Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Wi-Fi Business Technology Bandwidth Data Security Vendor Apps Two-factor Authentication Mobile Office App Networking Gmail WiFi Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Chrome Budget Tip of the week Apple Mobile Device Management How To BDR Computing Information Technology HIPAA Applications Office 365 Access Control Hacker Avoiding Downtime Conferencing Marketing Managed IT Services 2FA Operating System Big Data Risk Management Healthcare Router Physical Security Virtual Private Network Analytics Office Tips Health Augmented Reality Computers Help Desk Storage Password Website Retail Bring Your Own Device Windows 11 Firewall Going Green Cooperation Excel The Internet of Things Patch Management Cybercrime Save Money Remote Monitoring Remote Workers End of Support Vulnerability Social Vendor Management Display Free Resource Printer Project Management Paperless Office Customer Service Windows 7 Infrastructure Monitoring Microsoft 365 Document Management Solutions Telephone Scam Data loss Holidays Entertainment Data Storage Supply Chain Safety Settings Video Conferencing Printing Managed Services Provider Wireless Robot Virtual Machines Professional Services Content Filtering Telephone System Cost Management YouTube Cryptocurrency IT Management Meetings iPhone VPN Virtual Desktop Modem Data storage LiFi Customer Relationship Management Vulnerabilities User Tip Data Privacy Processor Computer Repair Mobile Security Images 101 Outlook Hacking Money Multi-Factor Authentication Presentation Mobility Humor Smart Technology Wireless Technology Machine Learning Saving Time Sports Employees Mouse Managed IT Service Integration Maintenance Downloads Administration Antivirus Word Licensing Reviews Legal Multi-Factor Security IT solutions Public Speaking Medical IT Social Network Transportation Small Businesses Tablet IoT Dark Web Development Business Growth Lithium-ion battery Hypervisor Displays Trends Entrepreneur Alert File Sharing Regulations Shopping Dark Data Google Calendar Optimization PowerPoint Cortana Managed IT Customer Resource management Employer/Employee Relationships Outsourcing Data Analysis Star Wars How To Microsoft Excel Alt Codes PCI DSS Downtime Undo Navigation Gamification Notifications Staff Travel Social Networking Gig Economy Legislation Hosted Solution Workplace Teamwork Hiring/Firing Techology Fileless Malware Google Maps Internet Service Provider Typing Regulations Compliance Evernote Paperless Content Wearable Technology Unified Threat Management Motherboard Google Drive Comparison Memes Co-managed IT Knowledge Health IT SQL Server Technology Care Unified Threat Management Directions Application Assessment Permissions Net Neutrality Financial Data History Business Communications 5G Smartwatch Google Docs Network Congestion Specifications IT Unified Communications IBM Scams Experience Azure Hybrid Work Running Cable User Error Microchip Internet Exlporer Fraud Procurement Bitcoin Telework Google Wallet Cyber security Tech Human Resources Username Point of Sale CES Black Friday Communitications Cables Laptop Database Supply Chain Management Windows 8 FinTech Drones Competition Term Google Apps Network Management Tech Support IT Technicians Cookies Monitors Cyber Monday IT Assessment IT Maintenance Proxy Server Value Business Intelligence Halloween Tactics Hotspot Flexibility Organization Shortcuts Websites Mirgation User Nanotechnology Digital Security Cameras Smart Devices Ransmoware Memory Vendors Scary Stories SharePoint Addiction Electronic Medical Records Language Remote Working Hacks Data Breach Google Play Be Proactive Fun Management Chatbots Lenovo Screen Reader Videos Writing Distributed Denial of Service Electronic Health Records Deep Learning IP Address Workforce Wasting Time Threats Service Level Agreement Virtual Reality Computing Infrastructure Private Cloud Identity Trend Micro Education Security Cameras Workplace Strategies Server Management Superfish Bookmark Recovery Identity Theft Smart Tech Software as a Service Meta Managing Costs Amazon Hard Drives Download Twitter Alerts Mobile Computing Error eCommerce Domains SSID Search Browsers Connectivity Social Engineering Break Fix Surveillance Best Practice Virtual Assistant Outsource IT Virtual Machine Environment Buisness Refrigeration Media Upload Remote Computing

Blog Archive