Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Communication Cybersecurity Saving Money Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Artificial Intelligence Information Automation Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Data Management Business Continuity Government Virtualization Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Two-factor Authentication Apps Data Security Vendor Mobile Office Gmail Tip of the week Chrome Budget Networking Employer-Employee Relationship Apple App BYOD Managed Services Voice over Internet Protocol Mobile Device Management Office 365 WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Marketing Applications Computing Information Technology Access Control Help Desk Office Tips 2FA Analytics Retail Augmented Reality Big Data Storage Password Managed IT Services Bring Your Own Device Computers Router Website Operating System Virtual Private Network Healthcare Health Risk Management Free Resource Monitoring Project Management Document Management Windows 7 Windows 11 The Internet of Things Microsoft 365 Excel Social Solutions Scam Data loss Telephone Cooperation Patch Management Customer Service Save Money Remote Monitoring End of Support Vulnerability Going Green Vendor Management Physical Security Remote Workers Display Cybercrime Printer Paperless Office Infrastructure Firewall Virtual Desktop Smart Technology Data storage Machine Learning LiFi Images 101 Safety Multi-Factor Authentication Saving Time Mobility Outlook Supply Chain Maintenance Money Antivirus Managed IT Service Humor Downloads Employees Sports Integration Licensing Mouse Entertainment Customer Relationship Management Administration Robot Holidays Hacking Telephone System Data Privacy Presentation Data Storage Cost Management Video Conferencing IT Management Wireless Technology Managed Services Provider Virtual Machines Settings Professional Services VPN Meetings Printing Wireless Content Filtering Computer Repair YouTube User Tip Modem Word Cryptocurrency Processor iPhone Mobile Security Vulnerabilities SharePoint Outsource IT Mirgation Google Wallet Electronic Medical Records Entrepreneur Supply Chain Management Environment Term Nanotechnology Media FinTech Windows 8 Writing IT Assessment Laptop Addiction Lenovo Language Small Businesses Chatbots Undo Drones Virtual Reality Flexibility Value Management Displays Screen Reader Server Management Distributed Denial of Service Private Cloud Organization Identity Theft Digital Security Cameras Smart Devices Halloween Service Level Agreement Superfish Computing Infrastructure Outsourcing Identity Twitter Remote Working Memory Data Breach Bookmark Google Play Smart Tech Error Application Videos Hacks Social Engineering Electronic Health Records Scary Stories Download Workplace Alerts Hiring/Firing Remote Computing Wasting Time Fun Deep Learning Trend Micro Browsers Security Cameras Connectivity Paperless IBM Break Fix Tablet Software as a Service Upload Co-managed IT Technology Care Multi-Factor Security Alert Education Managing Costs Social Network Dark Data eCommerce SSID IoT Managed IT Business Communications Dark Web File Sharing Mobile Computing How To Surveillance Virtual Assistant Trends Scams Customer Resource management Search Hybrid Work Regulations Competition Google Calendar Notifications Virtual Machine Best Practice Data Analysis Medical IT Star Wars Human Resources Microsoft Excel Travel Reviews Staff Google Maps Development Buisness Transportation Gamification Techology Cables Social Networking Legislation Legal IT solutions Hypervisor Business Growth Optimization Fileless Malware PowerPoint Google Apps Unified Threat Management User Shopping Wearable Technology Employer/Employee Relationships Content Unified Threat Management IT Maintenance Health IT Cortana Business Intelligence Navigation Motherboard Comparison PCI DSS Gig Economy Alt Codes Network Congestion Directions Assessment Shortcuts IP Address Permissions Internet Service Provider Downtime Teamwork User Error Ransmoware Vendors Evernote Specifications Regulations Compliance Hosted Solution Typing Memes Microchip Internet Exlporer Be Proactive Fraud Point of Sale Recovery Hard Drives Net Neutrality SQL Server Username Workforce History Knowledge Threats Network Management Domains Black Friday Google Drive Tech Support Financial Data Smartwatch Monitors IT Database Workplace Strategies Meta IT Technicians Refrigeration Procurement Azure 5G Cyber security Proxy Server Experience Amazon Tech Cookies Public Speaking Cyber Monday Google Docs Websites Telework Unified Communications CES Bitcoin Communitications Running Cable Tactics Lithium-ion battery Hotspot

Blog Archive