Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Data Recovery Smartphones AI VoIP communications Mobile Devices Disaster Recovery Windows Social Media Browser Microsoft Office Managed IT Services Network Tech Term Current Events Remote Internet of Things Information Artificial Intelligence Automation Facebook Miscellaneous Gadgets Cloud Computing Covid-19 Holiday Training Server Remote Work Managed Service Provider Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Apps Data Security Two-factor Authentication Vendor Mobile Office Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Gmail Tip of the week Apple Managed Services Voice over Internet Protocol App How To Computing BDR Information Technology Hacker Office 365 HIPAA Avoiding Downtime Applications Marketing Access Control Conferencing WiFi Big Data Healthcare Operating System Managed IT Services Risk Management Computers Analytics Office Tips Router Augmented Reality Website Virtual Private Network Storage Health Password 2FA Bring Your Own Device Help Desk Retail Going Green Telephone Scam Social Data loss Cybercrime Cooperation Free Resource Project Management Windows 7 Customer Service Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Display Printer Windows 11 Paperless Office Infrastructure Firewall Monitoring Excel Document Management The Internet of Things Remote Workers Maintenance Antivirus Downloads iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities Entertainment Data Privacy YouTube Customer Relationship Management Cryptocurrency Images 101 Telephone System Multi-Factor Authentication Robot Mobility Hacking Cost Management Presentation Virtual Desktop LiFi Data storage IT Management Wireless Technology VPN Employees Meetings Outlook Integration Money User Tip Modem Humor Computer Repair Mobile Security Processor Word Holidays Sports Data Storage Mouse Smart Technology Supply Chain Video Conferencing Administration Machine Learning Managed Services Provider Professional Services Safety Saving Time Virtual Machines Managed IT Service Download Net Neutrality Twitter Alerts SQL Server Technology Care Cortana Financial Data Error History Business Communications Social Engineering Break Fix Scams Alt Codes Application Browsers Smartwatch Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Downtime IBM Hosted Solution Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Typing CES Tablet IoT Communitications Trends Supply Chain Management Alert Knowledge Managed IT Customer Resource management FinTech File Sharing Regulations Google Drive Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment 5G Gamification Flexibility Notifications Staff Value Business Intelligence Competition Unified Communications Experience Organization Travel Social Networking Google Docs Legislation Shortcuts Ransmoware Bitcoin Running Cable Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Google Wallet User Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Windows 8 Laptop Unified Threat Management Directions Videos Assessment Electronic Health Records Wasting Time Threats Drones IP Address Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Fraud Meta Halloween User Error Microchip Username Managing Costs Amazon Black Friday SSID Recovery Point of Sale eCommerce Database Surveillance Virtual Assistant Outsource IT Hacks Hard Drives Scary Stories Fun Network Management Tech Support IT Technicians Virtual Machine Environment Media Domains Monitors Cyber Monday Medical IT Deep Learning Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Refrigeration Education Websites Mirgation Hypervisor Displays Public Speaking PowerPoint Lithium-ion battery Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Mobile Computing SharePoint Entrepreneur Search Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Best Practice Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Undo Buisness IT solutions Server Management Regulations Compliance Private Cloud Identity Legal Evernote Paperless Co-managed IT Business Growth Superfish Bookmark Identity Theft Smart Tech Memes

Blog Archive