Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Networking WiFi Apple App Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Managed Services Voice over Internet Protocol Gmail Budget How To BDR HIPAA Computing Applications Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Managed IT Services Bring Your Own Device Big Data Operating System Router Physical Security Computers Virtual Private Network Risk Management Health Website 2FA Help Desk Analytics Office Tips Augmented Reality Retail Healthcare Storage Password The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Patch Management Save Money Microsoft 365 Going Green Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Telephone Scam Data loss Mouse Vulnerabilities Entertainment Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Customer Relationship Management Settings Printing IT Management Wireless VPN Employees Meetings Content Filtering Integration Hacking Presentation YouTube User Tip Modem Computer Repair Mobile Security Processor Cryptocurrency Wireless Technology Holidays Data Storage Virtual Desktop Smart Technology Supply Chain Data storage LiFi Video Conferencing Word Machine Learning Managed Services Provider Professional Services Outlook Saving Time Virtual Machines Money Managed IT Service Humor Maintenance Antivirus Downloads iPhone Safety Sports Licensing Social Network Telework Education Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Tablet IoT Communitications Mobile Computing Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Search Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Data Analysis Application Best Practice Star Wars IT Assessment Gamification Flexibility Buisness Notifications Staff Value Business Intelligence IBM Legal Organization IT solutions Travel Social Networking Legislation Shortcuts Ransmoware Techology Fileless Malware Digital Security Cameras Business Growth Google Maps Smart Devices Content Remote Working Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Cortana Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Alt Codes Assessment Electronic Health Records Competition Downtime Wasting Time Threats Hosted Solution Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta User Error Microchip Typing Internet Exlporer Software as a Service Username Managing Costs Amazon Google Drive User Point of Sale eCommerce Knowledge Black Friday SSID Virtual Assistant Outsource IT Database Surveillance Network Management Tech Support IT Technicians Virtual Machine Environment 5G Media IP Address Google Docs Proxy Server Reviews Unified Communications Cookies Experience Monitors Cyber Monday Medical IT Tactics Development Running Cable Hotspot Transportation Small Businesses Bitcoin Google Wallet Websites Mirgation Hypervisor Displays PowerPoint Shopping Recovery Nanotechnology Optimization Addiction Laptop Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Hard Drives Windows 8 Domains Drones Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Halloween Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Refrigeration Public Speaking Server Management Regulations Compliance Private Cloud Identity Evernote Paperless Co-managed IT Lithium-ion battery Superfish Bookmark Identity Theft Smart Tech Memes Download Net Neutrality Entrepreneur Scary Stories Twitter Alerts SQL Server Technology Care Hacks Financial Data Error History Fun Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Deep Learning Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Undo

Blog Archive