Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Blockchain Wi-Fi Apps Data Security Vendor Mobile Office Two-factor Authentication Chrome Gmail Tip of the week Budget Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Conferencing WiFi How To BDR HIPAA Applications Hacker Computing Avoiding Downtime Information Technology Marketing Access Control Office 365 Office Tips Analytics Augmented Reality Storage Password Retail Bring Your Own Device Big Data Managed IT Services Router Operating System Computers Risk Management Healthcare Website Help Desk Virtual Private Network 2FA Health Firewall Windows 7 Microsoft 365 Telephone Document Management Solutions The Internet of Things Cooperation Social Scam Data loss Going Green Patch Management Customer Service Save Money Remote Monitoring Cybercrime End of Support Vulnerability Vendor Management Remote Workers Physical Security Windows 11 Monitoring Display Printer Paperless Office Free Resource Infrastructure Excel Project Management Outlook Images 101 Managed IT Service Money Multi-Factor Authentication Mobility Downloads Humor Machine Learning Safety Licensing Entertainment Sports Mouse Maintenance Employees Integration Antivirus Data Privacy Administration Telephone System Cost Management Holidays Customer Relationship Management Data Storage Video Conferencing Settings Robot Printing Hacking Managed Services Provider Wireless Professional Services Presentation Virtual Machines Content Filtering User Tip Modem Processor YouTube Mobile Security IT Management Wireless Technology VPN Cryptocurrency Meetings iPhone Smart Technology Virtual Desktop Computer Repair Word Vulnerabilities Data storage Supply Chain LiFi Saving Time Identity Workplace Websites Public Speaking IT Assessment Lithium-ion battery Flexibility Bookmark Halloween Value Smart Tech Hiring/Firing SharePoint Paperless Organization Electronic Medical Records Download Entrepreneur Alerts Co-managed IT Digital Security Cameras Smart Devices Hacks Remote Working Browsers Scary Stories Writing Memory Connectivity Break Fix Lenovo Technology Care Business Communications Virtual Reality Undo Data Breach Upload Fun Google Play Social Network Multi-Factor Security Server Management Scams Videos Deep Learning Private Cloud Electronic Health Records Identity Theft Wasting Time IoT Dark Web Superfish Hybrid Work Human Resources Education Twitter Trend Micro Trends Security Cameras Customer Resource management Regulations Google Calendar Cables Error Software as a Service Mobile Computing Data Analysis Social Engineering Application Managing Costs Star Wars Microsoft Excel Staff Google Apps Remote Computing eCommerce Gamification Search SSID Virtual Assistant Social Networking Legislation IT Maintenance Best Practice IBM Surveillance Tablet Fileless Malware Buisness Virtual Machine Business Intelligence Wearable Technology Legal Shortcuts Reviews IT solutions Alert Content Medical IT Health IT Dark Data Transportation Motherboard Comparison Managed IT Ransmoware Business Growth File Sharing Development Directions How To Hypervisor Assessment Permissions Vendors Be Proactive Shopping Notifications Competition Optimization Cortana PowerPoint Employer/Employee Relationships Specifications Workforce Alt Codes Travel Threats Google Maps PCI DSS Microchip Downtime Internet Exlporer Navigation Fraud Techology Workplace Strategies Gig Economy Hosted Solution Username Internet Service Provider User Teamwork Black Friday Meta Typing Unified Threat Management Amazon Regulations Compliance Database Evernote Unified Threat Management IT Technicians Google Drive Memes Knowledge Net Neutrality Proxy Server Network Congestion SQL Server Cookies Cyber Monday Outsource IT IP Address User Error Environment Media Financial Data History Tactics 5G Hotspot Mirgation Google Docs Smartwatch Unified Communications IT Experience Point of Sale Procurement Running Cable Recovery Azure Nanotechnology Small Businesses Bitcoin Displays Google Wallet Telework Hard Drives Cyber security Addiction Tech Language Chatbots Network Management CES Tech Support Domains Communitications Management Windows 8 Supply Chain Management Laptop Monitors Screen Reader Distributed Denial of Service Outsourcing Drones FinTech Refrigeration Service Level Agreement Term Computing Infrastructure

Blog Archive