541;
? Seven eighths 215e 8542 &#8542;
? Fraction slash 2044 8260 &frasl;
Presentational forms of Latin letters
ª Feminine ordinalindicator aa 0170 &ordf; Spanish
º Masculine ordinalindicator ba 0186 &ordm; Spanish
? Superscript n 207f 8319 &#8319;
Letter-like symbols
? Care of 2105 8453 &#8453;
© Copyright sign a9 0169 (c) &copy; AltGr-c
? Estimated symbol 212e 8494 &#8494;
µ Micro sign b5 0181 AltGr-m &micro; ? mu
? Ohm sign 2126 8486 &#8486; ? Omega
® Registered sign ae 0174 (r) &reg; AltGr-r
? Script small l 2113 8467 &#8467;
Trademark sign 2122 0153 (tm) &trade; AltGr-t
? Script capital p 2118 8472 &weierp; ??WGL4
? Black-letter capital I 2111 8465 &image; ??WGL4
? Black-letter capital R 211c 8476 &real; ??WGL4
? Alef symbol 2135 8501 &alefsym; ??WGL4
Currency symbols
¢ Cent sign a2 0162 Ctrl-/ c &cent;
¤ Currency sign a4 0164 &curren; Generic
$ Dollar sign 24 036 $ &#36;
Euro sign 20ac 0128 AltGr-e &euro; Note 2
? French franc sign 20a3 8355 &#8355; Historical
? Lira sign 20a4 8356 &#8356; Rare
? Peseta sign 20a7 8359 &#8359; Historical
£ Pound sign a3 0163 &pound;
¥ Yen sign a5 0165 &yen; Also yuan
Quotation marks
Quotation mark 22 ” Ctrl-z &quot; ASCII
Apostrophe 27 ‘ Ctrl-z &apos; ASCII
Left doublequotation mark 201c 0147 Ctrl-` “ &ldquo; Note 3
Right doublequotation mark 201d 0148 Ctrl-’ “ &rdquo; Note 3
Left singlequotation mark 2018 0145 Ctrl-` ‘ &lsquo; Note 3
Right singlequotation mark 2019 0146 Ctrl-’ ‘ &rsquo; Note 3
« Left-pointing guillemet ab 0171 Ctrl-` < &laquo; Note 3
» Right-pointing guillemet bb 0187 Ctrl-` > &raquo; Note 3
Left-pointing single angle quotation mark 2039 0139 &lsaquo;
Right-pointing singleangle quotation mark 203a 0155 &rsaquo;
Double low-9 quotation mark 201e 0132 &bdquo; Note 3
Single low-9 quotation mark 201a 0130 &sbquo; Note 3
? Single high-reversed-9 quotation mark 201b 8219 &#8219;
Hyphens
Hyphen-minus 2d 045 &#45; ASCII
? Hyphen 2010 8208 &#8208; ??WGL4
Soft hyphen ad 0173 &shy; Note 4
? Nonbreaking hyphen 2011 8209 &#8209; ??WGL4
Other punctuation marks
En dash 2013 0150 Ctrl-minus &ndash; Note 5
Em dash 2014 0151 AltGr-minus &mdash; Note 5
? Horizontal bar 2015 8213 &#8213;
Horizontal ellipsis 2026 0133 AltGr-. &hellip;
¿ Inverted question mark bf 0191 AltGr-? &iquest; Note 6
¡ Inverted exclama-tion mark a1 0161 AltGr-! &iexcl; Note 6
? Double exclama-tion mark 203c 8252 &#8252;
· Middle dot b7 0183 &middot:
· Greek ano teleia 387 903 &#903; Upper dot
Bullet 2022 0149 &bull;
? Left-pointingangle bracket 2329 9001 &lang; ??WGL4
? Right-pointingangle bracket 2330 9002 &rang; ??WGL4
Punctuation-like marks
& Ampersand 26 038 & &amp;
< Less-than sign 3c 060 < &lt;
> Greater-than sign 3e 062 > &gt;
_ Low line 5f 095 _ &#95;
? Double low line 2017 8215 &#8215;
? Overline 203e 8254 &oline; ? macron
| Vertical line 7c 0124 | &#124;
¦ Broken bar a6 0166 &brvbar;
Pilcrow sign b6 0182 Insert ? &para;
§ Section sign a7 0167 Insert ? &sect;
Dagger 2020 0134 &dagger;
Double dagger 2021 0135 &Dagger;
@ Commercial at 40 064 @ &#64;
\ Reverse solidus 5c 092 \ &#92;
# Number sign 23 035 # &#35;
Per mille sign 2030 0137 &permil;
° Degree sign b0 0176 &deg;
? Prime 2032 8242 &prime; ? ‘
? Double prime 2033 8243 &Prime; ? “
Spacing diacritic marks and similar charcters
´ Acute accent b4 0180 ´ ? &acute; Note 7
? Breve 2d8 728 &#728;
? Caron 2c7 711 &#711;
¸ Cedilla b8 0184 Ctrl-, ? &cedil;
^ Circumflex accent 5e 094 ^ &#94; or: ^ ?
¨ Dieresis a8 0168 ¨ ? &uml;
? Dot above 2d9 729 &#729;
? Double acute accent 2dd 733 &#733;
` Grave accent 60 096 ` &#96; or: ` ?
¯ Macron af 0175 &macr; ?overline
ˆ Modifier lettercircumflex 2c6 710 &circ;
? Modifier letter macron 2c9 713 &#713;
? Ogonek 2db 731 &#731;
? Ring above 2da 730 &#730;
˜ Small tilde 2dc 0152 &tilde;
~ Tilde 7e 0126 ~ &#126; or: ~ ?
Arrows
? Leftward arrow 2190 8592 &larr;
? Upward arrow 2191 8593 &uarr;
? Rightward arrow 2192 8594 &rarr;
? Downward arrow 2193 8595 &darr;
