Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Productivity Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Business Management Smartphones VoIP AI communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Facebook Artificial Intelligence Information Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Employee/Employer Relationship IT Support Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps Vendor Tip of the week Mobile Device Management Gmail Chrome Networking Budget Managed Services Voice over Internet Protocol Employer-Employee Relationship Apple BYOD App Computing Marketing Information Technology Conferencing Office 365 WiFi How To BDR HIPAA Applications Hacker Avoiding Downtime Access Control Website Help Desk Risk Management Retail Analytics Office Tips Augmented Reality Managed IT Services Big Data Storage Password 2FA Healthcare Bring Your Own Device Router Computers Virtual Private Network Operating System Health Monitoring Solutions Document Management Firewall Telephone Scam Data loss The Internet of Things Cooperation Windows 11 Social Remote Workers Patch Management Save Money Remote Monitoring Excel Vulnerability End of Support Vendor Management Free Resource Customer Service Project Management Physical Security Windows 7 Going Green Display Printer Microsoft 365 Paperless Office Infrastructure Cybercrime YouTube Data Privacy Smart Technology Cryptocurrency Employees Word Machine Learning Integration Saving Time Virtual Desktop Data storage LiFi Managed IT Service Holidays Maintenance Antivirus Downloads Safety Outlook Data Storage Licensing Video Conferencing Money Entertainment Managed Services Provider Humor Virtual Machines Professional Services Sports Mouse Robot Telephone System Cost Management Supply Chain iPhone Administration Customer Relationship Management Vulnerabilities IT Management VPN Meetings Hacking Images 101 Presentation Modem User Tip Computer Repair Processor Multi-Factor Authentication Mobility Mobile Security Settings Wireless Wireless Technology Printing Content Filtering Videos Websites Electronic Health Records Mirgation Google Drive Nanotechnology Google Apps Recovery Knowledge Wasting Time Electronic Medical Records Trend Micro Addiction Security Cameras IT Maintenance Hard Drives SharePoint Language 5G Software as a Service Management Business Intelligence Domains Chatbots Google Docs Screen Reader Shortcuts Lenovo Unified Communications Distributed Denial of Service Experience Writing Managing Costs Virtual Reality eCommerce Service Level Agreement SSID Ransmoware Refrigeration Bitcoin Computing Infrastructure Running Cable Server Management Private Cloud Surveillance Virtual Assistant Vendors Public Speaking Google Wallet Identity Lithium-ion battery Smart Tech Be Proactive Superfish Identity Theft Bookmark Virtual Machine Reviews Twitter Download Medical IT Workforce Windows 8 Alerts Entrepreneur Laptop Error Development Transportation Threats Drones Hypervisor Connectivity Workplace Strategies Break Fix Social Engineering Browsers Shopping Remote Computing Optimization Upload PowerPoint Meta Undo Halloween Multi-Factor Security Social Network Employer/Employee Relationships Amazon IoT Navigation Dark Web Tablet PCI DSS Gig Economy Alert Trends Outsource IT Hacks Scary Stories Regulations Media Managed IT Google Calendar File Sharing Fun Internet Service Provider Dark Data Customer Resource management Teamwork Environment Data Analysis Star Wars Evernote Application Deep Learning Microsoft Excel Regulations Compliance How To Notifications Memes Gamification Small Businesses Staff Social Networking Education Legislation Travel Net Neutrality SQL Server Displays IBM Fileless Malware History Techology Google Maps Financial Data Smartwatch IT Content Outsourcing Mobile Computing Wearable Technology Motherboard Comparison Unified Threat Management Search Procurement Health IT Azure Directions Cyber security Assessment Tech Workplace Unified Threat Management Best Practice Permissions Telework Buisness CES Communitications Hiring/Firing Competition Legal Paperless IT solutions Specifications Supply Chain Management Network Congestion Microchip Internet Exlporer Term Co-managed IT User Error Business Growth Fraud FinTech IT Assessment Username Technology Care Business Communications User Black Friday Point of Sale Cortana Flexibility Value Database Scams Alt Codes Organization Network Management Downtime Digital Security Cameras Tech Support Smart Devices Hybrid Work IT Technicians Cookies Human Resources Hosted Solution Cyber Monday Remote Working Monitors Proxy Server Memory IP Address Data Breach Tactics Google Play Cables Typing Hotspot

Blog Archive