Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Workplace Tips Computer Google Phishing Hosted Solutions Collaboration Workplace Strategy Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Automation Miscellaneous Artificial Intelligence Information Training Covid-19 Gadgets Cloud Computing Remote Work Compliance Server Managed Service Provider IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Data Management Business Continuity Government Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Blockchain Two-factor Authentication Apps Data Security Mobile Office Vendor Gmail WiFi Tip of the week Chrome Employer-Employee Relationship Budget Networking Apple App Managed Services Voice over Internet Protocol BYOD Mobile Device Management Applications Computing Information Technology Access Control Office 365 Conferencing How To Hacker BDR Avoiding Downtime Marketing HIPAA Virtual Private Network Risk Management Health Help Desk Big Data Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Computers Website Healthcare Operating System 2FA Router Firewall Excel Display Printer Free Resource Project Management Windows 7 Paperless Office Infrastructure The Internet of Things Monitoring Microsoft 365 Solutions Document Management Social Telephone Scam Data loss Customer Service Cooperation Patch Management Save Money Remote Monitoring Going Green Vulnerability End of Support Remote Workers Vendor Management Windows 11 Physical Security Cybercrime YouTube Vulnerabilities User Tip Modem Computer Repair Mobile Security Cryptocurrency Processor Safety Images 101 Virtual Desktop Mobility Multi-Factor Authentication Data storage LiFi Smart Technology Machine Learning Outlook Saving Time Data Privacy Employees Money Managed IT Service Humor Integration Maintenance Customer Relationship Management Antivirus Downloads Licensing Sports Holidays Mouse Entertainment Hacking Data Storage Presentation Administration Video Conferencing Managed Services Provider Wireless Technology Virtual Machines Professional Services Telephone System Robot Cost Management Settings IT Management Word Wireless Printing VPN iPhone Content Filtering Meetings Supply Chain Tech Username Telework Outsourcing Cyber security Public Speaking Google Drive Communitications Lithium-ion battery Knowledge Point of Sale Black Friday CES Supply Chain Management Workplace Database Entrepreneur Network Management Term 5G Tech Support IT Technicians FinTech Hiring/Firing Google Docs IT Assessment Unified Communications Paperless Proxy Server Experience Cookies Monitors Cyber Monday Hotspot Flexibility Bitcoin Co-managed IT Value Undo Running Cable Tactics Websites Mirgation Organization Google Wallet Technology Care Digital Security Cameras Smart Devices Business Communications Nanotechnology Addiction Electronic Medical Records Language Remote Working Windows 8 SharePoint Scams Memory Laptop Data Breach Google Play Management Chatbots Drones Hybrid Work Distributed Denial of Service Videos Electronic Health Records Lenovo Human Resources Application Screen Reader Writing Service Level Agreement Virtual Reality Computing Infrastructure Cables Wasting Time Halloween Trend Micro IBM Server Management Security Cameras Private Cloud Identity Software as a Service Superfish Google Apps Bookmark Identity Theft Smart Tech Download Twitter Alerts Hacks IT Maintenance Managing Costs Scary Stories Business Intelligence eCommerce SSID Fun Error Break Fix Surveillance Deep Learning Shortcuts Virtual Assistant Browsers Connectivity Social Engineering Upload Remote Computing Ransmoware Virtual Machine Competition Vendors Education Medical IT Social Network Multi-Factor Security Reviews Dark Web Development Be Proactive Transportation Tablet IoT Trends Alert Mobile Computing Workforce Hypervisor Threats Optimization Managed IT PowerPoint Customer Resource management User Search File Sharing Regulations Dark Data Google Calendar Shopping Microsoft Excel Best Practice Workplace Strategies Employer/Employee Relationships Data Analysis Star Wars How To Navigation Gamification Notifications Staff PCI DSS Meta Buisness Amazon IP Address IT solutions Travel Social Networking Legislation Gig Economy Legal Internet Service Provider Business Growth Techology Teamwork Fileless Malware Google Maps Evernote Content Wearable Technology Regulations Compliance Outsource IT Environment Memes Media Health IT Recovery Cortana Unified Threat Management Motherboard Comparison Permissions Net Neutrality Alt Codes Unified Threat Management SQL Server Directions Hard Drives Assessment Financial Data Small Businesses History Domains Downtime Displays IT Hosted Solution Network Congestion Specifications Smartwatch Fraud Procurement Typing User Error Azure Microchip Refrigeration Internet Exlporer

Blog Archive