? Left right arrow 2194 8596 &harr;
? Up down arrow 2195 8597
? Up down arrowwith base 21a8 8616
? Down and left arrow 21b5 8629 &crarr; ??WGL4
? Leftward double arrow 21d0 8656 &lArr; ??WGL4
? Upward double arrow 21d1 8657 &uArr; ??WGL4
? Rightward doublearrow 21d2 8658 &rArr; ??WGL4
? Downward doublearrow 21d3 8659 &dArr; ??WGL4
? Left right double arrow 21d4 8660 &hArr;
Mathematical symbols
? Almost equal to 2248 8776 &asymp;
? Angle 2220 8736 &ang; ??WGL4
? Approximately equal to 2245 8773 &cong; ??WGL4
? Asterisk operator 2217 8727 &lowast; ??WGL4
? Bullet operator 2219 8729 &#8729;
? Circled plus 2295 8853 &oplus; ??WGL4
? Circled times 2297 8855 &otimes; ??WGL4
÷ Division sign f7 0247 &divide;
? Division slash 2215 8725 &#8725;
? Dot operator 22c5 8901 &sdot; ??WGL4
? Greater-than orequal to 2265 8805 &ge;
? Identical to 2261 8801 &equiv;
? Increment 2206 8710 &#8710;
? Infinity 221e 8734 &infin;
? Integral 222b 8747 &int;
? Left ceiling 2308 8968 &lceil; ??WGL4
? Left floor 230a 8970 &lfloor; ??WGL4
? Less-than or equal to 2264 8804 &le;
? Logical and 2227 8743 &and; ??WGL4
? Logical or 2228 8744 &or; ??WGL4
? Minus sign 2212 8722 &minus;
× Multiplication sign d7 0215 &times;
? Nabla 2207 8711 &nabla; ??WGL4
? N-ary product 220f 8719 &prod;
? N-ary summation 2211 8721 &sum;
? Not equal to 2260 8800 &ne;
¬ Not sign ac 0172 &not;
? Partial differential 2202 8706 &part;
± Plus-minus sign b1 0177 &plusmn;
? Proportional to 221d 8733 &prop; ??WGL4
? Right angle 221f 8735 &#8735;
? Right ceiling 2309 8969 &rceil; ??WGL4
? Right floor 230b 8971 &rfloor; ??WGL4
? Square root 221a 8730 &radic;
? Therefore 2234 8756 &there4; ??WGL4
? Tilde operator 223c 8764 &sim; ??WGL4
? Up tack 22a5 8869 &perp; ??WGL4
Set theory symbols
? Contains as member 220b 8715 &ni; ??WGL4
? Element of 2208 8712 &isin; ??WGL4
? Empty set 2205 8709 &empty; ??WGL4
? For all 2200 8704 &forall; ??WGL4
? Intersection 2229 8745 &cap;
?? Not an element of 2209 8713 &notin; ??WGL4
?? Not a subset of 2284 8836 &nsub; ??WGL4
? Subset of 2282 8834 &sub; ??WGL4
? Subset of or equal to 2286 8838 &sube; ??WGL4
? Superset of 2283 8835 &sup; ??WGL4
? Superset of or equal to 2287 8839 &supe; ??WGL4
? There exists 2203 8707 &exist; ??WGL4
? Union 222a 8746 &cup; ??WGL4
Miscellaneous technical symbols
? House 2302 8962 &#8962;
? Reversed not sign 2310 8976 &#8976;
? Top half integral 2320 8992 &#8992;
? Bottom half integral 2321 8993 &#8993;
Miscellaneous symbols
? White smiling face 263a 9786 &#9786;
? Black smiling face 263b 9787 &#9787;
? White sun with rays 263c 9788 &#9788;
? Female sign 2640 9792 &#9792;
? Male sign 2642 9794 &#9794;
? Black spade suit 2660 9824 &spades;
? Black club suit 2663 9827 &clubs;
? Black heart suit 2665 9829 &hearts;
? Black diamond suit 2666 9830 &diams;
? Eighth note 266a 9834 &#9834;
? Beamed eighth notes 266b 9835 &#9835;
Geometric shapes
? Black square 25a0 9632 &#9632;
? White square 25a1 9633 &#9633;
? Black small square 25aa 9642 &#9642;
? White small square 25ab 9643 &#9643;
? Black rectangle 25ac 9644 &#9644;
? Black up-pointingtriangle 25b2 9650 &#9650;
? Black right-pointingtriangle 25b2 9658 &#9658;
? Black down-point.triangle 25bc 9660 &#9660;
? Black left-pointingtriangle 25c4 9668 &#9668;
? Lozenge 25ca 9674 &loz;
? White circle 25cb 9675 &#9675;
? Black circle 25cf 9679 &#9679;
? Inverse bullet 25d8 9688 &#9688;
? Inverse white circle 25d9 9689 &#9689;
? White bullet 25e6 9702 &#9702;
Spaces
Space 20 032 ? &#32; space bar
No-break space a0 0160 Ctrl-Shift-? &nbsp;
Em space 2003 8195 Insert ? &emsp; ??WGL4
En space 2002 8194 Insert ? &ensp; ??WGL4
Four-per-em space 2005 8197 Insert ? &#8197; ??WGL4
Thin space 2009 8201 &thinsp; ??WGL4
Invisible controls
Zero width non-joiner 200c 8204 &zwnj; ??WGL4
Zero width joiner 200d 8205 &zwj; ??WGL4
Left-to-right mark 200e 8206 &lrm; ??WGL4
Right-to-left mark 200f 8207 &rlm; ??WGL4

