Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade Business Management VoIP Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Holiday Information Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Office Windows 10 Government IT Support Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Mobile Device Management Chrome Gmail Budget Apple Networking App Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week HIPAA Applications WiFi How To BDR Operating System Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Remote Workers Cybercrime Telephone Physical Security Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Social Windows 11 Monitoring Video Conferencing Robot Managed Services Provider Customer Relationship Management Professional Services Saving Time Settings Virtual Machines Wireless Printing Content Filtering Managed IT Service Hacking IT Management Presentation VPN YouTube Meetings Downloads iPhone Cryptocurrency Licensing Wireless Technology Computer Repair Vulnerabilities Entertainment Data Privacy Virtual Desktop Data storage LiFi Images 101 Word Outlook Telephone System Multi-Factor Authentication Mobility Machine Learning Cost Management Money Humor Safety Maintenance Employees Integration Antivirus Sports Mouse User Tip Modem Mobile Security Processor Administration Holidays Data Storage Smart Technology Supply Chain Addiction Language Employer/Employee Relationships Outsourcing Travel Google Maps Management PCI DSS Cortana Chatbots Navigation Techology Distributed Denial of Service Workplace Alt Codes Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Downtime Unified Threat Management Hosted Solution Regulations Compliance Identity Evernote Paperless Unified Threat Management Co-managed IT Typing Bookmark Smart Tech Memes Download Net Neutrality Network Congestion Alerts SQL Server Technology Care User Financial Data Knowledge History Business Communications Google Drive User Error Break Fix Scams Browsers Smartwatch Connectivity IT Upload Procurement 5G Azure Hybrid Work Point of Sale Unified Communications Social Network Telework Experience Cyber security Multi-Factor Security Tech Human Resources IP Address Google Docs Dark Web Cables Bitcoin Network Management CES Running Cable Tech Support IoT Communitications Trends Supply Chain Management Monitors Google Wallet Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Hard Drives Windows 8 Data Analysis Laptop Websites Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Domains Drones SharePoint Organization Electronic Medical Records Social Networking Legislation Shortcuts Ransmoware Refrigeration Fileless Malware Digital Security Cameras Halloween Smart Devices Content Remote Working Writing Wearable Technology Memory Vendors Public Speaking Lenovo Lithium-ion battery Health IT Virtual Reality Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Hacks Server Management Directions Videos Entrepreneur Scary Stories Private Cloud Assessment Electronic Health Records Identity Theft Fun Wasting Time Threats Superfish Deep Learning Twitter Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Undo Microchip Error Internet Exlporer Software as a Service Education Username Social Engineering Managing Costs Amazon Remote Computing eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance Tablet Search IT Technicians Virtual Machine Environment Media Application Best Practice Proxy Server Reviews Alert Cookies Cyber Monday Medical IT Dark Data Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Tactics Development IT solutions How To Mirgation Hypervisor Displays IBM Legal Business Growth Shopping Notifications Nanotechnology Optimization PowerPoint

Blog Archive