Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Phishing Privacy Email Computer Google Workplace Strategy Hosted Solutions Collaboration Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Smartphones Business Management communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Artificial Intelligence Automation Facebook Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server IT Support Remote Work Managed Service Provider Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Data Security Two-factor Authentication Vendor Mobile Office Managed Services Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Gmail Apple Tip of the week WiFi App Voice over Internet Protocol Managed IT Services Computing How To BDR Information Technology Hacker Office 365 Avoiding Downtime HIPAA Physical Security Marketing Applications Access Control Password Conferencing Healthcare Operating System Risk Management Computers Analytics Office Tips Router Augmented Reality Website Virtual Private Network Storage 2FA Health Bring Your Own Device Help Desk Retail Big Data Social Scam Data loss Telephone Cybercrime Free Resource Cooperation Project Management Windows 7 Patch Management Customer Service Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Solutions Display Printer Windows 11 Paperless Office Infrastructure Firewall Excel Monitoring Document Management The Internet of Things Going Green Managed IT Service Remote Workers Settings Printing Downloads Wireless Data Privacy iPhone Content Filtering Licensing YouTube Entertainment Vulnerabilities Customer Relationship Management Cryptocurrency Images 101 Robot Hacking Multi-Factor Authentication Mobility Virtual Desktop Presentation Telephone System Data storage Cost Management LiFi IT Management Wireless Technology Outlook VPN Meetings Money Employees Humor Integration Computer Repair Word User Tip Modem Processor Mobile Security Sports Supply Chain Holidays Mouse Data Storage Administration Smart Technology Machine Learning Safety Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Maintenance Antivirus Social Engineering Application Net Neutrality Human Resources Download SQL Server Alt Codes Alerts History Downtime Remote Computing Financial Data Cables Smartwatch Browsers IT Connectivity Hosted Solution Break Fix IBM Tablet Procurement Google Apps Upload Azure Typing Cyber security Tech Multi-Factor Security Alert Telework IT Maintenance Social Network CES Dark Data Business Intelligence Communitications Google Drive IoT Managed IT Dark Web Knowledge File Sharing How To Supply Chain Management Shortcuts Trends Regulations Term Google Calendar 5G Notifications Competition FinTech Ransmoware Customer Resource management Vendors Data Analysis IT Assessment Google Docs Star Wars Unified Communications Microsoft Excel Experience Travel Running Cable Google Maps Flexibility Be Proactive Gamification Value Bitcoin Techology Staff Google Wallet Social Networking Legislation Organization Workforce Digital Security Cameras User Threats Fileless Malware Smart Devices Unified Threat Management Laptop Remote Working Workplace Strategies Content Memory Windows 8 Unified Threat Management Wearable Technology Health IT Data Breach Drones Motherboard Google Play Comparison Meta IP Address Videos Network Congestion Amazon Directions Electronic Health Records Assessment Permissions User Error Halloween Wasting Time Outsource IT Trend Micro Security Cameras Specifications Point of Sale Recovery Environment Microchip Software as a Service Media Internet Exlporer Fraud Scary Stories Hard Drives Username Managing Costs Hacks Small Businesses eCommerce SSID Network Management Black Friday Fun Tech Support Domains Monitors Displays Surveillance Database Virtual Assistant Deep Learning IT Technicians Refrigeration Virtual Machine Outsourcing Proxy Server Cookies Medical IT Education Cyber Monday Websites Public Speaking Reviews Lithium-ion battery Development Tactics Transportation Hotspot SharePoint Mirgation Electronic Medical Records Entrepreneur Workplace Hypervisor Mobile Computing Hiring/Firing Optimization Nanotechnology PowerPoint Search Shopping Writing Paperless Addiction Employer/Employee Relationships Best Practice Lenovo Language Chatbots Navigation Buisness Virtual Reality Undo PCI DSS Co-managed IT Management Technology Care Legal Screen Reader IT solutions Server Management Distributed Denial of Service Private Cloud Gig Economy Identity Theft Internet Service Provider Business Communications Service Level Agreement Teamwork Business Growth Superfish Computing Infrastructure Identity Evernote Twitter Regulations Compliance Scams Hybrid Work Bookmark Memes Smart Tech Cortana Error

Blog Archive