Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade Business Management AI Smartphones VoIP Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Automation Information Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Blockchain Business Technology Mobile Office Data Security Two-factor Authentication Apps Vendor Networking Managed Services Voice over Internet Protocol Mobile Device Management Gmail BYOD Chrome Budget Employer-Employee Relationship Tip of the week Apple App Avoiding Downtime Computing How To Marketing BDR Information Technology Conferencing Office 365 WiFi Access Control HIPAA Applications Hacker Operating System Managed IT Services Website Help Desk Risk Management 2FA Healthcare Office Tips Analytics Augmented Reality Virtual Private Network Big Data Storage Health Password Bring Your Own Device Router Retail Computers Scam Data loss Cybercrime Monitoring Windows 11 Remote Workers Patch Management Save Money Remote Monitoring Firewall Vulnerability End of Support Excel Vendor Management Telephone Free Resource Physical Security Project Management The Internet of Things Windows 7 Display Cooperation Printer Microsoft 365 Paperless Office Social Infrastructure Solutions Document Management Customer Service Going Green Mobile Security Settings Data Storage Processor Wireless Technology Printing Wireless Content Filtering Video Conferencing Managed Services Provider Virtual Machines Professional Services YouTube Smart Technology Cryptocurrency Word Saving Time Robot Supply Chain iPhone Virtual Desktop Managed IT Service Data storage LiFi IT Management Vulnerabilities Downloads VPN Safety Meetings Outlook Licensing Images 101 Money Entertainment Humor Computer Repair Multi-Factor Authentication Mobility Sports Data Privacy Telephone System Mouse Cost Management Employees Customer Relationship Management Machine Learning Integration Administration Hacking Holidays Maintenance Presentation Antivirus User Tip Modem Database Alt Codes Social Engineering Workplace Strategies Hypervisor Remote Computing Meta Optimization PowerPoint IT Technicians Downtime Shopping Cyber Monday IP Address Amazon Proxy Server Employer/Employee Relationships Cookies Hosted Solution Tactics Typing Navigation Hotspot Tablet PCI DSS Gig Economy Alert Outsource IT Mirgation Knowledge Managed IT File Sharing Environment Internet Service Provider Recovery Google Drive Dark Data Media Teamwork Nanotechnology Addiction Evernote Language Regulations Compliance Hard Drives How To Domains Notifications Small Businesses Memes Management Chatbots 5G Distributed Denial of Service Experience Travel Displays Net Neutrality Google Docs SQL Server Screen Reader Unified Communications History Service Level Agreement Bitcoin Computing Infrastructure Running Cable Techology Google Maps Financial Data Refrigeration Smartwatch Public Speaking Outsourcing IT Google Wallet Identity Lithium-ion battery Unified Threat Management Procurement Bookmark Azure Smart Tech Workplace Cyber security Entrepreneur Download Windows 8 Tech Alerts Laptop Unified Threat Management Telework CES Hiring/Firing Communitications Drones Break Fix Supply Chain Management Browsers Network Congestion Paperless Connectivity Co-managed IT Upload Term Halloween User Error FinTech Undo Technology Care IT Assessment Social Network Multi-Factor Security IoT Dark Web Point of Sale Flexibility Business Communications Value Scams Trends Hacks Scary Stories Organization Google Calendar Fun Network Management Digital Security Cameras Tech Support Hybrid Work Smart Devices Customer Resource management Regulations Star Wars Deep Learning Microsoft Excel Remote Working Application Data Analysis Monitors Human Resources Memory Cables Data Breach Gamification Google Play Staff Legislation Videos IBM Websites Electronic Health Records Social Networking Education Fileless Malware Google Apps Wasting Time Electronic Medical Records IT Maintenance Trend Micro Content Mobile Computing Security Cameras Wearable Technology SharePoint Comparison Search Business Intelligence Software as a Service Health IT Motherboard Assessment Best Practice Permissions Lenovo Directions Writing Shortcuts Managing Costs Virtual Reality Ransmoware eCommerce SSID Buisness Competition Specifications Server Management Private Cloud Vendors Surveillance Legal Virtual Assistant IT solutions Internet Exlporer Business Growth Fraud Superfish Identity Theft Microchip Be Proactive Virtual Machine Twitter Workforce Username Medical IT Reviews Black Friday Cortana Error Threats Development User Transportation

Blog Archive