Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Backup Collaboration Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server IT Support Managed Service Provider Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Voice over Internet Protocol Budget Gmail Apple Networking How To BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Healthcare 2FA Bring Your Own Device The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Infrastructure Monitoring Document Management Managed IT Service Remote Workers Firewall Windows 11 Telephone Scam Data loss Excel Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management Data Privacy VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Wireless Technology Data storage Data Storage Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Word Humor Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Supply Chain Safety Vulnerabilities Entertainment Administration Best Practice Trends Supply Chain Management Alert Workplace Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Hiring/Firing How To Microsoft Excel Paperless Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Co-managed IT Technology Care Organization Travel Social Networking Application Legislation Google Maps Smart Devices Cortana Business Communications Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working IBM Wearable Technology Memory Scams Comparison Google Play Hybrid Work Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Human Resources Unified Threat Management Directions Videos Typing Wasting Time Cables Network Congestion Specifications Security Cameras Trend Micro Internet Exlporer Software as a Service Competition Knowledge Fraud Google Apps Google Drive User Error Microchip Username Managing Costs IT Maintenance 5G Black Friday SSID Business Intelligence Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Shortcuts Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Ransmoware Monitors Cyber Monday Medical IT Vendors Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Be Proactive Windows 8 IP Address Laptop Websites Mirgation Hypervisor Workforce PowerPoint Threats Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Workplace Strategies SharePoint Management PCI DSS Halloween Chatbots Recovery Navigation Meta Writing Distributed Denial of Service Amazon Lenovo Gig Economy Screen Reader Hard Drives Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Outsource IT Fun Environment Media Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Financial Data Lithium-ion battery Error History Small Businesses Social Engineering Break Fix Displays Entrepreneur Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Outsourcing Undo Search Dark Web CES Tablet IoT Communitications

Blog Archive