Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer IT Services Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Passwords Managed Service Saving Money Communication Cybersecurity Smartphone Data Backup Android Disaster Recovery Upgrade Data Recovery AI VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Server Remote Work Managed Service Provider Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Budget Mobile Device Management Apple Networking Gmail App Managed Services Voice over Internet Protocol WiFi BYOD Employer-Employee Relationship Tip of the week Chrome Avoiding Downtime Applications Marketing How To BDR Conferencing Computing Information Technology Access Control Office 365 Hacker HIPAA Router Retail Website Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Operating System Big Data Healthcare Virtual Private Network Risk Management Health Computers Analytics Office Tips Augmented Reality Scam Data loss Windows 11 Monitoring Firewall Excel Going Green Patch Management Save Money The Internet of Things Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Telephone Cybercrime Social Physical Security Display Printer Cooperation Free Resource Project Management Windows 7 Paperless Office Infrastructure Customer Service Microsoft 365 Solutions Document Management Employees Integration Maintenance Sports User Tip Modem Antivirus Mouse Mobile Security Processor Word Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Professional Services Robot Safety Saving Time Virtual Machines Settings Managed IT Service Wireless Printing Content Filtering IT Management Downloads iPhone YouTube Meetings VPN Licensing Cryptocurrency Vulnerabilities Entertainment Data Privacy Computer Repair Customer Relationship Management Virtual Desktop Images 101 Data storage LiFi Telephone System Multi-Factor Authentication Mobility Cost Management Hacking Presentation Outlook Machine Learning Money Wireless Technology Humor Specifications Security Cameras Workplace Strategies Scary Stories Private Cloud IP Address Trend Micro Hacks Server Management Internet Exlporer Software as a Service Superfish Fraud Meta Identity Theft Fun Microchip Username Managing Costs Amazon Deep Learning Twitter Black Friday SSID Error Recovery eCommerce Hard Drives Database Surveillance Virtual Assistant Outsource IT Education Social Engineering Domains IT Technicians Virtual Machine Environment Media Remote Computing Cyber Monday Medical IT Proxy Server Reviews Cookies Mobile Computing Refrigeration Tactics Development Hotspot Transportation Small Businesses Tablet Search Public Speaking Mirgation Hypervisor Displays Best Practice Alert PowerPoint Buisness File Sharing Dark Data Lithium-ion battery Shopping Nanotechnology Optimization Managed IT Addiction Legal Entrepreneur Language Employer/Employee Relationships Outsourcing IT solutions How To Management PCI DSS Chatbots Business Growth Navigation Notifications Distributed Denial of Service Workplace Travel Gig Economy Screen Reader Undo Service Level Agreement Internet Service Provider Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps Cortana Regulations Compliance Identity Alt Codes Evernote Paperless Co-managed IT Downtime Unified Threat Management Bookmark Smart Tech Memes Download Net Neutrality Unified Threat Management Alerts SQL Server Technology Care Hosted Solution Financial Data History Typing Business Communications Break Fix Scams Network Congestion Browsers Smartwatch Application Connectivity IT Upload Procurement Google Drive User Error Azure Hybrid Work Knowledge IBM Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Point of Sale 5G CES IoT Communitications Trends Supply Chain Management Google Docs Unified Communications Experience Running Cable Tech Support Customer Resource management FinTech Regulations Bitcoin Network Management Google Calendar Term Google Apps Google Wallet Microsoft Excel IT Maintenance Monitors Data Analysis Star Wars IT Assessment Competition Gamification Flexibility Staff Value Business Intelligence Laptop Websites Organization Social Networking Windows 8 Legislation Shortcuts Smart Devices Drones Ransmoware Fileless Malware Digital Security Cameras Content Remote Working SharePoint Wearable Technology Memory Vendors Electronic Medical Records Comparison Google Play Be Proactive Halloween Health IT User Motherboard Data Breach Assessment Electronic Health Records Lenovo Permissions Workforce Writing Directions Videos Wasting Time Threats Virtual Reality

Blog Archive