Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Productivity Saving Money Cybersecurity Communication Managed Service Smartphone Data Backup Android Upgrade Smartphones VoIP AI Business Management Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Internet of Things Remote Tech Term Information Artificial Intelligence Facebook Automation Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Bandwidth Virtualization Business Technology Apps Vendor Data Security Mobile Office Two-factor Authentication Apple Tip of the week Employer-Employee Relationship App Networking Mobile Device Management BYOD Gmail Managed Services Voice over Internet Protocol Chrome Budget HIPAA Applications Hacker Computing How To Avoiding Downtime BDR Information Technology Marketing Conferencing Office 365 WiFi Access Control Retail Router Computers Operating System Managed IT Services Website Help Desk Risk Management Analytics Office Tips Augmented Reality Healthcare Virtual Private Network Storage Big Data Password Health 2FA Bring Your Own Device Windows 7 Excel Document Management Microsoft 365 Solutions Customer Service Going Green Scam Data loss Cybercrime Monitoring Patch Management Save Money Remote Monitoring End of Support Vulnerability Firewall Vendor Management Remote Workers Physical Security Telephone Display Printer The Internet of Things Windows 11 Paperless Office Cooperation Infrastructure Social Free Resource Project Management Images 101 Telephone System Administration Machine Learning Cost Management Multi-Factor Authentication Mobility Customer Relationship Management Maintenance Antivirus Hacking Presentation Employees Settings User Tip Wireless Integration Modem Printing Processor Content Filtering Mobile Security Wireless Technology Data Privacy YouTube Cryptocurrency Holidays Smart Technology Data Storage Robot Word Saving Time Virtual Desktop Video Conferencing LiFi Managed Services Provider Data storage Virtual Machines Professional Services Managed IT Service IT Management Meetings Outlook VPN Downloads Safety Money Licensing Humor Computer Repair iPhone Entertainment Sports Vulnerabilities Mouse Supply Chain Social Networking SharePoint IBM Outsourcing Legislation Mobile Computing IT Assessment Electronic Medical Records Flexibility Fileless Malware Search Value Lenovo Workplace Best Practice Organization Writing Content Wearable Technology Motherboard Hiring/Firing Comparison Digital Security Cameras Buisness Smart Devices Virtual Reality Health IT IT solutions Remote Working Private Cloud Directions Memory Assessment Permissions Legal Server Management Paperless Superfish Competition Co-managed IT Business Growth Identity Theft Data Breach Google Play Technology Care Specifications Videos Electronic Health Records Twitter Error Microchip Cortana Wasting Time Internet Exlporer Fraud Business Communications Scams Alt Codes Trend Micro Social Engineering Username Security Cameras Hybrid Work Black Friday User Downtime Software as a Service Remote Computing Hosted Solution Managing Costs Database Human Resources IT Technicians Cables Typing Tablet eCommerce SSID Proxy Server Virtual Assistant Cookies IP Address Cyber Monday Surveillance Alert File Sharing Knowledge Virtual Machine Dark Data Tactics Hotspot Google Drive Managed IT Google Apps Mirgation IT Maintenance Reviews How To Medical IT 5G Transportation Nanotechnology Business Intelligence Recovery Development Notifications Shortcuts Unified Communications Travel Experience Hypervisor Addiction Language Google Docs Hard Drives Chatbots Techology Domains Ransmoware Bitcoin Shopping Google Maps Running Cable Optimization Management PowerPoint Employer/Employee Relationships Screen Reader Vendors Distributed Denial of Service Google Wallet Refrigeration Be Proactive PCI DSS Unified Threat Management Service Level Agreement Navigation Computing Infrastructure Identity Unified Threat Management Public Speaking Workforce Windows 8 Gig Economy Laptop Bookmark Teamwork Smart Tech Lithium-ion battery Threats Drones Internet Service Provider Workplace Strategies Regulations Compliance Entrepreneur Network Congestion Download Evernote Alerts User Error Meta Halloween Memes Browsers SQL Server Connectivity Amazon Break Fix Net Neutrality Undo Financial Data Point of Sale History Upload Outsource IT Multi-Factor Security Hacks Smartwatch Scary Stories IT Social Network Fun Azure IoT Environment Dark Web Network Management Media Procurement Tech Support Deep Learning Telework Cyber security Monitors Trends Tech Regulations Small Businesses Google Calendar CES Communitications Customer Resource management Supply Chain Management Websites Data Analysis Star Wars Displays Microsoft Excel Application Education FinTech Gamification Term Staff

Blog Archive