Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Google Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Facebook Artificial Intelligence Information Miscellaneous Holiday Automation Cloud Computing Gadgets Training Covid-19 Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Windows 10 Office Data Management Government Business Continuity Windows 10 Blockchain Virtualization Bandwidth Business Technology Wi-Fi Two-factor Authentication Data Security Vendor Apps Mobile Office Mobile Device Management Managed Services Voice over Internet Protocol Networking Gmail Chrome WiFi Budget BYOD Employer-Employee Relationship Apple App Tip of the week Information Technology How To Office 365 BDR HIPAA Applications Access Control Hacker Conferencing Avoiding Downtime Computing Marketing Risk Management Managed IT Services Healthcare Analytics Office Tips Augmented Reality Big Data Router Storage Password Bring Your Own Device Virtual Private Network Help Desk Health Computers Operating System 2FA Website Retail Excel Scam Data loss Cooperation Firewall Remote Workers The Internet of Things Patch Management Save Money Remote Monitoring Free Resource Vulnerability Project Management End of Support Vendor Management Windows 7 Social Physical Security Microsoft 365 Display Solutions Printer Customer Service Paperless Office Monitoring Infrastructure Going Green Windows 11 Document Management Cybercrime Telephone Maintenance Video Conferencing Cryptocurrency Licensing Word Antivirus Managed Services Provider Virtual Machines Professional Services Entertainment Virtual Desktop Data storage LiFi Telephone System iPhone Safety Outlook Cost Management Money Robot Vulnerabilities Humor Data Privacy Images 101 IT Management Sports Mobility Mouse VPN Meetings Multi-Factor Authentication User Tip Modem Processor Mobile Security Customer Relationship Management Administration Computer Repair Employees Integration Hacking Smart Technology Presentation Settings Saving Time Printing Machine Learning Wireless Wireless Technology Content Filtering Holidays Managed IT Service YouTube Data Storage Supply Chain Downloads Browsers Twitter Employer/Employee Relationships Outsourcing Connectivity Hard Drives Break Fix PCI DSS Error 5G Upload Navigation Domains Social Network Social Engineering Workplace Google Docs Multi-Factor Security Unified Communications Gig Economy Experience Running Cable Internet Service Provider Remote Computing Teamwork Hiring/Firing IoT Refrigeration Dark Web Bitcoin Evernote Paperless Public Speaking Google Wallet Regulations Compliance Trends Memes Customer Resource management Co-managed IT Lithium-ion battery Regulations Google Calendar Tablet Entrepreneur Laptop Net Neutrality Data Analysis Alert SQL Server Technology Care Star Wars Microsoft Excel Windows 8 Business Communications Staff Drones Managed IT Financial Data File Sharing History Gamification Dark Data IT How To Scams Social Networking Legislation Smartwatch Halloween Procurement Fileless Malware Notifications Azure Hybrid Work Undo Tech Human Resources Wearable Technology Telework Travel Cyber security Content Communitications Health IT Cables Motherboard Comparison Techology CES Google Maps Hacks Scary Stories Supply Chain Management Directions Assessment Permissions Term Google Apps FinTech Unified Threat Management Fun IT Assessment IT Maintenance Application Specifications Unified Threat Management Deep Learning Flexibility Microchip Value Business Intelligence Internet Exlporer Fraud Shortcuts IBM Education Organization Username Network Congestion Smart Devices Ransmoware Black Friday User Error Digital Security Cameras Mobile Computing Remote Working Memory Vendors Database Google Play Be Proactive IT Technicians Point of Sale Search Data Breach Electronic Health Records Proxy Server Workforce Cookies Cyber Monday Best Practice Videos Network Management Buisness Tech Support Wasting Time Threats Tactics Competition Hotspot Security Cameras Workplace Strategies Mirgation Legal IT solutions Trend Micro Monitors Software as a Service Meta Nanotechnology Business Growth Websites Managing Costs Amazon Addiction Language SSID Chatbots User Cortana eCommerce Management Surveillance Electronic Medical Records Virtual Assistant Outsource IT Screen Reader Distributed Denial of Service SharePoint Alt Codes Downtime Virtual Machine Environment Service Level Agreement Media Computing Infrastructure Writing Medical IT IP Address Identity Lenovo Hosted Solution Reviews Development Bookmark Virtual Reality Transportation Small Businesses Smart Tech Typing Alerts Server Management Private Cloud Hypervisor Displays Download PowerPoint Google Drive Recovery Superfish Shopping Identity Theft Knowledge Optimization

Blog Archive