If you enjoyed this excerpt, buy a copy of Unicode Explained.

http://www.oreillynet.com/pub/a/xml/excerpts/unicode-explained/tables-writing-characters.html

 

YouTube to mp3

https://www.youtube2mp3.cc/#conversion http://en.savefrom.net/ YouTube-mp3.org est le service en ligne le plus simple qui soit pour convertir des vidéos en mp3. Pas besoin de créer un compte, la seule chose qu’il vous faut est l’adresse (URL) d’une vidéo YouTube. La conversion est lancée dès que vous nous soumettez l’adresse de la vidéo, ensuite il vous suffira de … Continue reading YouTube to mp3

https://www.youtube2mp3.cc/#conversion
http://en.savefrom.net/

YouTube-mp3.org est le service en ligne le plus simple qui soit pour convertir des vidéos en mp3. Pas besoin de créer un compte, la seule chose qu’il vous faut est l’adresse (URL) d’une vidéo YouTube. La conversion est lancée dès que vous nous soumettez l’adresse de la vidéo, ensuite il vous suffira de télécharger le mp3 que nous aurons créé. A la différence d’autres services, l’intégralité du processus de conversion est effectué au sein de notre infrastructure, vous n’avez qu’à télécharger le fichier audio alors stocké sur nos serveurs. Ainsi, notre service est multi-platforme : vous pouvez l’utiliser sur votre Mac, un PC sous Linux ou même un iPhone. Toutes nos conversions sont effectuées en mode haute qualité avec un taux d’échantillonage égal ou supérieur à 128 kBit/s. Ne vous inquiétez pas, notre service est entièrement gratuit. Il nécessite approximativement 3 à 4 minutes par vidéo.

About ConvertMeMp3.com

ConvertMeMp3.com is a free YouTube to MP3 converter. It allows you to convert and download a video from YouTube to MP3 audio online.