Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Facebook Information Automation Artificial Intelligence Cloud Computing Covid-19 Miscellaneous Gadgets Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Budget Mobile Device Management Networking Apple Gmail App BYOD Employer-Employee Relationship Tip of the week Managed Services Chrome Voice over Internet Protocol Marketing How To BDR HIPAA WiFi Applications Computing Information Technology Access Control Hacker Office 365 Conferencing Avoiding Downtime Website Healthcare Storage Password Bring Your Own Device Managed IT Services Router Big Data Operating System Virtual Private Network Risk Management Help Desk Health 2FA Computers Office Tips Analytics Augmented Reality Retail Scam Data loss Cooperation Free Resource Firewall Project Management Windows 7 Patch Management Save Money Microsoft 365 Going Green Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Solutions Social Cybercrime Physical Security Display Printer Paperless Office Monitoring Windows 11 Infrastructure Customer Service Excel Document Management Telephone Remote Workers Maintenance Licensing Antivirus iPhone Word Entertainment Sports Mouse Vulnerabilities Data Privacy Administration Telephone System Images 101 Cost Management Robot Safety Multi-Factor Authentication Mobility Settings Printing IT Management Wireless Content Filtering Employees VPN Meetings User Tip Modem Integration Mobile Security Processor YouTube Cryptocurrency Computer Repair Customer Relationship Management Holidays Smart Technology Virtual Desktop Data Storage Supply Chain Hacking Data storage LiFi Saving Time Video Conferencing Presentation Managed Services Provider Machine Learning Virtual Machines Professional Services Outlook Wireless Technology Managed IT Service Money Downloads Humor SQL Server Hacks Browsers Scary Stories Twitter Connectivity Net Neutrality Technology Care Break Fix Fun Financial Data History Business Communications Recovery Error Upload Deep Learning Social Network Smartwatch Social Engineering IT Scams Hard Drives Multi-Factor Security Azure Remote Computing IoT Procurement Hybrid Work Domains Dark Web Trends Telework Cyber security Human Resources Tech Education Tablet Customer Resource management CES Regulations Communitications Cables Refrigeration Google Calendar Microsoft Excel Mobile Computing Data Analysis Alert Star Wars Supply Chain Management Public Speaking Gamification Search FinTech Dark Data Lithium-ion battery Staff Google Apps Term Managed IT File Sharing Best Practice How To Social Networking IT Assessment IT Maintenance Legislation Entrepreneur Value Fileless Malware Buisness Notifications Flexibility Business Intelligence Content Organization Wearable Technology Shortcuts Legal IT solutions Travel Business Growth Google Maps Health IT Digital Security Cameras Motherboard Smart Devices Ransmoware Undo Comparison Techology Permissions Memory Directions Assessment Remote Working Vendors Cortana Data Breach Be Proactive Google Play Unified Threat Management Alt Codes Videos Electronic Health Records Workforce Specifications Unified Threat Management Fraud Wasting Time Microchip Downtime Internet Exlporer Threats Username Network Congestion Trend Micro Workplace Strategies Application Security Cameras Hosted Solution Typing Software as a Service Meta Black Friday User Error Managing Costs Database Amazon IBM Knowledge IT Technicians eCommerce SSID Google Drive Point of Sale Proxy Server Cookies Surveillance Outsource IT Cyber Monday Virtual Assistant Hotspot Virtual Machine Media Network Management Tech Support Tactics 5G Environment Experience Reviews Monitors Mirgation Medical IT Google Docs Unified Communications Bitcoin Running Cable Nanotechnology Development Small Businesses Competition Transportation Displays Language Hypervisor Google Wallet Websites Addiction Management Shopping Chatbots Optimization PowerPoint SharePoint Windows 8 Laptop Electronic Medical Records Screen Reader Outsourcing Distributed Denial of Service Employer/Employee Relationships Computing Infrastructure User Navigation Drones Service Level Agreement PCI DSS Gig Economy Writing Identity Workplace Lenovo Bookmark Halloween Virtual Reality Smart Tech Internet Service Provider Hiring/Firing Teamwork Regulations Compliance IP Address Alerts Paperless Evernote Server Management Private Cloud Download Identity Theft Memes Co-managed IT Superfish

Blog Archive