Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Workplace Strategy Hosted Solutions Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Holiday Information Automation Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Business Technology Virtualization Wi-Fi Data Security Mobile Office Vendor Apps Two-factor Authentication Networking Managed Services Voice over Internet Protocol Chrome Budget BYOD Apple Mobile Device Management App Gmail WiFi Tip of the week Employer-Employee Relationship Office 365 Conferencing How To BDR Hacker Avoiding Downtime Marketing Access Control HIPAA Applications Computing Information Technology Managed IT Services Office Tips Analytics Computers Augmented Reality Healthcare Storage Password Website Bring Your Own Device Virtual Private Network Health Router Operating System Big Data Risk Management Retail 2FA Help Desk Customer Service Remote Workers Telephone Patch Management Save Money Remote Monitoring Vulnerability End of Support Cooperation Free Resource Vendor Management Project Management Windows 7 Physical Security Microsoft 365 Display Printer Firewall Solutions Going Green Paperless Office Infrastructure The Internet of Things Cybercrime Document Management Social Windows 11 Monitoring Scam Data loss Excel Professional Services Saving Time Virtual Machines Outlook Managed IT Service Hacking Money Presentation Humor Downloads iPhone Robot Licensing Wireless Technology Vulnerabilities Sports Entertainment Data Privacy Mouse IT Management VPN Meetings Images 101 Administration Word Telephone System Multi-Factor Authentication Mobility Cost Management Computer Repair Settings Employees Safety Integration Printing Wireless Content Filtering Machine Learning User Tip Modem Mobile Security YouTube Processor Cryptocurrency Holidays Data Storage Maintenance Smart Technology Supply Chain Antivirus Video Conferencing Virtual Desktop Managed Services Provider Data storage Customer Relationship Management LiFi Distributed Denial of Service Workplace Windows 8 Laptop Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Drones Tablet Competition Regulations Compliance Identity Evernote Paperless Alert Co-managed IT File Sharing Halloween Dark Data Bookmark Smart Tech Memes Managed IT Download Net Neutrality Alerts SQL Server Technology Care How To User Financial Data History Business Communications Notifications Break Fix Scams Hacks Travel Scary Stories Browsers Smartwatch Connectivity IT Upload Procurement Techology Azure Hybrid Work Google Maps Fun Social Network Telework Cyber security IP Address Multi-Factor Security Tech Human Resources Deep Learning Dark Web Cables Unified Threat Management CES IoT Communitications Trends Supply Chain Management Unified Threat Management Education Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Mobile Computing Hard Drives Network Congestion Data Analysis Star Wars IT Assessment Gamification Flexibility User Error Staff Value Business Intelligence Domains Search Organization Social Networking Legislation Shortcuts Best Practice Ransmoware Point of Sale Refrigeration Buisness Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Legal Public Speaking IT solutions Tech Support Health IT Motherboard Data Breach Network Management Lithium-ion battery Comparison Google Play Be Proactive Business Growth Permissions Workforce Monitors Entrepreneur Directions Videos Assessment Electronic Health Records Wasting Time Threats Cortana Alt Codes Websites Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Undo Downtime Microchip Internet Exlporer Software as a Service Username SharePoint Managing Costs Amazon Hosted Solution Electronic Medical Records Typing eCommerce Black Friday SSID Lenovo Virtual Assistant Outsource IT Writing Database Surveillance Knowledge IT Technicians Virtual Machine Environment Google Drive Media Virtual Reality Private Cloud Application Proxy Server Reviews Cookies Server Management Cyber Monday Medical IT Tactics Development Superfish Hotspot Transportation Small Businesses Identity Theft 5G Experience Mirgation Hypervisor Displays Google Docs IBM Unified Communications Twitter PowerPoint Bitcoin Error Running Cable Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Google Wallet Social Engineering Management PCI DSS Chatbots Navigation Remote Computing

Blog Archive