Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Cybersecurity Productivity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Business Management Smartphones AI VoIP Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Cloud Computing Miscellaneous Gadgets Holiday Training Covid-19 Server Managed Service Provider Remote Work Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Apps Two-factor Authentication Vendor Mobile Office Data Security App BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Mobile Device Management Budget Networking Gmail Apple Computing Information Technology Access Control Hacker HIPAA Avoiding Downtime Office 365 Applications Marketing How To BDR Conferencing WiFi Big Data Operating System 2FA Healthcare Virtual Private Network Health Risk Management Computers Router Office Tips Website Analytics Retail Augmented Reality Storage Help Desk Password Managed IT Services Bring Your Own Device Remote Monitoring Telephone End of Support Vulnerability Going Green Vendor Management Social Windows 11 Physical Security Remote Workers Cooperation Display Cybercrime Printer Excel Paperless Office Customer Service Infrastructure Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Data loss Monitoring Firewall Patch Management The Internet of Things Save Money Video Conferencing Managed Services Provider Downloads Virtual Machines Professional Services Licensing IT Management Settings VPN Meetings Entertainment Printing Wireless Content Filtering Customer Relationship Management Supply Chain Computer Repair YouTube iPhone Telephone System Cryptocurrency Hacking Cost Management Vulnerabilities Presentation Images 101 Virtual Desktop Data storage Machine Learning Wireless Technology LiFi Multi-Factor Authentication Mobility Outlook User Tip Modem Maintenance Data Privacy Processor Money Mobile Security Antivirus Humor Word Employees Integration Sports Smart Technology Mouse Safety Saving Time Holidays Administration Robot Data Storage Managed IT Service Alerts Employer/Employee Relationships Amazon Legal Download IT solutions Business Growth PCI DSS Navigation Unified Threat Management Outsource IT Browsers Application Gig Economy Connectivity Break Fix Unified Threat Management Cortana Teamwork Environment Media Upload Internet Service Provider Social Network Alt Codes Network Congestion Regulations Compliance Multi-Factor Security Evernote IBM Small Businesses IoT Downtime Memes Dark Web User Error SQL Server Displays Trends Hosted Solution Net Neutrality Customer Resource management Typing Financial Data Regulations History Google Calendar Point of Sale Outsourcing Data Analysis Smartwatch Star Wars IT Microsoft Excel Staff Knowledge Azure Network Management Google Drive Tech Support Competition Gamification Procurement Monitors Telework Social Networking Cyber security Legislation Tech Workplace Hiring/Firing Fileless Malware CES Communitications 5G Wearable Technology Experience Google Docs Websites Paperless Content Unified Communications Supply Chain Management Co-managed IT Health IT Bitcoin User FinTech Motherboard Running Cable Comparison Term Technology Care Directions Google Wallet Electronic Medical Records Assessment IT Assessment Permissions SharePoint Value Business Communications Flexibility Scams Windows 8 Writing Organization Laptop Specifications Lenovo IP Address Hybrid Work Microchip Drones Virtual Reality Digital Security Cameras Internet Exlporer Smart Devices Fraud Memory Server Management Private Cloud Human Resources Username Remote Working Cables Recovery Halloween Data Breach Black Friday Google Play Superfish Identity Theft Twitter Hard Drives Videos Database Electronic Health Records IT Technicians Wasting Time Error Domains Google Apps IT Maintenance Proxy Server Hacks Social Engineering Cookies Scary Stories Trend Micro Cyber Monday Security Cameras Business Intelligence Remote Computing Refrigeration Tactics Software as a Service Hotspot Fun Mirgation Managing Costs Public Speaking Shortcuts Deep Learning Lithium-ion battery Ransmoware Nanotechnology eCommerce SSID Tablet Virtual Assistant Vendors Alert Addiction Education Entrepreneur Surveillance Language Chatbots Virtual Machine Managed IT File Sharing Be Proactive Management Dark Data Workforce Mobile Computing How To Reviews Screen Reader Distributed Denial of Service Medical IT Transportation Threats Notifications Undo Service Level Agreement Development Computing Infrastructure Search Best Practice Identity Hypervisor Travel Workplace Strategies Google Maps Meta Bookmark Shopping Smart Tech Buisness Optimization PowerPoint Techology

Blog Archive