Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Cloud Computing Covid-19 Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Managed Services Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Applications Information Technology Access Control Hacker Office 365 Avoiding Downtime Conferencing Marketing How To BDR HIPAA Computing Virtual Private Network Risk Management Health Computers 2FA Help Desk Office Tips Analytics Augmented Reality Website Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Display Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Telephone Scam Data loss Firewall Cooperation Free Resource Project Management Windows 7 Going Green Patch Management The Internet of Things Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Social Cybercrime Cryptocurrency User Tip Modem Customer Relationship Management Computer Repair Mobile Security Processor Virtual Desktop Holidays Hacking Data storage LiFi Data Storage Presentation Supply Chain Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Wireless Technology Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Maintenance Word Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Safety Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management VPN Employees YouTube Meetings Integration Username Amazon Managing Costs Point of Sale eCommerce 5G Black Friday SSID Outsource IT Experience Virtual Assistant Google Docs Unified Communications Database Surveillance Bitcoin Network Management Environment Running Cable Tech Support IT Technicians Virtual Machine Media Competition Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Small Businesses Hotspot Transportation Tactics Development Windows 8 Displays Laptop Websites Mirgation Hypervisor User Drones Shopping Nanotechnology Optimization PowerPoint Outsourcing Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Management PCI DSS Halloween Chatbots Navigation IP Address Lenovo Gig Economy Screen Reader Workplace Writing Distributed Denial of Service Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Paperless Evernote Recovery Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Fun Technology Care Twitter Alerts SQL Server Hard Drives Deep Learning Download Net Neutrality Financial Data Error History Business Communications Domains Browsers Smartwatch Education Connectivity IT Scams Social Engineering Break Fix Hybrid Work Remote Computing Azure Refrigeration Upload Procurement Mobile Computing Social Network Telework Cyber security Human Resources Multi-Factor Security Tech Public Speaking Lithium-ion battery CES Tablet IoT Communitications Cables Search Dark Web Alert Entrepreneur Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Google Apps Dark Data Google Calendar Term Legal Data Analysis IT solutions Star Wars IT Assessment IT Maintenance How To Microsoft Excel Business Intelligence Notifications Staff Value Undo Business Growth Gamification Flexibility Organization Travel Social Networking Shortcuts Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Cortana Alt Codes Content Remote Working Vendors Wearable Technology Memory Health IT Downtime Unified Threat Management Motherboard Data Breach Be Proactive Comparison Google Play Permissions Application Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Workforce Typing Threats Wasting Time Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras IBM Meta Knowledge Fraud Google Drive User Error Microchip Internet Exlporer Software as a Service

Blog Archive