Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Cybersecurity Communication Productivity Smartphone Managed Service Data Backup Android Upgrade AI VoIP Business Management Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Artificial Intelligence Information Facebook Automation Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Blockchain Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Two-factor Authentication Mobile Office Data Security Vendor Apps Networking Chrome Mobile Device Management Budget Gmail BYOD Apple Managed Services Voice over Internet Protocol App Employer-Employee Relationship Tip of the week Information Technology Hacker Avoiding Downtime How To Office 365 Marketing BDR HIPAA Applications WiFi Access Control Conferencing Computing Computers Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Router Storage Password Bring Your Own Device 2FA Virtual Private Network Big Data Health Help Desk Healthcare Operating System Retail Windows 7 Scam Data loss Microsoft 365 Cooperation Solutions Patch Management Save Money Remote Monitoring Firewall End of Support Vulnerability Vendor Management Windows 11 Physical Security The Internet of Things Display Printer Excel Monitoring Social Paperless Office Infrastructure Remote Workers Going Green Document Management Cybercrime Free Resource Customer Service Telephone Project Management Maintenance Data Privacy Cryptocurrency Presentation Images 101 Licensing Antivirus Mobility Multi-Factor Authentication Wireless Technology Entertainment Virtual Desktop LiFi Data storage Telephone System Employees Outlook Integration Word Cost Management Money Robot Humor Holidays IT Management Sports Data Storage VPN Mouse Meetings Safety User Tip Modem Video Conferencing Mobile Security Processor Managed Services Provider Supply Chain Administration Professional Services Computer Repair Virtual Machines Smart Technology iPhone Settings Saving Time Printing Machine Learning Customer Relationship Management Wireless Content Filtering Managed IT Service Vulnerabilities YouTube Hacking Downloads IT Assessment Break Fix Twitter Browsers Connectivity 5G User Upload Flexibility Value Error Google Apps Unified Communications Social Engineering Experience Social Network Organization Google Docs Multi-Factor Security IT Maintenance Smart Devices Dark Web Business Intelligence Bitcoin Remote Computing Running Cable Digital Security Cameras IoT Trends Remote Working Memory Google Wallet Shortcuts IP Address Ransmoware Google Play Customer Resource management Regulations Data Breach Google Calendar Tablet Electronic Health Records Microsoft Excel Vendors Windows 8 Alert Laptop Data Analysis Videos Star Wars Recovery Gamification Staff Managed IT Wasting Time Drones File Sharing Be Proactive Dark Data Workforce Security Cameras How To Hard Drives Social Networking Trend Micro Legislation Software as a Service Threats Notifications Halloween Domains Fileless Malware Content Wearable Technology Managing Costs Travel Workplace Strategies Google Maps Meta SSID Refrigeration Health IT Motherboard Techology eCommerce Comparison Surveillance Permissions Amazon Virtual Assistant Hacks Scary Stories Public Speaking Directions Assessment Fun Virtual Machine Unified Threat Management Lithium-ion battery Outsource IT Medical IT Deep Learning Reviews Entrepreneur Unified Threat Management Specifications Development Fraud Environment Transportation Media Microchip Internet Exlporer Network Congestion Username Hypervisor Education Small Businesses PowerPoint Undo Shopping User Error Optimization Black Friday Displays Employer/Employee Relationships Mobile Computing Database Search PCI DSS IT Technicians Point of Sale Navigation Outsourcing Best Practice Proxy Server Gig Economy Cookies Cyber Monday Tactics Internet Service Provider Hotspot Network Management Teamwork Tech Support Buisness Monitors Application Regulations Compliance Mirgation Legal Workplace Evernote IT solutions Hiring/Firing Business Growth Nanotechnology Memes Addiction Net Neutrality Language SQL Server Websites Paperless IBM Cortana Management Financial Data Chatbots History Co-managed IT Distributed Denial of Service Technology Care Alt Codes Electronic Medical Records Smartwatch Screen Reader SharePoint IT Service Level Agreement Procurement Computing Infrastructure Azure Business Communications Downtime Hosted Solution Writing Telework Identity Lenovo Cyber security Scams Tech Hybrid Work Typing Virtual Reality Competition Bookmark CES Smart Tech Communitications Download Supply Chain Management Alerts Server Management Private Cloud Human Resources Knowledge FinTech Superfish Google Drive Identity Theft Cables Term

Blog Archive