Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade VoIP AI Business Management Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Artificial Intelligence Automation Facebook Information Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT Employee/Employer Relationship Spam IT Support Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Bandwidth Windows 10 Business Technology Blockchain Virtualization Apps Data Security Two-factor Authentication Mobile Office Vendor Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Tip of the week Apple App Networking How To BDR Computing Information Technology Hacker Avoiding Downtime Conferencing Office 365 Marketing Access Control WiFi HIPAA Applications Operating System 2FA Help Desk Risk Management Computers Analytics Office Tips Website Virtual Private Network Healthcare Augmented Reality Health Storage Password Bring Your Own Device Retail Big Data Router Managed IT Services Windows 11 Cybercrime Monitoring Customer Service Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Physical Security Telephone Display Printer Paperless Office Infrastructure Cooperation Free Resource Firewall Project Management Windows 7 Document Management Microsoft 365 The Internet of Things Solutions Scam Social Going Green Data loss Content Filtering Mobile Security Processor Customer Relationship Management YouTube Holidays Supply Chain Cryptocurrency Data Storage Robot Smart Technology Hacking Video Conferencing Presentation Managed Services Provider Professional Services Saving Time Virtual Desktop Virtual Machines LiFi Wireless Technology IT Management Data storage VPN Meetings Managed IT Service Outlook Downloads iPhone Money Computer Repair Licensing Word Humor Data Privacy Vulnerabilities Entertainment Sports Mouse Images 101 Machine Learning Telephone System Multi-Factor Authentication Safety Mobility Administration Cost Management Maintenance Antivirus Employees Integration Settings Printing User Tip Modem Wireless Hosted Solution Database Surveillance Virtual Assistant Alert File Sharing Typing Dark Data IT Technicians Virtual Machine Small Businesses Managed IT Cyber Monday Medical IT Proxy Server Reviews How To Cookies Displays Tactics Development Knowledge Hotspot Transportation Competition Google Drive Notifications Travel Mirgation Hypervisor Outsourcing 5G PowerPoint Techology Google Maps Shopping Nanotechnology Optimization Unified Communications Addiction Experience Language Employer/Employee Relationships Workplace Google Docs Unified Threat Management Bitcoin Management PCI DSS Running Cable Chatbots Hiring/Firing Navigation User Distributed Denial of Service Paperless Unified Threat Management Google Wallet Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Co-managed IT Windows 8 Regulations Compliance Network Congestion Laptop Identity Technology Care IP Address Evernote Business Communications User Error Drones Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Scams Recovery Point of Sale Financial Data Halloween History Hybrid Work Break Fix Human Resources Hard Drives Browsers Smartwatch Connectivity IT Tech Support Upload Procurement Azure Cables Domains Network Management Hacks Social Network Telework Monitors Scary Stories Cyber security Multi-Factor Security Tech Fun Dark Web Google Apps Refrigeration CES IoT Communitications Websites Deep Learning Trends Supply Chain Management IT Maintenance Public Speaking Customer Resource management FinTech Regulations Business Intelligence Lithium-ion battery Google Calendar Term Microsoft Excel Shortcuts SharePoint Entrepreneur Data Analysis Electronic Medical Records Education Star Wars IT Assessment Gamification Flexibility Staff Value Ransmoware Lenovo Mobile Computing Organization Writing Social Networking Vendors Legislation Search Be Proactive Undo Fileless Malware Digital Security Cameras Virtual Reality Smart Devices Private Cloud Best Practice Content Remote Working Wearable Technology Memory Workforce Server Management Superfish Identity Theft Health IT Buisness Motherboard Data Breach Threats Comparison Google Play Permissions Workplace Strategies Legal Directions Videos Twitter IT solutions Assessment Electronic Health Records Error Business Growth Wasting Time Meta Application Social Engineering Trend Micro Amazon Specifications Security Cameras Cortana Fraud Microchip Remote Computing Internet Exlporer Software as a Service Alt Codes Username Managing Costs Outsource IT IBM Media Tablet Downtime eCommerce Environment Black Friday SSID

Blog Archive