Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Compliance Covid-19 Gadgets Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Managed Services Mobile Office Data Security Apps BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Password Managed IT Services How To BDR Operating System Computers Router 2FA Risk Management Virtual Private Network Website Health Healthcare Help Desk Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Big Data Customer Service Windows 11 Vendor Management Cybercrime Excel Display Printer Paperless Office Infrastructure Remote Workers Monitoring Firewall Document Management Free Resource Managed IT Service Project Management Windows 7 Telephone The Internet of Things Scam Data loss Microsoft 365 Solutions Social Cooperation Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Holidays Content Filtering Hacking IT Management YouTube Meetings Data Storage Presentation VPN Supply Chain Video Conferencing Cryptocurrency Modem Wireless Technology User Tip Managed Services Provider Processor Virtual Machines Professional Services Computer Repair Mobile Security Virtual Desktop Data storage LiFi Word Smart Technology Outlook iPhone Machine Learning Money Saving Time Humor Vulnerabilities Data Privacy Safety Maintenance Images 101 Downloads Antivirus Sports Mobility Mouse Multi-Factor Authentication Licensing Administration Entertainment Employees Integration Robot Telephone System Cost Management Customer Relationship Management Settings Wireless Printing Unified Threat Management Directions Hosted Solution Assessment Medical IT Permissions Reviews Development Typing Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Google Drive User Error Microchip Optimization User Internet Exlporer PowerPoint Knowledge Fraud Shopping Username Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Black Friday PCI DSS IP Address Google Docs Unified Communications Database Workplace Experience Gig Economy Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians Cookies Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Memes Recovery Tactics Co-managed IT Hotspot Net Neutrality Hard Drives Windows 8 SQL Server Technology Care Laptop Websites Mirgation Nanotechnology Business Communications Financial Data Domains Drones History SharePoint IT Addiction Scams Electronic Medical Records Language Smartwatch Procurement Refrigeration Management Azure Hybrid Work Halloween Chatbots Screen Reader Tech Human Resources Writing Distributed Denial of Service Telework Public Speaking Lenovo Cyber security Lithium-ion battery Communitications Service Level Agreement Cables Virtual Reality Computing Infrastructure CES Supply Chain Management Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Identity Theft Smart Tech Term Google Apps Fun FinTech Superfish Bookmark IT Assessment Deep Learning Download IT Maintenance Twitter Alerts Flexibility Undo Value Business Intelligence Error Education Connectivity Shortcuts Social Engineering Break Fix Organization Browsers Smart Devices Upload Ransmoware Remote Computing Digital Security Cameras Multi-Factor Security Remote Working Mobile Computing Social Network Memory Vendors Tablet IoT Google Play Be Proactive Search Dark Web Data Breach Videos Electronic Health Records Application Best Practice Trends Workforce Alert Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats Buisness File Sharing Regulations Trend Micro IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel IBM Legal Data Analysis Software as a Service Business Growth Gamification Meta Notifications Staff Legislation Managing Costs Amazon Travel Social Networking Techology Fileless Malware eCommerce Google Maps SSID Cortana Surveillance Alt Codes Content Virtual Assistant Outsource IT Wearable Technology Downtime Unified Threat Management Motherboard Media Comparison Competition Health IT Virtual Machine Environment

Blog Archive