Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Saving Money Communication Cybersecurity Productivity Data Backup Managed Service Smartphone Android Upgrade Smartphones VoIP Business Management AI Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Automation Information Artificial Intelligence Facebook Gadgets Holiday Training Cloud Computing Miscellaneous Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Windows 10 Office Business Continuity Data Management Government Blockchain Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Apps Two-factor Authentication Vendor Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App BYOD Information Technology Access Control Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing How To BDR Conferencing WiFi Computing Virtual Private Network Risk Management Health Analytics Office Tips Computers Augmented Reality Router Retail Website Storage Password Healthcare Bring Your Own Device Help Desk Managed IT Services 2FA Operating System Big Data Cooperation Display Printer Paperless Office Infrastructure Customer Service Document Management Remote Workers Scam Data loss Monitoring Firewall Free Resource Project Management Windows 7 Going Green Patch Management Save Money Remote Monitoring Windows 11 The Internet of Things End of Support Microsoft 365 Vulnerability Telephone Vendor Management Cybercrime Solutions Social Physical Security Excel Cryptocurrency Employees Integration Computer Repair Customer Relationship Management Virtual Desktop Telephone System LiFi Cost Management Data storage Holidays Hacking Data Storage Presentation Outlook Machine Learning Video Conferencing Money Data Privacy Wireless Technology Managed Services Provider Humor Virtual Machines Professional Services Modem User Tip Maintenance Processor Mobile Security Antivirus Sports Mouse Word iPhone Smart Technology Administration Vulnerabilities Saving Time Images 101 Robot Safety Managed IT Service Mobility Settings Multi-Factor Authentication Downloads Printing Wireless Content Filtering IT Management Supply Chain Licensing VPN YouTube Meetings Entertainment Trend Micro Security Cameras Trends Workplace IBM 5G Regulations Software as a Service Google Calendar Point of Sale Customer Resource management Hiring/Firing Unified Communications Data Analysis Experience Star Wars Paperless Microsoft Excel Managing Costs Google Docs eCommerce SSID Bitcoin Network Management Running Cable Tech Support Gamification Co-managed IT Staff Monitors Social Networking Surveillance Legislation Virtual Assistant Google Wallet Technology Care Fileless Malware Business Communications Competition Virtual Machine Medical IT Windows 8 Laptop Websites Content Scams Reviews Wearable Technology Motherboard Development Comparison Transportation Drones Health IT Hybrid Work Directions Electronic Medical Records Assessment Human Resources Permissions Hypervisor SharePoint Optimization User PowerPoint Halloween Cables Shopping Writing Specifications Employer/Employee Relationships Lenovo Navigation Microchip Virtual Reality Internet Exlporer Google Apps PCI DSS Fraud Hacks Server Management Scary Stories Private Cloud Username IT Maintenance Gig Economy IP Address Business Intelligence Fun Internet Service Provider Black Friday Teamwork Superfish Identity Theft Evernote Deep Learning Twitter Database Shortcuts Regulations Compliance Memes Recovery Error Ransmoware IT Technicians Vendors Social Engineering Cookies Net Neutrality Hard Drives Cyber Monday SQL Server Education Proxy Server Remote Computing Tactics Be Proactive Financial Data Domains Hotspot History IT Mobile Computing Workforce Smartwatch Mirgation Threats Search Nanotechnology Procurement Refrigeration Azure Tablet Tech Best Practice Alert Addiction Workplace Strategies Telework Public Speaking Language Cyber security Chatbots Communitications Managed IT Buisness File Sharing Management Meta CES Dark Data Lithium-ion battery Amazon How To Screen Reader Supply Chain Management Distributed Denial of Service Legal Entrepreneur IT solutions Term Business Growth Notifications Service Level Agreement FinTech Computing Infrastructure Identity IT Assessment Travel Outsource IT Google Maps Bookmark Environment Cortana Smart Tech Media Flexibility Undo Value Techology Alt Codes Download Organization Alerts Smart Devices Downtime Unified Threat Management Small Businesses Digital Security Cameras Browsers Displays Connectivity Remote Working Break Fix Memory Unified Threat Management Hosted Solution Google Play Typing Upload Data Breach Videos Network Congestion Electronic Health Records Application Multi-Factor Security Social Network Outsourcing Knowledge IoT Dark Web Wasting Time Google Drive User Error

Blog Archive