Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Productivity Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office AI Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Gadgets Cloud Computing Holiday Covid-19 Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 IT Support Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services App Voice over Internet Protocol Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi Healthcare Operating System Router Computers Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password 2FA Bring Your Own Device Big Data Managed IT Services Cooperation Social Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Free Resource Physical Security Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Monitoring Solutions Document Management Firewall Windows 11 Telephone Scam The Internet of Things Data loss Excel Virtual Machines Professional Services Telephone System Robot Cost Management Customer Relationship Management Settings iPhone Printing Wireless Content Filtering IT Management Hacking Vulnerabilities VPN YouTube Meetings Presentation Data Privacy Cryptocurrency Images 101 User Tip Modem Wireless Technology Computer Repair Mobile Security Multi-Factor Authentication Mobility Processor Virtual Desktop Data storage LiFi Smart Technology Word Employees Outlook Machine Learning Integration Money Saving Time Humor Managed IT Service Safety Holidays Maintenance Antivirus Sports Downloads Mouse Data Storage Licensing Supply Chain Video Conferencing Managed Services Provider Entertainment Administration Gig Economy Alert Application Workplace Best Practice Trends Managed IT Customer Resource management Buisness File Sharing Regulations Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Evernote Paperless Legal Data Analysis IT solutions Star Wars IBM Regulations Compliance How To Microsoft Excel Notifications Staff Memes Co-managed IT Business Growth Gamification Travel Social Networking Net Neutrality Legislation SQL Server Technology Care History Business Communications Techology Fileless Malware Google Maps Financial Data Cortana Alt Codes Content Smartwatch Wearable Technology IT Scams Health IT Downtime Unified Threat Management Motherboard Competition Procurement Comparison Azure Hybrid Work Permissions Cyber security Tech Human Resources Unified Threat Management Directions Hosted Solution Assessment Telework Typing CES Communitications Cables Supply Chain Management Network Congestion Specifications Knowledge Fraud User Term Google Apps Google Drive User Error Microchip Internet Exlporer FinTech Username IT Assessment IT Maintenance Point of Sale Flexibility 5G Black Friday Value Business Intelligence Experience Shortcuts Google Docs Unified Communications Database IP Address Organization Bitcoin Network Management Digital Security Cameras Running Cable Tech Support IT Technicians Smart Devices Ransmoware Google Wallet Proxy Server Cookies Remote Working Monitors Cyber Monday Memory Vendors Hotspot Recovery Data Breach Google Play Be Proactive Tactics Windows 8 Videos Laptop Websites Mirgation Hard Drives Electronic Health Records Workforce Drones Nanotechnology Domains Wasting Time Threats Electronic Medical Records Language Trend Micro Security Cameras Workplace Strategies SharePoint Addiction Management Halloween Chatbots Refrigeration Software as a Service Meta Managing Costs Amazon Lenovo Screen Reader Public Speaking Writing Distributed Denial of Service Virtual Reality Computing Infrastructure eCommerce SSID Service Level Agreement Lithium-ion battery Hacks Server Management Scary Stories Private Cloud Identity Surveillance Entrepreneur Virtual Assistant Outsource IT Virtual Machine Environment Media Superfish Bookmark Identity Theft Smart Tech Fun Reviews Twitter Alerts Medical IT Deep Learning Download Error Undo Development Transportation Small Businesses Hypervisor Displays Browsers Education Connectivity Social Engineering Break Fix Shopping Remote Computing Optimization PowerPoint Upload Mobile Computing Social Network Multi-Factor Security Employer/Employee Relationships Outsourcing Navigation Tablet IoT PCI DSS Search Dark Web

Blog Archive