Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Email Workplace Tips Phishing Computer Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money Quick Tips AI Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Information Holiday Facebook Automation Artificial Intelligence Cloud Computing Training Compliance Gadgets Covid-19 Managed Service Provider IT Support Outsourced IT Remote Work Server Encryption Employee/Employer Relationship Spam Windows 10 Office Government Data Management Business Continuity Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Blockchain Mobile Office Managed Services Two-factor Authentication Apps Vendor Data Security Mobile Device Management BYOD Gmail Voice over Internet Protocol WiFi Tip of the week Chrome Employer-Employee Relationship Budget Apple Networking App Marketing Computing Physical Security Information Technology Conferencing Access Control Office 365 Password Managed IT Services Hacker HIPAA How To BDR Applications Avoiding Downtime Website Operating System Help Desk Virtual Private Network Risk Management 2FA Health Healthcare Big Data Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Computers Router Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Monitoring Cybercrime Firewall Display Windows 11 Printer Managed IT Service Remote Workers The Internet of Things Paperless Office Infrastructure Telephone Excel Social Free Resource Cooperation Document Management Project Management Windows 7 Microsoft 365 Customer Service Scam Data loss Solutions Robot Mobile Security Processor Settings Holidays Wireless Word Printing Content Filtering Data Storage Smart Technology IT Management Video Conferencing VPN YouTube Meetings Managed Services Provider Professional Services Cryptocurrency Saving Time Virtual Machines Computer Repair Safety Virtual Desktop LiFi Supply Chain Downloads Data storage iPhone Licensing Outlook Vulnerabilities Machine Learning Entertainment Money Humor Images 101 Customer Relationship Management Maintenance Telephone System Multi-Factor Authentication Mobility Antivirus Sports Cost Management Mouse Hacking Presentation Data Privacy Administration Employees Wireless Technology Integration User Tip Modem Surveillance Database Virtual Assistant Vendors Travel Google Maps Be Proactive Cortana Virtual Machine IT Technicians Recovery Techology Medical IT Cyber Monday Alt Codes Workforce Reviews Proxy Server Cookies Hard Drives Development Tactics Domains Transportation Hotspot Threats Downtime Unified Threat Management Hosted Solution Workplace Strategies Hypervisor Mirgation Unified Threat Management PowerPoint Typing Meta Shopping Optimization Nanotechnology Refrigeration Network Congestion Addiction Public Speaking Employer/Employee Relationships Language Amazon Knowledge PCI DSS Management Lithium-ion battery Chatbots Navigation Google Drive User Error Distributed Denial of Service Entrepreneur Outsource IT Gig Economy Screen Reader 5G Internet Service Provider Service Level Agreement Teamwork Computing Infrastructure Environment Point of Sale Media Unified Communications Experience Regulations Compliance Identity Evernote Google Docs Bitcoin Network Management Small Businesses Running Cable Tech Support Bookmark Memes Smart Tech Undo Monitors Net Neutrality Download SQL Server Alerts Google Wallet Displays Financial Data History Break Fix Windows 8 Outsourcing Laptop Websites Smartwatch Browsers IT Connectivity Procurement Upload Azure Drones Workplace Electronic Medical Records Telework Social Network Cyber security Application Multi-Factor Security Tech SharePoint Dark Web Hiring/Firing Halloween CES Communitications IoT Writing Supply Chain Management Trends IBM Lenovo Paperless Co-managed IT Virtual Reality FinTech Customer Resource management Regulations Google Calendar Term Microsoft Excel Hacks Server Management Technology Care Scary Stories Private Cloud Data Analysis IT Assessment Star Wars Fun Flexibility Gamification Value Staff Superfish Identity Theft Business Communications Deep Learning Scams Twitter Organization Social Networking Legislation Hybrid Work Error Digital Security Cameras Fileless Malware Smart Devices Competition Human Resources Social Engineering Remote Working Content Memory Wearable Technology Education Cables Remote Computing Health IT Data Breach Motherboard Comparison Google Play Electronic Health Records Assessment Permissions Mobile Computing Videos Directions Google Apps Search Wasting Time User Tablet Security Cameras Specifications Best Practice IT Maintenance Alert Trend Micro Software as a Service Internet Exlporer Fraud Managed IT Business Intelligence Buisness File Sharing Microchip Dark Data IT solutions Shortcuts How To Username IP Address Managing Costs Legal SSID Black Friday Business Growth Ransmoware Notifications eCommerce

Blog Archive