Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Workplace Tips Privacy Email Computer Google Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Facebook Information Miscellaneous Artificial Intelligence Holiday Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Blockchain Virtualization Bandwidth Two-factor Authentication Vendor Apps Data Security Mobile Office Gmail Tip of the week WiFi Chrome Employer-Employee Relationship Networking Budget Apple Managed Services Voice over Internet Protocol BYOD App Mobile Device Management Computing Access Control Information Technology HIPAA Office 365 Applications How To BDR Hacker Conferencing Avoiding Downtime Marketing Health Risk Management Router Big Data Retail Analytics Office Tips Augmented Reality Managed IT Services 2FA Storage Password Help Desk Bring Your Own Device Computers Healthcare Website Physical Security Virtual Private Network Operating System Windows 7 Paperless Office Firewall Infrastructure Microsoft 365 Solutions The Internet of Things Document Management Social Scam Data loss Windows 11 Monitoring Customer Service Excel Patch Management Save Money Remote Monitoring Vulnerability End of Support Remote Workers Vendor Management Telephone Going Green Display Printer Cooperation Free Resource Cybercrime Project Management YouTube Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Mobility Cost Management Safety Machine Learning Virtual Desktop Data storage LiFi Employees Integration Maintenance Outlook User Tip Modem Antivirus Mobile Security Money Processor Humor Holidays Customer Relationship Management Data Storage Smart Technology Supply Chain Sports Video Conferencing Mouse Hacking Managed Services Provider Professional Services Presentation Robot Saving Time Virtual Machines Administration Managed IT Service Wireless Technology IT Management Downloads VPN iPhone Meetings Licensing Settings Vulnerabilities Printing Word Entertainment Wireless Content Filtering Data Privacy Computer Repair Microsoft Excel IT Maintenance Public Speaking Monitors Data Analysis Star Wars IT Assessment Knowledge Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Google Drive Websites Entrepreneur Organization Social Networking Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras 5G Smart Devices Experience Content Remote Working SharePoint Wearable Technology Memory Vendors Google Docs Electronic Medical Records Unified Communications Undo Bitcoin Running Cable Health IT Motherboard Data Breach Comparison Google Play Be Proactive Lenovo Permissions Workforce Google Wallet Writing Directions Videos Assessment Electronic Health Records Wasting Time Threats Virtual Reality Private Cloud Windows 8 Laptop Trend Micro Server Management Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Drones Microchip Username Managing Costs Amazon Application Twitter Black Friday SSID Error Halloween eCommerce Database Surveillance Virtual Assistant Outsource IT IBM Social Engineering IT Technicians Virtual Machine Environment Media Remote Computing Cyber Monday Medical IT Hacks Scary Stories Proxy Server Reviews Cookies Fun Tactics Development Hotspot Transportation Small Businesses Tablet Alert Deep Learning Mirgation Hypervisor Displays Managed IT PowerPoint Competition File Sharing Dark Data Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing How To Education Notifications Management PCI DSS Chatbots Navigation Distributed Denial of Service Workplace Travel Mobile Computing Gig Economy Screen Reader Search Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps User Best Practice Regulations Compliance Identity Evernote Paperless Co-managed IT Unified Threat Management Buisness Bookmark Smart Tech Memes Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care IP Address Legal IT solutions Business Growth Financial Data History Business Communications Break Fix Scams Network Congestion Browsers Smartwatch Connectivity IT Cortana Upload Procurement User Error Azure Hybrid Work Recovery Hard Drives Alt Codes Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Domains Point of Sale Downtime CES IoT Communitications Trends Supply Chain Management Hosted Solution Refrigeration Tech Support Typing Customer Resource management FinTech Regulations Network Management Google Calendar Term Google Apps

Blog Archive