Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Computer Google Email Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android AI Upgrade Disaster Recovery Data Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics 2FA Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Big Data Managed IT Services Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring Microsoft 365 End of Support Vulnerability Customer Service Vendor Management Cybercrime Solutions Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers Telephone The Internet of Things Scam Data loss Vulnerabilities Data Privacy Robot Images 101 Telephone System Customer Relationship Management Cost Management Multi-Factor Authentication Mobility Settings Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Employees Cryptocurrency User Tip Integration Modem Wireless Technology Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Holidays Word Smart Technology Data Storage Outlook Supply Chain Machine Learning Video Conferencing Money Saving Time Humor Managed Services Provider Professional Services Virtual Machines Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Licensing iPhone Entertainment Administration Telework Cyber security Application Best Practice Trends Tech Human Resources Alert Cables Buisness File Sharing Regulations Dark Data Google Calendar CES Communitications Managed IT Customer Resource management Supply Chain Management IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel FinTech Business Growth Gamification Term Google Apps Notifications Staff IT Maintenance Travel Social Networking Legislation IT Assessment Flexibility Techology Fileless Malware Value Business Intelligence Google Maps Cortana Organization Alt Codes Content Shortcuts Wearable Technology Ransmoware Downtime Unified Threat Management Motherboard Comparison Digital Security Cameras Smart Devices Competition Health IT Remote Working Unified Threat Management Directions Memory Vendors Hosted Solution Assessment Permissions Data Breach Typing Google Play Be Proactive Workforce Network Congestion Specifications Videos Electronic Health Records Google Drive User Error Microchip Wasting Time Threats User Internet Exlporer Knowledge Fraud Trend Micro Username Security Cameras Workplace Strategies Meta Point of Sale 5G Black Friday Software as a Service IP Address Google Docs Managing Costs Amazon Unified Communications Database Experience Running Cable Tech Support IT Technicians eCommerce Bitcoin Network Management SSID Surveillance Google Wallet Proxy Server Virtual Assistant Outsource IT Cookies Monitors Cyber Monday Virtual Machine Environment Recovery Tactics Media Hotspot Medical IT Laptop Websites Mirgation Reviews Hard Drives Windows 8 Development Domains Drones Transportation Small Businesses Nanotechnology SharePoint Hypervisor Displays Addiction Electronic Medical Records Language PowerPoint Halloween Chatbots Shopping Optimization Refrigeration Management Public Speaking Lenovo Employer/Employee Relationships Outsourcing Screen Reader Writing Distributed Denial of Service PCI DSS Lithium-ion battery Service Level Agreement Navigation Virtual Reality Computing Infrastructure Workplace Entrepreneur Scary Stories Private Cloud Identity Gig Economy Hacks Server Management Internet Service Provider Superfish Bookmark Teamwork Hiring/Firing Identity Theft Smart Tech Fun Regulations Compliance Deep Learning Download Evernote Paperless Twitter Alerts Co-managed IT Error Memes Undo Net Neutrality Browsers SQL Server Technology Care Education Connectivity Social Engineering Break Fix Financial Data History Upload Business Communications Remote Computing Scams Multi-Factor Security Smartwatch IT Mobile Computing Social Network Procurement Azure Hybrid Work Tablet IoT Search Dark Web

Blog Archive