Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Workplace Tips Email Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android AI Upgrade Business Management Disaster Recovery Smartphones VoIP Data Recovery Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Artificial Intelligence Facebook Automation Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Encryption Employee/Employer Relationship IT Support Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Apps Data Security Mobile Office Vendor Two-factor Authentication Tip of the week Apple Employer-Employee Relationship App Networking Managed Services BYOD Voice over Internet Protocol Mobile Device Management Gmail Chrome Budget Conferencing How To Hacker BDR Computing Avoiding Downtime Information Technology Marketing HIPAA Applications Office 365 Access Control WiFi Storage Big Data Password Bring Your Own Device Retail Managed IT Services Computers Operating System 2FA Website Risk Management Router Healthcare Virtual Private Network Analytics Office Tips Augmented Reality Health Help Desk Microsoft 365 Document Management Social Solutions Telephone Scam Data loss Going Green Customer Service Windows 11 Cooperation Cybercrime Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Vendor Management Remote Workers Physical Security Firewall Display Printer Paperless Office Free Resource Infrastructure Project Management Windows 7 The Internet of Things Monitoring Multi-Factor Authentication Mobility Machine Learning Sports Saving Time Mouse Administration Managed IT Service Employees Maintenance Integration Downloads Customer Relationship Management Antivirus Licensing Entertainment Hacking Settings Presentation Holidays Printing Wireless Data Storage Content Filtering Supply Chain Wireless Technology Telephone System Video Conferencing YouTube Robot Cost Management Managed Services Provider Professional Services Cryptocurrency Virtual Machines Word IT Management VPN Meetings Virtual Desktop Data storage LiFi iPhone User Tip Modem Processor Outlook Computer Repair Mobile Security Vulnerabilities Safety Money Data Privacy Humor Images 101 Smart Technology SharePoint Organization Addiction Deep Learning Electronic Medical Records Language Shortcuts Smart Devices Chatbots Ransmoware Digital Security Cameras Management Lenovo Remote Working Application Screen Reader Education Memory Vendors Writing Distributed Denial of Service Google Play Be Proactive Service Level Agreement Data Breach Virtual Reality Computing Infrastructure Mobile Computing Electronic Health Records Private Cloud Identity Workforce Videos IBM Server Management Superfish Bookmark Identity Theft Smart Tech Wasting Time Threats Search Security Cameras Workplace Strategies Download Best Practice Trend Micro Twitter Alerts Software as a Service Error Buisness Meta Browsers Legal Connectivity IT solutions Managing Costs Amazon Social Engineering Break Fix SSID Competition Upload Business Growth eCommerce Remote Computing Surveillance Virtual Assistant Outsource IT Multi-Factor Security Social Network Tablet IoT Virtual Machine Environment Dark Web Cortana Media Medical IT Reviews Trends Alt Codes Alert Development User File Sharing Regulations Downtime Transportation Small Businesses Dark Data Google Calendar Managed IT Customer Resource management Data Analysis Star Wars Hosted Solution Hypervisor Displays How To Microsoft Excel PowerPoint Shopping Gamification Typing Optimization Notifications Staff Travel Social Networking Employer/Employee Relationships Outsourcing Legislation IP Address Techology Fileless Malware Google Drive PCI DSS Google Maps Knowledge Navigation Wearable Technology Workplace Gig Economy Content Health IT Internet Service Provider Recovery Unified Threat Management Motherboard Teamwork Hiring/Firing Comparison 5G Unified Threat Management Directions Google Docs Regulations Compliance Hard Drives Assessment Unified Communications Permissions Experience Evernote Paperless Running Cable Co-managed IT Domains Bitcoin Memes Google Wallet Net Neutrality SQL Server Technology Care Network Congestion Specifications User Error Microchip Financial Data Refrigeration Internet Exlporer History Fraud Business Communications Laptop Scams Smartwatch Public Speaking Username Windows 8 IT Lithium-ion battery Drones Procurement Point of Sale Azure Hybrid Work Black Friday Telework Database Cyber security Entrepreneur Tech Human Resources Tech Support IT Technicians Halloween Cables CES Network Management Communitications Proxy Server Supply Chain Management Cookies Monitors Cyber Monday FinTech Undo Tactics Hotspot Term Google Apps Websites Mirgation Scary Stories IT Maintenance Hacks IT Assessment Flexibility Nanotechnology Value Business Intelligence Fun

Blog Archive