Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Passwords Saving Money Quick Tips Managed Service Communication Cybersecurity Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Training Gadgets Cloud Computing Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Managed Services Gmail Budget Voice over Internet Protocol WiFi Networking Apple App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Computing Hacker Applications Information Technology Website Health 2FA Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Big Data Managed IT Services Operating System Computers Router Virtual Private Network Risk Management Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Patch Management Going Green Microsoft 365 Save Money Remote Monitoring Vulnerability End of Support Customer Service Solutions Vendor Management Cybercrime Physical Security Display Processor Mobile Security Computer Repair Holidays Virtual Desktop Data storage LiFi Data Storage Word Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Saving Time Money Virtual Machines Professional Services Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Data Privacy Images 101 Telephone System Multi-Factor Authentication Mobility Robot Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees Meetings YouTube Integration Cryptocurrency Wireless Technology User Tip Modem IP Address Google Docs Database Surveillance Unified Communications Virtual Assistant Outsource IT Experience Tech Support IT Technicians Virtual Machine Environment Running Cable Media Network Management Bitcoin Proxy Server Reviews Google Wallet Cookies Cyber Monday Medical IT Monitors Recovery Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Laptop Hard Drives Windows 8 Domains Shopping Drones Nanotechnology Optimization PowerPoint SharePoint Addiction Language Employer/Employee Relationships Outsourcing Electronic Medical Records Chatbots Halloween Navigation Refrigeration Management PCI DSS Public Speaking Lenovo Gig Economy Screen Reader Distributed Denial of Service Workplace Writing Lithium-ion battery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Entrepreneur Private Cloud Identity Scary Stories Evernote Paperless Server Management Regulations Compliance Hacks Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Fun Download Net Neutrality Deep Learning Alerts SQL Server Technology Care Twitter Error History Business Communications Undo Financial Data Browsers Smartwatch Connectivity IT Education Break Fix Scams Social Engineering Upload Procurement Azure Hybrid Work Remote Computing Cyber security Multi-Factor Security Tech Human Resources Social Network Telework Mobile Computing CES Tablet IoT Communitications Dark Web Cables Search Application Trends Supply Chain Management Best Practice Alert File Sharing Regulations Buisness Google Calendar Term Google Apps Dark Data Managed IT Customer Resource management FinTech IBM Data Analysis Legal Star Wars IT Assessment IT solutions Microsoft Excel IT Maintenance How To Gamification Flexibility Business Growth Staff Value Business Intelligence Notifications Organization Travel Social Networking Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Cortana Wearable Technology Memory Vendors Content Remote Working Alt Codes Competition Health IT Unified Threat Management Motherboard Data Breach Downtime Comparison Google Play Be Proactive Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Permissions Workforce Wasting Time Threats Typing Trend Micro Specifications Security Cameras Workplace Strategies Network Congestion User Error Microchip Google Drive User Internet Exlporer Software as a Service Fraud Meta Knowledge Managing Costs Amazon Username Point of Sale eCommerce Black Friday SSID 5G

Blog Archive