Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Phishing Google Email Workplace Tips Privacy Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device AI Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Artificial Intelligence Automation Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Wi-Fi Blockchain Windows 10 Business Technology Bandwidth Managed Services Apps Data Security Vendor Two-factor Authentication Mobile Office Tip of the week WiFi Voice over Internet Protocol Apple App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Gmail Budget Password Conferencing Managed IT Services How To BDR Computing Hacker Information Technology Avoiding Downtime HIPAA Marketing Physical Security Applications Office 365 Access Control Storage Bring Your Own Device Retail Big Data Healthcare Operating System Computers Risk Management Router Website 2FA Virtual Private Network Analytics Office Tips Augmented Reality Health Help Desk Document Management The Internet of Things Remote Workers Managed IT Service Social Telephone Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Customer Service Cybercrime Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Windows 11 Display Printer Excel Paperless Office Firewall Infrastructure Monitoring Video Conferencing Safety Machine Learning Managed Services Provider Sports Saving Time Virtual Machines Professional Services Mouse Administration Data Privacy Maintenance Downloads Antivirus iPhone Licensing Entertainment Vulnerabilities Customer Relationship Management Settings Printing Wireless Images 101 Content Filtering Hacking Multi-Factor Authentication Robot Mobility Presentation YouTube Telephone System Cost Management Cryptocurrency Wireless Technology IT Management Meetings Virtual Desktop VPN Employees LiFi Integration Data storage Modem Word Supply Chain User Tip Processor Computer Repair Mobile Security Outlook Holidays Money Humor Data Storage Smart Technology Deep Learning Technology Care SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Undo Business Communications Management PCI DSS Scams Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Education Hybrid Work Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Evernote Mobile Computing Human Resources Server Management Regulations Compliance Cables Superfish Bookmark Search Identity Theft Smart Tech Memes Application Best Practice Download Net Neutrality Twitter Alerts SQL Server Error History Buisness Google Apps Financial Data IT Maintenance Browsers Smartwatch Connectivity IT Social Engineering Break Fix IBM Legal IT solutions Business Growth Business Intelligence Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech Shortcuts Social Network Telework Ransmoware CES Cortana Tablet IoT Communitications Dark Web Alt Codes Vendors Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Competition Downtime Be Proactive Managed IT Customer Resource management FinTech Workforce Data Analysis Star Wars IT Assessment How To Microsoft Excel Hosted Solution Typing Threats Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Workplace Strategies Organization Meta Techology Fileless Malware Digital Security Cameras Knowledge Google Maps Smart Devices Google Drive User Amazon Content Remote Working Wearable Technology Memory Unified Threat Management Motherboard Data Breach Comparison Google Play Health IT 5G Outsource IT Unified Threat Management Directions Videos Experience Assessment Electronic Health Records Permissions IP Address Google Docs Unified Communications Bitcoin Environment Running Cable Media Wasting Time Trend Micro Network Congestion Specifications Security Cameras Google Wallet Small Businesses User Error Microchip Internet Exlporer Software as a Service Fraud Recovery Hard Drives Windows 8 Displays Laptop Username Managing Costs Point of Sale eCommerce Black Friday SSID Domains Drones Outsourcing Database Surveillance Virtual Assistant Refrigeration Halloween Network Management Tech Support IT Technicians Virtual Machine Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Public Speaking Workplace Hiring/Firing Tactics Development Hotspot Transportation Lithium-ion battery Websites Mirgation Hypervisor Hacks Entrepreneur Scary Stories Paperless Co-managed IT Shopping Fun Nanotechnology Optimization PowerPoint

Blog Archive