Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Collaboration Hosted Solutions Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup Data Recovery AI Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Information Facebook Miscellaneous Artificial Intelligence Holiday Automation Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Government Business Continuity Windows 10 Wi-Fi Virtualization Bandwidth Business Technology Blockchain Vendor Data Security Two-factor Authentication Apps Mobile Office App Gmail WiFi Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Chrome Budget Apple Mobile Device Management Tip of the week HIPAA Applications Computing How To Information Technology BDR Office 365 Conferencing Hacker Avoiding Downtime Access Control Marketing Retail Router Operating System Big Data Managed IT Services Risk Management Help Desk Healthcare Office Tips 2FA Analytics Computers Augmented Reality Virtual Private Network Storage Password Website Bring Your Own Device Health Firewall Document Management Going Green The Internet of Things Scam Cybercrime Data loss Social Remote Workers Monitoring Patch Management Save Money Windows 11 Remote Monitoring Vulnerability End of Support Free Resource Customer Service Vendor Management Project Management Windows 7 Telephone Excel Physical Security Display Microsoft 365 Printer Cooperation Paperless Office Solutions Infrastructure Data Privacy Holidays Settings Safety Maintenance Data Storage Antivirus Printing Wireless Content Filtering Video Conferencing Managed Services Provider User Tip Modem Mobile Security Virtual Machines YouTube Processor Professional Services Cryptocurrency Smart Technology Virtual Desktop Robot iPhone Customer Relationship Management Data storage LiFi Saving Time Vulnerabilities Outlook Managed IT Service Hacking Supply Chain IT Management VPN Images 101 Money Meetings Presentation Humor Downloads Multi-Factor Authentication Mobility Licensing Wireless Technology Computer Repair Sports Entertainment Mouse Employees Word Administration Integration Telephone System Machine Learning Cost Management Content Lenovo Wearable Technology Legal Surveillance IT solutions Writing Virtual Assistant Public Speaking Virtual Reality Virtual Machine Lithium-ion battery Health IT Google Apps Motherboard Comparison Business Growth Server Management Permissions Reviews Private Cloud Directions Medical IT IT Maintenance Assessment Entrepreneur Business Intelligence Superfish Identity Theft Development Transportation Cortana Alt Codes Twitter Hypervisor Shortcuts Specifications Fraud Shopping Error Optimization Downtime Microchip PowerPoint Undo Ransmoware Internet Exlporer Vendors Username Hosted Solution Social Engineering Employer/Employee Relationships PCI DSS Typing Remote Computing Navigation Be Proactive Black Friday Gig Economy Workforce Database Teamwork Knowledge Threats IT Technicians Google Drive Tablet Internet Service Provider Regulations Compliance Alert Proxy Server Evernote Application Workplace Strategies Cookies Cyber Monday Managed IT Hotspot File Sharing Memes Dark Data 5G Meta Tactics SQL Server Experience IBM Amazon Mirgation Google Docs Net Neutrality Unified Communications How To Financial Data Bitcoin Notifications History Running Cable Nanotechnology Language Smartwatch Google Wallet Travel IT Outsource IT Addiction Azure Environment Management Techology Media Chatbots Google Maps Procurement Telework Windows 8 Cyber security Laptop Tech Screen Reader Distributed Denial of Service Service Level Agreement Computing Infrastructure CES Drones Unified Threat Management Communitications Competition Small Businesses Displays Unified Threat Management Identity Supply Chain Management FinTech Halloween Bookmark Term Smart Tech Download Alerts IT Assessment Network Congestion Outsourcing Value User User Error Flexibility Break Fix Organization Hacks Scary Stories Browsers Workplace Connectivity Hiring/Firing Upload Digital Security Cameras Point of Sale Smart Devices Fun Memory IP Address Social Network Paperless Multi-Factor Security Remote Working Deep Learning Dark Web Tech Support Data Breach Google Play Co-managed IT IoT Network Management Technology Care Trends Videos Electronic Health Records Education Monitors Wasting Time Customer Resource management Recovery Business Communications Regulations Google Calendar Microsoft Excel Mobile Computing Websites Trend Micro Data Analysis Security Cameras Hard Drives Scams Star Wars Hybrid Work Gamification Staff Software as a Service Search Domains Managing Costs SharePoint Human Resources Social Networking Legislation Best Practice Electronic Medical Records eCommerce Buisness Fileless Malware SSID Refrigeration Cables

Blog Archive