Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Communication Saving Money Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management Smartphones AI VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Holiday Training Miscellaneous Gadgets Covid-19 Cloud Computing Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Wi-Fi Virtualization Business Technology Bandwidth Blockchain Windows 10 Two-factor Authentication Apps Mobile Office Vendor Data Security Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking App Mobile Device Management Gmail BYOD Computing WiFi Information Technology Conferencing Access Control Office 365 Hacker Avoiding Downtime How To Marketing HIPAA BDR Applications 2FA Help Desk Virtual Private Network Risk Management Big Data Health Healthcare Analytics Office Tips Augmented Reality Retail Computers Storage Password Bring Your Own Device Managed IT Services Website Router Operating System Monitoring Physical Security The Internet of Things Display Excel Printer Social Paperless Office Infrastructure Remote Workers Telephone Document Management Cooperation Free Resource Customer Service Project Management Windows 7 Scam Microsoft 365 Data loss Solutions Going Green Patch Management Save Money Remote Monitoring Firewall Vulnerability End of Support Vendor Management Windows 11 Cybercrime Data Storage VPN YouTube Meetings Safety Smart Technology Supply Chain Cryptocurrency Video Conferencing Managed Services Provider Computer Repair Saving Time Virtual Machines Professional Services Virtual Desktop LiFi Data storage Managed IT Service Downloads iPhone Outlook Licensing Machine Learning Customer Relationship Management Money Vulnerabilities Entertainment Humor Data Privacy Hacking Maintenance Presentation Images 101 Antivirus Sports Telephone System Multi-Factor Authentication Mouse Mobility Wireless Technology Cost Management Administration Employees Integration Word Robot User Tip Modem Mobile Security Settings Processor Printing Wireless Content Filtering Holidays IT Management Mirgation Hypervisor Displays Network Congestion Knowledge Undo Shopping Nanotechnology Optimization Google Drive User Error PowerPoint Language Employer/Employee Relationships Outsourcing Addiction 5G Management PCI DSS Chatbots Navigation Point of Sale Unified Communications Experience Gig Economy Screen Reader Google Docs Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Bitcoin Network Management Running Cable Tech Support Service Level Agreement Internet Service Provider Monitors Application Regulations Compliance Identity Google Wallet Evernote Paperless Bookmark Smart Tech Memes Co-managed IT Download Net Neutrality Alerts SQL Server Technology Care Windows 8 Laptop Websites IBM Financial Data History Drones Business Communications Break Fix Scams Electronic Medical Records Browsers Smartwatch Connectivity IT SharePoint Upload Procurement Azure Hybrid Work Halloween Writing Social Network Telework Cyber security Lenovo Multi-Factor Security Tech Human Resources Dark Web Cables Virtual Reality Competition CES IoT Communitications Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Fun Customer Resource management FinTech Regulations Superfish Google Calendar Term Google Apps Identity Theft Microsoft Excel IT Maintenance Deep Learning Twitter Data Analysis Star Wars IT Assessment User Gamification Flexibility Staff Value Business Intelligence Error Social Engineering Organization Social Networking Legislation Shortcuts Education Ransmoware Remote Computing Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Mobile Computing IP Address Search Health IT Motherboard Data Breach Comparison Google Play Be Proactive Tablet Permissions Workforce Best Practice Alert Directions Videos Assessment Electronic Health Records Recovery Wasting Time Threats Managed IT Buisness File Sharing Dark Data How To Hard Drives Trend Micro Legal Specifications Security Cameras Workplace Strategies IT solutions Fraud Meta Business Growth Notifications Domains Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Travel Cortana Refrigeration eCommerce Techology Black Friday SSID Google Maps Virtual Assistant Outsource IT Alt Codes Public Speaking Database Surveillance IT Technicians Virtual Machine Environment Media Downtime Unified Threat Management Lithium-ion battery Proxy Server Reviews Entrepreneur Cookies Unified Threat Management Cyber Monday Medical IT Hosted Solution Hotspot Transportation Small Businesses Typing Tactics Development

Blog Archive