Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Hackers Cloud Email Malware Privacy Business Computing Tech Term Internet Computer Network Security Business Data Hosted Solutions IT Services Efficiency Innovation Software Data Backup Android Mobile Devices User Tips Hardware Smartphone Communication Browser Microsoft Google Windows 10 Business Management Small Business Workplace Tips Productivity Productivity Artificial Intelligence Ransomware Data Recovery Backup Gmail Data Management Facebook Smartphones IT Support Social Media Managed Service Provider Internet of Things Saving Money App Encryption Collaboration Two-factor Authentication Server Microsoft Office Managed Service Cloud Computing communications Business Technology Miscellaneous Cybersecurity Windows 10 Automation Spam Office 365 Windows Office Tips Phishing Bandwidth Passwords Information Managed IT Services Disaster Recovery Applications Mobile Device Upgrade Firewall BDR Going Green Printer The Internet of Things Access Control WiFi Computing Big Data Social Infrastructure Tip of the week Apps Employer-Employee Relationship Paperless Office Users Government Scam IT Support BYOD Blockchain Holiday Business Continuity Website Outsourced IT VoIP Mobile Device Management End of Support Network Settings Safety Quick Tips Printing Content Filtering Saving Time Cybercrime Wi-Fi Risk Management LiFi Data storage Analytics Customer Service Hacking Augmented Reality Antivirus Presentation Computers Money Chrome Hacker Document Management Cost Management Maintenance Office Wireless Technology Data Security Storage HIPAA Sports Vendor Mouse Bring Your Own Device Vulnerability Apple Administration Mobile Security Robot Refrigeration Save Money IT Technicians Current Events Buisness Black Friday Remote Monitoring IT solutions VPN Public Speaking Proxy Server Machine Learning Cookies Legal Hotspot Business Growth User Error Lithium-ion battery Navigation Tactics IT Management Monitoring Vendor Management Entrepreneur Mirgation Cyber Monday Cortana Virtual Private Network Help Desk Error Nanotechnology Network Congestion Language Alt Codes Evernote Google Maps Addiction Wireless Undo Management Electronic Medical Records Chatbots Downtime Smart Technology Hosted Solution Screen Reader Operating System Display Computing Infrastructure Typing Healthcare Service Level Agreement Network Management Virtualization Conferencing Virtual Reality Identity YouTube Distributed Denial of Service Knowledge Bookmark Travel Smart Tech Google Drive Download Monitors Alerts Cryptocurrency SharePoint Tech Application 5G Telephone Remote Computing Information Technology Managed IT Service Unified Communications Experience Lenovo IBM Browsers Unified Threat Management Connectivity Google Docs Gadgets Upload Licensing Bitcoin Running Cable Downloads Term Social Network Alert Compliance Google Wallet Virtual Desktop Break Fix Dark Web Superfish Customer Relationship Management Entertainment IoT Trends Writing Cooperation Windows 8 Laptop Multi-Factor Security Mobility Server Management Competition Customer Resource management Regulations Drones Microsoft Excel Data Analysis Star Wars Outlook Gamification Retail Staff Halloween Google Calendar Google Play Managed IT Services Telephone System Social Networking Networking Fileless Malware User Humor Content Social Engineering Wearable Technology Hacks Scary Stories Legislation Security Cameras Fun Health IT Motherboard Budget Permissions Deep Learning IP Address Directions Identity Theft Avoiding Downtime Assessment Password Comparison Data loss Patch Management Tech Support Router Education Fraud Techology Mobile Office Microchip Recovery Internet Exlporer Dark Data Marketing Hard Drives Username How To Mobile Computing Specifications Search Domains User Tip Websites Word Modem Best Practice Unified Threat Management Processor Tablet Database

Sign Up For Our Newsletter!