Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips IT Services Internet Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Managed Service Users Ransomware AI Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Holiday Training Facebook Automation Artificial Intelligence Gadgets Outsourced IT Compliance Cloud Computing Covid-19 Remote Work Server IT Support Managed Service Provider Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Virtualization Business Technology Wi-Fi Blockchain Bandwidth Vendor Windows 10 Apps Managed Services Two-factor Authentication Data Security Mobile Office Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Applications Access Control Conferencing Computing Information Technology Hacker Managed IT Services How To BDR Avoiding Downtime Office 365 Marketing HIPAA Password Physical Security Virtual Private Network Bring Your Own Device Health 2FA Help Desk Big Data Operating System Retail Healthcare Risk Management Computers Office Tips Analytics Website Augmented Reality Router Storage Display Printer Paperless Office Windows 11 The Internet of Things Infrastructure Monitoring Going Green Social Excel Document Management Cybercrime Managed IT Service Remote Workers Telephone Customer Service Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Firewall Mouse Modem User Tip Processor Safety Computer Repair Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Machine Learning Managed Services Provider Virtual Machines Settings Professional Services Saving Time Printing Wireless Content Filtering Customer Relationship Management Maintenance YouTube Downloads Antivirus iPhone Cryptocurrency Hacking Licensing Presentation Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Wireless Technology Images 101 Robot Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Money Word Humor IT Management Meetings VPN Employees Sports Integration Username Education Managing Costs Amazon Entrepreneur Point of Sale eCommerce Black Friday SSID Mobile Computing Database Surveillance Virtual Assistant Outsource IT Media Network Management Undo Tech Support IT Technicians Virtual Machine Environment Search Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Best Practice Tactics Development Buisness Hotspot Transportation Small Businesses Legal IT solutions Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Shopping Business Growth SharePoint Addiction Application Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Chatbots Cortana IBM Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Alt Codes Service Level Agreement Internet Service Provider Downtime Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Server Management Regulations Compliance Hosted Solution Private Cloud Identity Identity Theft Smart Tech Memes Co-managed IT Superfish Bookmark Typing Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Google Drive Financial Data Competition Error History Knowledge Connectivity IT Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work 5G Multi-Factor Security Tech Human Resources Google Docs Social Network Telework Unified Communications Cyber security Experience Bitcoin Tablet IoT Communitications Running Cable User Dark Web Cables CES Google Wallet Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech File Sharing Regulations Windows 8 IP Address Star Wars IT Assessment Laptop How To Microsoft Excel IT Maintenance Data Analysis Drones Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Google Maps Smart Devices Halloween Recovery Ransmoware Techology Fileless Malware Digital Security Cameras Content Remote Working Hard Drives Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Domains Unified Threat Management Motherboard Data Breach Unified Threat Management Directions Videos Hacks Assessment Electronic Health Records Scary Stories Permissions Workforce Refrigeration Wasting Time Threats Fun Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Deep Learning Public Speaking User Error Microchip Lithium-ion battery Internet Exlporer Software as a Service Fraud Meta

Blog Archive