Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy Workplace Tips IT Services Email Computer Google Phishing Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Facebook Miscellaneous Artificial Intelligence Information Holiday Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Virtualization Blockchain Bandwidth Two-factor Authentication Data Security Apps Vendor Mobile Office Mobile Device Management Tip of the week Gmail WiFi Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Managed Services Voice over Internet Protocol Computing Conferencing Information Technology Office 365 How To BDR HIPAA Applications Hacker Avoiding Downtime Marketing Access Control 2FA Risk Management Retail Analytics Office Tips Big Data Augmented Reality Managed IT Services Storage Password Router Bring Your Own Device Computers Physical Security Help Desk Virtual Private Network Website Healthcare Operating System Health Free Resource Firewall Telephone Project Management Excel Document Management Windows 7 Microsoft 365 Cooperation The Internet of Things Scam Solutions Data loss Social Patch Management Save Money Customer Service Remote Monitoring End of Support Vulnerability Vendor Management Monitoring Going Green Remote Workers Display Printer Paperless Office Windows 11 Cybercrime Infrastructure YouTube Managed IT Service Supply Chain Vulnerabilities Cryptocurrency Machine Learning Downloads Images 101 Licensing Virtual Desktop Multi-Factor Authentication Mobility Safety Data storage LiFi Entertainment Maintenance Antivirus Outlook Money Employees Telephone System Humor Cost Management Integration Data Privacy Sports Customer Relationship Management Mouse Robot Holidays Data Storage Hacking Administration User Tip Modem Mobile Security Presentation Processor Video Conferencing Managed Services Provider IT Management Meetings Virtual Machines Professional Services VPN Wireless Technology Smart Technology Computer Repair Settings Printing Wireless Saving Time Content Filtering iPhone Word Telework Displays Cyber security Identity Tech Websites Refrigeration Google Drive CES Bookmark Communitications Knowledge Smart Tech Outsourcing Download SharePoint Alerts Public Speaking Electronic Medical Records Supply Chain Management FinTech 5G Term Lithium-ion battery Lenovo Break Fix Google Docs Entrepreneur Writing Unified Communications Browsers IT Assessment Experience Workplace Connectivity Running Cable Hiring/Firing Upload Value Virtual Reality Bitcoin Flexibility Private Cloud Google Wallet Organization Social Network Paperless Server Management Multi-Factor Security Superfish Dark Web Undo Identity Theft Digital Security Cameras Smart Devices Co-managed IT IoT Laptop Technology Care Trends Memory Twitter Windows 8 Remote Working Error Drones Customer Resource management Data Breach Business Communications Regulations Google Play Google Calendar Microsoft Excel Videos Social Engineering Data Analysis Electronic Health Records Scams Star Wars Halloween Hybrid Work Gamification Wasting Time Staff Remote Computing Trend Micro Human Resources Social Networking Security Cameras Legislation Application Tablet Fileless Malware Software as a Service Cables Scary Stories Content Managing Costs Wearable Technology IBM Alert Hacks File Sharing Dark Data Health IT eCommerce Fun Google Apps Motherboard SSID Managed IT Comparison Virtual Assistant Permissions How To Deep Learning Directions Surveillance IT Maintenance Assessment Business Intelligence Virtual Machine Notifications Travel Reviews Education Shortcuts Medical IT Specifications Transportation Techology Fraud Competition Google Maps Microchip Development Ransmoware Internet Exlporer Vendors Username Hypervisor Mobile Computing Unified Threat Management Shopping Optimization Search Be Proactive PowerPoint Black Friday Employer/Employee Relationships Unified Threat Management Best Practice Workforce Database PCI DSS Buisness Threats IT Technicians Navigation User Legal Gig Economy Network Congestion IT solutions Proxy Server Workplace Strategies Cookies Cyber Monday Tactics Teamwork User Error Hotspot Business Growth Internet Service Provider Meta Regulations Compliance Amazon Mirgation Evernote IP Address Point of Sale Memes Cortana Nanotechnology Addiction SQL Server Language Alt Codes Net Neutrality Outsource IT Financial Data Downtime Environment Management History Media Chatbots Network Management Recovery Tech Support Distributed Denial of Service Hard Drives Smartwatch Monitors Hosted Solution IT Screen Reader Small Businesses Service Level Agreement Azure Computing Infrastructure Domains Typing Procurement

Blog Archive