Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Bandwidth Virtualization Blockchain Wi-Fi Business Technology Windows 10 Data Security Managed Services Apps Vendor Two-factor Authentication Mobile Office Gmail Budget WiFi Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Conferencing Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Retail Storage Password 2FA Bring Your Own Device Big Data Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Managed IT Service Windows 11 Telephone The Internet of Things Scam Data loss Excel Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Customer Service Vendor Management Cybercrime Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Monitoring Firewall Document Management Holidays Safety Maintenance Sports Downloads Antivirus Mouse Data Storage Supply Chain Licensing Video Conferencing Entertainment Administration Managed Services Provider Virtual Machines Professional Services Telephone System Robot Customer Relationship Management Cost Management Settings iPhone Printing Wireless Content Filtering Vulnerabilities Hacking IT Management Presentation VPN YouTube Meetings Data Privacy Cryptocurrency Images 101 Wireless Technology User Tip Modem Mobility Processor Computer Repair Mobile Security Multi-Factor Authentication Virtual Desktop Data storage LiFi Word Smart Technology Outlook Employees Machine Learning Integration Money Saving Time Humor Entrepreneur Scary Stories Private Cloud Identity Surveillance Virtual Assistant Outsource IT Hacks Server Management Media Superfish Bookmark Identity Theft Smart Tech Fun Virtual Machine Environment Medical IT Deep Learning Download Reviews Twitter Alerts Error Development Transportation Small Businesses Undo Browsers Education Connectivity Social Engineering Break Fix Hypervisor Displays Optimization PowerPoint Upload Shopping Remote Computing Multi-Factor Security Employer/Employee Relationships Outsourcing Mobile Computing Social Network Navigation Tablet IoT PCI DSS Search Dark Web Workplace Application Best Practice Trends Gig Economy Alert Buisness File Sharing Regulations Internet Service Provider Dark Data Google Calendar Teamwork Hiring/Firing Managed IT Customer Resource management Evernote Paperless IBM Legal Data Analysis IT solutions Star Wars Regulations Compliance How To Microsoft Excel Memes Co-managed IT Business Growth Gamification Notifications Staff Travel Social Networking Net Neutrality Legislation SQL Server Technology Care Business Communications Techology Fileless Malware Google Maps Financial Data Cortana History Wearable Technology IT Scams Alt Codes Content Smartwatch Competition Health IT Downtime Unified Threat Management Motherboard Procurement Comparison Azure Hybrid Work Tech Human Resources Unified Threat Management Directions Hosted Solution Assessment Telework Permissions Cyber security Communitications Cables Typing CES Supply Chain Management Network Congestion Specifications Term Google Apps Google Drive User Error Microchip User Internet Exlporer FinTech Knowledge Fraud IT Assessment IT Maintenance Username Point of Sale Flexibility 5G Black Friday Value Business Intelligence Shortcuts IP Address Google Docs Unified Communications Database Organization Experience Running Cable Tech Support IT Technicians Smart Devices Ransmoware Bitcoin Network Management Digital Security Cameras Google Wallet Proxy Server Cookies Remote Working Monitors Cyber Monday Memory Vendors Google Play Be Proactive Recovery Tactics Hotspot Data Breach Videos Laptop Websites Mirgation Electronic Health Records Workforce Hard Drives Windows 8 Domains Drones Nanotechnology Wasting Time Threats Trend Micro Security Cameras Workplace Strategies SharePoint Addiction Electronic Medical Records Language Halloween Chatbots Software as a Service Meta Refrigeration Management Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Managing Costs Amazon eCommerce SSID Lithium-ion battery Service Level Agreement Virtual Reality Computing Infrastructure

Blog Archive