Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Disaster Recovery AI Upgrade Data Recovery VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Windows 10 Business Technology Wi-Fi Virtualization Data Security Mobile Office Vendor Apps Two-factor Authentication Budget Apple BYOD Mobile Device Management App Gmail WiFi Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome BDR Avoiding Downtime Marketing HIPAA Applications Access Control Computing Information Technology Conferencing Office 365 How To Hacker Storage Password Website Bring Your Own Device Router Virtual Private Network Health Operating System Help Desk Big Data 2FA Risk Management Retail Healthcare Analytics Office Tips Managed IT Services Computers Augmented Reality Free Resource Project Management Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Vendor Management Solutions Physical Security Firewall Display Going Green Printer Paperless Office Infrastructure The Internet of Things Monitoring Cybercrime Windows 11 Document Management Social Excel Remote Workers Telephone Scam Data loss Customer Service Cooperation Wireless Technology Images 101 Robot Telephone System Data Privacy Sports Cost Management Mouse Multi-Factor Authentication Mobility IT Management Word Administration VPN Meetings Employees Modem User Tip Integration Computer Repair Processor Mobile Security Settings Safety Printing Wireless Holidays Content Filtering Smart Technology Data Storage YouTube Machine Learning Saving Time Video Conferencing Cryptocurrency Managed Services Provider Supply Chain Virtual Machines Professional Services Managed IT Service Maintenance Virtual Desktop Downloads Customer Relationship Management Antivirus Data storage LiFi Licensing Outlook iPhone Entertainment Hacking Presentation Money Humor Vulnerabilities How To Data Analysis Scary Stories Star Wars Human Resources Microsoft Excel Supply Chain Management Hacks FinTech Notifications Gamification Cables Term Fun Staff Social Networking Legislation IP Address Travel IT Assessment Deep Learning Fileless Malware Value Google Apps Techology Google Maps Flexibility Organization Education Content IT Maintenance Wearable Technology Motherboard Comparison Digital Security Cameras Recovery Unified Threat Management Smart Devices Health IT Business Intelligence Mobile Computing Directions Memory Assessment Shortcuts Permissions Unified Threat Management Hard Drives Remote Working Domains Data Breach Ransmoware Google Play Search Specifications Videos Electronic Health Records Best Practice Network Congestion Vendors Microchip Wasting Time Buisness Internet Exlporer Be Proactive Fraud User Error Refrigeration Public Speaking Legal Trend Micro IT solutions Username Workforce Security Cameras Black Friday Lithium-ion battery Point of Sale Software as a Service Business Growth Threats Entrepreneur Managing Costs Database Workplace Strategies Network Management Tech Support eCommerce Meta SSID Cortana IT Technicians Cookies Cyber Monday Surveillance Alt Codes Monitors Proxy Server Amazon Virtual Assistant Virtual Machine Downtime Tactics Hotspot Undo Reviews Websites Hosted Solution Outsource IT Medical IT Mirgation Environment Transportation Nanotechnology Media Development Typing Electronic Medical Records Hypervisor Addiction Language SharePoint Shopping Google Drive Optimization Management Small Businesses PowerPoint Knowledge Chatbots Writing Displays Employer/Employee Relationships Screen Reader Distributed Denial of Service Lenovo Application PCI DSS Virtual Reality Service Level Agreement Navigation 5G Computing Infrastructure Identity IBM Server Management Gig Economy Google Docs Private Cloud Unified Communications Outsourcing Experience Bookmark Teamwork Running Cable Smart Tech Superfish Identity Theft Internet Service Provider Bitcoin Regulations Compliance Google Wallet Twitter Download Workplace Evernote Alerts Error Memes Hiring/Firing Social Engineering Browsers SQL Server Laptop Connectivity Paperless Break Fix Net Neutrality Windows 8 Competition Financial Data Drones Remote Computing History Upload Co-managed IT Multi-Factor Security Smartwatch IT Social Network Technology Care Azure Halloween IoT Business Communications Dark Web Tablet Procurement Telework Alert Cyber security Trends Scams Tech Regulations Google Calendar Managed IT CES User File Sharing Communitications Dark Data Customer Resource management Hybrid Work

Blog Archive