Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Smartphone Productivity Data Backup Managed Service Android Upgrade VoIP Business Management Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Office Windows 10 Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Bring Your Own Device Managed IT Services 2FA Big Data Operating System Healthcare Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Scam Data loss Windows 11 The Internet of Things Cooperation Excel Social Going Green Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Solutions Document Management Firewall Telephone Mouse Licensing Holidays Safety Entertainment Administration Data Storage Supply Chain Video Conferencing Managed Services Provider Robot Virtual Machines Professional Services Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings iPhone VPN Cryptocurrency Modem Hacking Vulnerabilities User Tip Data Privacy Processor Presentation Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Money Saving Time Humor Word Employees Integration Managed IT Service Maintenance Sports Downloads Antivirus Virtual Assistant Outsource IT Browsers Education Connectivity Social Engineering Break Fix Entrepreneur Surveillance Virtual Machine Environment Media Upload Remote Computing Multi-Factor Security Reviews Medical IT Mobile Computing Social Network Transportation Small Businesses Tablet IoT Undo Search Dark Web Development Hypervisor Displays Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Shopping Optimization PowerPoint Managed IT Customer Resource management Employer/Employee Relationships Outsourcing Legal Data Analysis IT solutions Star Wars How To Microsoft Excel PCI DSS Navigation Business Growth Gamification Notifications Staff Travel Social Networking Application Legislation Gig Economy Workplace Teamwork Hiring/Firing Techology Fileless Malware Google Maps Cortana Internet Service Provider Regulations Compliance Evernote Paperless Alt Codes Content IBM Wearable Technology Downtime Unified Threat Management Motherboard Comparison Memes Co-managed IT Health IT SQL Server Technology Care Unified Threat Management Directions Hosted Solution Assessment Permissions Net Neutrality Financial Data History Business Communications Typing Network Congestion Specifications Smartwatch IT Scams Azure Hybrid Work Google Drive User Error Microchip Internet Exlporer Competition Knowledge Fraud Procurement Telework Cyber security Tech Human Resources Username Point of Sale 5G Black Friday CES Communitications Cables Google Docs Unified Communications Database Experience Supply Chain Management User FinTech Term Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Monitors Cyber Monday IT Assessment IT Maintenance Google Wallet Proxy Server Flexibility Value Business Intelligence Tactics Hotspot Organization Shortcuts Windows 8 IP Address Laptop Websites Mirgation Ransmoware Drones Nanotechnology Digital Security Cameras Smart Devices Remote Working Memory Vendors SharePoint Addiction Electronic Medical Records Language Halloween Chatbots Recovery Data Breach Google Play Be Proactive Management Workforce Lenovo Screen Reader Hard Drives Writing Distributed Denial of Service Videos Electronic Health Records Wasting Time Threats Service Level Agreement Domains Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Trend Micro Security Cameras Workplace Strategies Hacks Server Management Meta Superfish Bookmark Identity Theft Smart Tech Refrigeration Fun Software as a Service Managing Costs Amazon Deep Learning Download Public Speaking Twitter Alerts Error eCommerce SSID Lithium-ion battery

Blog Archive