Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Data Business Software Innovation Hackers Network Security Cloud Hardware IT Support Internet User Tips Efficiency Malware Email Phishing Privacy Computer Google Workplace Tips Collaboration IT Services Users Hosted Solutions Quick Tips Cybersecurity Mobile Device Ransomware Data Backup Microsoft Workplace Strategy Communication Small Business Saving Money Smartphone VoIP Business Management Smartphones Android Mobile Devices communications Data Recovery Passwords Backup Managed Service Managed IT Services Microsoft Office Upgrade Social Media Disaster Recovery Browser Network Tech Term Internet of Things Artificial Intelligence Facebook Automation Remote Cloud Computing Covid-19 Server Managed Service Provider Gadgets Remote Work Windows Miscellaneous Outsourced IT Employee/Employer Relationship Information Encryption Spam Holiday Windows 10 Government Business Continuity Data Management Current Events Compliance Blockchain Windows 10 Virtualization Business Technology Wi-Fi Productivity Office Data Security Mobile Office Bandwidth Apps AI Two-factor Authentication Chrome Mobile Device Management Budget Gmail Managed Services Voice over Internet Protocol Vendor Training Apple App Employer-Employee Relationship Networking BDR Avoiding Downtime Office 365 BYOD Applications WiFi Access Control Computing Conferencing Information Technology Hacker How To Analytics Office Tips Website Marketing Augmented Reality Storage Password Bring Your Own Device Virtual Private Network HIPAA Router Healthcare Health Big Data Help Desk Operating System Retail Risk Management Computers Managed IT Services Patch Management Windows 11 Cooperation Save Money IT Support Remote Monitoring 2FA End of Support Vulnerability Vendor Management Excel Firewall Display Remote Workers Printer The Internet of Things Paperless Office Infrastructure Free Resource Social Going Green Tip of the week Project Management Windows 7 Monitoring Document Management Microsoft 365 Cybercrime Solutions Scam Customer Service Data loss Telephone Entertainment Robot Outlook Holidays Data Storage Money Humor Word Supply Chain Video Conferencing Telephone System IT Management Managed Services Provider Cost Management VPN Virtual Machines Meetings Professional Services Sports Mouse Computer Repair Safety Administration iPhone User Tip Modem Processor Mobile Security Vulnerabilities Data Privacy Machine Learning Images 101 Settings Wireless Smart Technology Printing Content Filtering Multi-Factor Authentication Mobility Customer Relationship Management Saving Time Maintenance YouTube Antivirus Cryptocurrency Hacking Managed IT Service Employees Presentation Integration Downloads Virtual Desktop Data storage LiFi Wireless Technology Licensing Outsource IT Virtual Assistant How To Multi-Factor Security Windows 8 Laptop IP Address Surveillance Social Network Environment Virtual Machine IoT Notifications Media Dark Web Drones Reviews Trends Travel Medical IT Google Maps Recovery Small Businesses Transportation Regulations Google Calendar Techology Halloween Development Customer Resource management Data Analysis Hard Drives Displays Hypervisor Star Wars Microsoft Excel Shopping Domains Optimization Gamification Unified Threat Management PowerPoint Staff Outsourcing Employer/Employee Relationships Social Networking Legislation Hacks Unified Threat Management Scary Stories PCI DSS Fileless Malware Fun Refrigeration Navigation Network Congestion Deep Learning Gig Economy Public Speaking Content Workplace Wearable Technology Hiring/Firing Teamwork Motherboard Physical Security Comparison User Error Lithium-ion battery Internet Service Provider Health IT Education Regulations Compliance Directions Assessment Entrepreneur Paperless Evernote Permissions Memes Point of Sale Co-managed IT Net Neutrality Technology Care SQL Server Specifications Mobile Computing Financial Data Microchip Network Management Search Undo History Internet Exlporer Tech Support Business Communications Fraud Scams Monitors Best Practice Smartwatch IT Username Procurement Hybrid Work Azure Black Friday Buisness IT solutions Telework Cyber security Database Websites Human Resources Tech Legal Cables IT Technicians Business Growth CES Communitications Supply Chain Management Proxy Server Application Cookies Electronic Medical Records Cyber Monday SharePoint FinTech Cortana Tactics Google Apps Term Hotspot IT Maintenance Mirgation Writing Alt Codes Lenovo IBM IT Assessment Flexibility Business Intelligence Value Nanotechnology Virtual Reality Downtime Hosted Solution Organization Server Management Addiction Private Cloud Shortcuts Language Ransmoware Chatbots Typing Digital Security Cameras Superfish Smart Devices Management Identity Theft Remote Working Vendors Memory Screen Reader Twitter Distributed Denial of Service Knowledge Competition Data Breach Service Level Agreement Error Be Proactive Google Play Computing Infrastructure Google Drive Workforce Identity Social Engineering Videos Electronic Health Records Bookmark 5G Threats Wasting Time Smart Tech Remote Computing Google Docs Unified Communications Experience Trend Micro Download Workplace Strategies Security Cameras Alerts User Meta Bitcoin Running Cable Software as a Service Tablet Browsers Amazon Managing Costs Connectivity Alert Break Fix Google Wallet Managed IT eCommerce Upload File Sharing SSID Dark Data

Blog Archive