Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Ransomware Backup Small Business Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery AI Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Automation Facebook Miscellaneous Information Holiday Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Business Technology Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Chrome Managed Services Voice over Internet Protocol Budget Tip of the week Mobile Device Management Apple Gmail App WiFi Networking Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Conferencing How To BDR Computing HIPAA Information Technology Applications Hacker Office 365 Augmented Reality Help Desk Health Website Storage Password Healthcare Bring Your Own Device Retail Managed IT Services Big Data Operating System Risk Management Router Physical Security Computers Virtual Private Network Analytics Office Tips 2FA Paperless Office Monitoring Excel Infrastructure Remote Workers Document Management Firewall Telephone Free Resource Project Management Scam Windows 7 Data loss Going Green The Internet of Things Cooperation Microsoft 365 Solutions Social Cybercrime Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Customer Service Windows 11 Display Printer Money Virtual Machines Professional Services Smart Technology Humor Saving Time Sports Word Machine Learning iPhone Mouse Managed IT Service Vulnerabilities Downloads Administration Maintenance Antivirus Licensing Images 101 Safety Data Privacy Entertainment Multi-Factor Authentication Mobility Settings Printing Wireless Content Filtering Telephone System Cost Management Robot Employees YouTube Integration Cryptocurrency Customer Relationship Management IT Management Meetings Holidays Virtual Desktop VPN User Tip Hacking Modem Data storage LiFi Data Storage Processor Presentation Mobile Security Computer Repair Outlook Video Conferencing Wireless Technology Managed Services Provider Supply Chain Mirgation Monitors Gig Economy IP Address Outsourcing Internet Service Provider Teamwork Nanotechnology Regulations Compliance Hacks Scary Stories Addiction Workplace Evernote Language Websites Fun Chatbots Memes Management Hiring/Firing Recovery Net Neutrality Deep Learning Hard Drives SharePoint SQL Server Screen Reader Paperless Distributed Denial of Service Electronic Medical Records Financial Data Domains History Service Level Agreement Co-managed IT Computing Infrastructure Identity Writing Smartwatch IT Education Technology Care Lenovo Procurement Bookmark Refrigeration Azure Smart Tech Business Communications Virtual Reality Telework Mobile Computing Public Speaking Cyber security Download Scams Server Management Tech Alerts Private Cloud Superfish Search Identity Theft CES Lithium-ion battery Communitications Hybrid Work Supply Chain Management Best Practice Browsers Connectivity Human Resources Entrepreneur Break Fix Twitter Error FinTech Buisness Upload Cables Term Multi-Factor Security Social Engineering Legal IT Assessment IT solutions Social Network Flexibility Business Growth Undo Value IoT Google Apps Dark Web Remote Computing Organization Trends IT Maintenance Cortana Regulations Tablet Google Calendar Digital Security Cameras Smart Devices Customer Resource management Business Intelligence Remote Working Alt Codes Data Analysis Memory Star Wars Shortcuts Microsoft Excel Alert File Sharing Dark Data Data Breach Downtime Gamification Ransmoware Managed IT Google Play Staff Application Social Networking Legislation How To Videos Electronic Health Records Hosted Solution Vendors Typing Fileless Malware Wasting Time Be Proactive Notifications Travel IBM Trend Micro Content Workforce Security Cameras Wearable Technology Health IT Threats Techology Knowledge Motherboard Google Maps Comparison Google Drive Software as a Service Directions Managing Costs Assessment Workplace Strategies Permissions Unified Threat Management eCommerce Meta SSID 5G Amazon Unified Threat Management Virtual Assistant Experience Specifications Google Docs Surveillance Unified Communications Bitcoin Microchip Competition Virtual Machine Running Cable Internet Exlporer Fraud Network Congestion Reviews Google Wallet Username Outsource IT Medical IT Environment User Error Transportation Media Black Friday Development Windows 8 Hypervisor Laptop Database IT Technicians Point of Sale Shopping Drones Optimization Small Businesses User PowerPoint Proxy Server Displays Employer/Employee Relationships Cookies Cyber Monday PCI DSS Halloween Tactics Network Management Navigation Hotspot Tech Support

Blog Archive