Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Email Workplace Tips Computer Google Phishing Collaboration Workplace Strategy Hosted Solutions Users Small Business Ransomware Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Facebook Miscellaneous Automation Artificial Intelligence Information Training Gadgets Covid-19 Cloud Computing Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Government Data Management Virtualization Wi-Fi Business Technology Bandwidth Blockchain Windows 10 Apps Two-factor Authentication Mobile Office Data Security Vendor WiFi Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Chrome Budget Networking Apple Mobile Device Management App Gmail BYOD Computing Information Technology Access Control Conferencing Office 365 Hacker Avoiding Downtime How To Marketing BDR HIPAA Applications Operating System Virtual Private Network Help Desk Big Data Risk Management Health 2FA Healthcare Analytics Office Tips Retail Computers Augmented Reality Storage Managed IT Services Password Website Bring Your Own Device Router Physical Security The Internet of Things Cybercrime Display Printer Monitoring Social Paperless Office Infrastructure Windows 11 Remote Workers Document Management Excel Telephone Customer Service Free Resource Project Management Windows 7 Scam Cooperation Data loss Microsoft 365 Solutions Patch Management Save Money Firewall Remote Monitoring Vulnerability End of Support Vendor Management Going Green VPN Meetings Processor Holidays Safety Mobile Security Settings Printing Wireless Data Storage Content Filtering YouTube Computer Repair Video Conferencing Managed Services Provider Smart Technology Virtual Machines Cryptocurrency Professional Services Saving Time Virtual Desktop Machine Learning Data storage Customer Relationship Management LiFi Managed IT Service Supply Chain iPhone Downloads Outlook Vulnerabilities Hacking Licensing Money Presentation Maintenance Entertainment Humor Antivirus Images 101 Wireless Technology Multi-Factor Authentication Mobility Sports Mouse Telephone System Cost Management Data Privacy Administration Word Employees Robot Integration User Tip Modem IT Management Reviews Network Congestion Database Alt Codes Medical IT Workforce IT Technicians Transportation Undo Threats Downtime User Error Development Proxy Server Cookies Hypervisor Hosted Solution Cyber Monday Workplace Strategies Point of Sale Shopping Tactics Optimization Typing Hotspot PowerPoint Meta Mirgation Employer/Employee Relationships Amazon Tech Support PCI DSS Google Drive Nanotechnology Navigation Knowledge Network Management Outsource IT Gig Economy Monitors Addiction Language Application Chatbots Teamwork Environment Media 5G Management Internet Service Provider Websites Regulations Compliance Google Docs Screen Reader IBM Unified Communications Distributed Denial of Service Evernote Experience Small Businesses Running Cable Service Level Agreement Memes Bitcoin Computing Infrastructure Net Neutrality Google Wallet Identity SQL Server Displays SharePoint Electronic Medical Records Bookmark Financial Data Smart Tech History Outsourcing Laptop Lenovo Smartwatch Writing Download IT Windows 8 Alerts Procurement Drones Azure Competition Virtual Reality Private Cloud Browsers Telework Connectivity Cyber security Break Fix Tech Workplace Server Management Hiring/Firing Halloween Superfish Identity Theft CES Upload Communitications Supply Chain Management Multi-Factor Security Paperless Twitter Social Network Error FinTech IoT Dark Web Term User Co-managed IT Technology Care Scary Stories Social Engineering Trends IT Assessment Hacks Flexibility Regulations Value Google Calendar Business Communications Fun Remote Computing Customer Resource management Data Analysis Organization Star Wars IP Address Deep Learning Microsoft Excel Scams Hybrid Work Tablet Digital Security Cameras Gamification Smart Devices Staff Remote Working Social Networking Memory Education Legislation Human Resources Alert File Sharing Fileless Malware Dark Data Data Breach Google Play Recovery Cables Managed IT Hard Drives Videos How To Content Electronic Health Records Mobile Computing Wearable Technology Health IT Motherboard Wasting Time Domains Comparison Google Apps Search Notifications Travel Directions Assessment Trend Micro Best Practice Permissions Security Cameras IT Maintenance Refrigeration Business Intelligence Buisness Techology Google Maps Software as a Service Legal Managing Costs Public Speaking IT solutions Specifications Shortcuts Unified Threat Management Microchip Internet Exlporer eCommerce Lithium-ion battery Business Growth Fraud SSID Ransmoware Virtual Assistant Vendors Unified Threat Management Entrepreneur Username Surveillance Virtual Machine Black Friday Be Proactive Cortana

Blog Archive