Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Holiday Information Automation Facebook Miscellaneous Cloud Computing Training Gadgets Covid-19 Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Bandwidth Blockchain Business Technology Windows 10 Wi-Fi Virtualization Vendor Mobile Office Two-factor Authentication Data Security Apps Chrome BYOD Budget Apple Managed Services Voice over Internet Protocol Mobile Device Management App Tip of the week Gmail WiFi Networking Employer-Employee Relationship Hacker Avoiding Downtime HIPAA Marketing Applications Access Control Computing Conferencing Information Technology How To BDR Office 365 Augmented Reality Computers 2FA Storage Password Bring Your Own Device Virtual Private Network Router Website Health Healthcare Help Desk Operating System Retail Risk Management Big Data Managed IT Services Analytics Office Tips Customer Service Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management Physical Security Excel Display Printer Paperless Office Remote Workers Infrastructure Firewall Going Green Monitoring Document Management Free Resource Cybercrime Project Management Windows 7 The Internet of Things Scam Microsoft 365 Data loss Social Telephone Solutions Patch Management Cooperation Save Money Money Hacking Humor Telephone System Holidays Presentation Cost Management IT Management Data Storage VPN Meetings Sports Wireless Technology Supply Chain Mouse Video Conferencing Managed Services Provider Virtual Machines Professional Services Computer Repair Administration Word User Tip Modem Mobile Security Processor iPhone Machine Learning Settings Printing Smart Technology Wireless Vulnerabilities Content Filtering Safety Data Privacy Saving Time Images 101 YouTube Maintenance Antivirus Cryptocurrency Multi-Factor Authentication Mobility Managed IT Service Downloads Virtual Desktop LiFi Licensing Data storage Employees Customer Relationship Management Integration Entertainment Robot Outlook Virtual Assistant Outsource IT Data Analysis Star Wars Surveillance Microsoft Excel Staff Virtual Machine Environment Unified Threat Management Media Gamification Hacks Reviews Unified Threat Management Social Networking Scary Stories Legislation Medical IT Fun Transportation Small Businesses User Fileless Malware Development Deep Learning Wearable Technology Hypervisor Displays Network Congestion Content Health IT Shopping User Error Motherboard Optimization Comparison PowerPoint IP Address Employer/Employee Relationships Outsourcing Directions Assessment Education Permissions PCI DSS Point of Sale Navigation Mobile Computing Gig Economy Specifications Workplace Fraud Search Teamwork Hiring/Firing Tech Support Recovery Microchip Internet Exlporer Internet Service Provider Network Management Username Best Practice Regulations Compliance Hard Drives Evernote Paperless Monitors Buisness Memes Black Friday Domains Co-managed IT SQL Server Technology Care Websites Legal Database IT solutions Net Neutrality Business Growth Financial Data IT Technicians History Refrigeration Business Communications Electronic Medical Records Proxy Server Smartwatch SharePoint Cookies IT Cyber Monday Public Speaking Scams Hotspot Cortana Lithium-ion battery Azure Hybrid Work Tactics Procurement Alt Codes Telework Lenovo Mirgation Cyber security Tech Human Resources Writing Entrepreneur Virtual Reality CES Nanotechnology Downtime Communitications Cables Supply Chain Management Server Management Language Private Cloud Addiction Hosted Solution Management Typing FinTech Superfish Chatbots Identity Theft Undo Term Google Apps IT Maintenance Twitter Screen Reader IT Assessment Distributed Denial of Service Flexibility Computing Infrastructure Knowledge Value Business Intelligence Error Google Drive Service Level Agreement Organization Identity Shortcuts Social Engineering Ransmoware Remote Computing Bookmark Digital Security Cameras Smart Tech Smart Devices 5G Remote Working Alerts Experience Memory Vendors Application Google Docs Download Unified Communications Bitcoin Running Cable Data Breach Tablet Google Play Be Proactive IBM Workforce Alert Browsers Google Wallet Videos Connectivity Electronic Health Records Break Fix Managed IT Wasting Time Threats File Sharing Dark Data Upload Social Network Windows 8 Laptop Trend Micro Multi-Factor Security Security Cameras Workplace Strategies How To Meta Notifications Drones IoT Software as a Service Dark Web Managing Costs Amazon Travel Trends Customer Resource management Techology Regulations Halloween eCommerce Google Maps Google Calendar Competition SSID

Blog Archive