Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Cybersecurity Communication Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Facebook Automation Cloud Computing Holiday Training Miscellaneous Gadgets Covid-19 Remote Work Server Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Spam Encryption Office Windows 10 Government Data Management Business Continuity Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Business Technology Mobile Office Two-factor Authentication Data Security Vendor Apps Networking Mobile Device Management Managed Services Chrome Gmail BYOD Voice over Internet Protocol Budget Apple Employer-Employee Relationship App Tip of the week Hacker Computing Avoiding Downtime Information Technology How To Marketing BDR Office 365 HIPAA Applications WiFi Access Control Conferencing Computers Operating System Managed IT Services Risk Management Website 2FA Analytics Office Tips Router Augmented Reality Healthcare Storage Virtual Private Network Password Big Data Bring Your Own Device Help Desk Health Retail Cybercrime Cooperation Scam Data loss Windows 11 Patch Management Save Money Excel Firewall Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Physical Security The Internet of Things Display Monitoring Printer Free Resource Social Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Document Management Going Green Telephone Customer Service Solutions Employees Maintenance Content Filtering Presentation Antivirus Entertainment Integration YouTube Wireless Technology Cryptocurrency Holidays Telephone System Cost Management Virtual Desktop Data Storage Word Data storage LiFi Supply Chain Robot Video Conferencing Managed Services Provider Outlook Virtual Machines Professional Services Money IT Management Humor User Tip Modem Safety Mobile Security VPN Meetings Processor iPhone Sports Mouse Computer Repair Smart Technology Vulnerabilities Data Privacy Administration Images 101 Saving Time Multi-Factor Authentication Mobility Customer Relationship Management Managed IT Service Machine Learning Downloads Settings Printing Wireless Licensing Hacking Multi-Factor Security Trend Micro Twitter Hosted Solution Social Network Security Cameras Workplace Strategies IoT Dark Web User Software as a Service Error Typing Meta Managing Costs Amazon Social Engineering Trends Google Calendar Google Drive eCommerce Remote Computing Customer Resource management SSID Knowledge Regulations Outsource IT Star Wars IP Address Microsoft Excel Surveillance Data Analysis Virtual Assistant Tablet Virtual Machine Environment Gamification Media 5G Staff Legislation Reviews Google Docs Alert Unified Communications Medical IT Experience Social Networking Small Businesses Dark Data Running Cable Recovery Managed IT Development File Sharing Bitcoin Fileless Malware Transportation Google Wallet Hypervisor Displays How To Content Wearable Technology Hard Drives Comparison Shopping Optimization Notifications Health IT PowerPoint Motherboard Domains Outsourcing Laptop Assessment Permissions Travel Windows 8 Directions Employer/Employee Relationships Google Maps Drones Navigation Refrigeration Techology PCI DSS Specifications Gig Economy Workplace Public Speaking Hiring/Firing Halloween Internet Exlporer Lithium-ion battery Fraud Internet Service Provider Unified Threat Management Microchip Teamwork Username Evernote Paperless Unified Threat Management Entrepreneur Regulations Compliance Black Friday Memes Co-managed IT Technology Care Network Congestion Scary Stories Database Net Neutrality Hacks SQL Server Financial Data History Business Communications Fun IT Technicians Undo User Error Cyber Monday Smartwatch IT Deep Learning Proxy Server Scams Cookies Azure Hybrid Work Tactics Hotspot Procurement Point of Sale Telework Cyber security Education Tech Human Resources Mirgation CES Network Management Communitications Tech Support Cables Nanotechnology Mobile Computing Monitors Addiction Language Application Supply Chain Management FinTech Management Term Google Apps Search Chatbots Screen Reader IBM Distributed Denial of Service IT Assessment Websites Best Practice IT Maintenance Value Business Intelligence Buisness Service Level Agreement Computing Infrastructure Flexibility SharePoint Organization Legal Electronic Medical Records IT solutions Shortcuts Identity Smart Tech Digital Security Cameras Smart Devices Business Growth Bookmark Ransmoware Memory Vendors Writing Download Alerts Lenovo Remote Working Data Breach Virtual Reality Google Play Be Proactive Cortana Competition Connectivity Break Fix Videos Server Management Electronic Health Records Private Cloud Alt Codes Browsers Workforce Identity Theft Wasting Time Threats Downtime Upload Superfish

Blog Archive