Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing Privacy IT Support Workplace Tips Google Email Computer Workplace Strategy Collaboration Backup Small Business Hosted Solutions Managed Service AI Ransomware Users Productivity Mobile Device Microsoft Saving Money Passwords Quick Tips Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Training Facebook Automation Artificial Intelligence Outsourced IT Compliance Covid-19 Cloud Computing Gadgets Server Managed Service Provider Remote Work IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Blockchain Vendor Wi-Fi Windows 10 Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Tip of the week Managed Services Apps Apple Networking App Mobile Device Management BYOD Gmail WiFi Chrome Voice over Internet Protocol Employer-Employee Relationship Budget Password Hacker Managed IT Services How To BDR Avoiding Downtime Marketing HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Conferencing Storage Bring Your Own Device Computers Website Operating System Router Virtual Private Network Risk Management 2FA Health Help Desk Big Data Analytics Office Tips Augmented Reality Retail Healthcare Telephone Scam Customer Service Data loss Free Resource Project Management Windows 7 Cooperation Microsoft 365 Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Firewall Display Windows 11 Printer Paperless Office The Internet of Things Infrastructure Monitoring Excel Social Document Management Remote Workers Managed IT Service iPhone Maintenance Sports Downloads Antivirus Mouse Hacking Vulnerabilities Licensing Presentation Data Privacy Entertainment Administration Images 101 Wireless Technology Multi-Factor Authentication Mobility Telephone System Robot Cost Management Settings Printing Wireless Word Employees Content Filtering Integration IT Management VPN YouTube Meetings Cryptocurrency User Tip Modem Processor Safety Holidays Computer Repair Mobile Security Data Storage Virtual Desktop Supply Chain Data storage LiFi Video Conferencing Managed Services Provider Smart Technology Professional Services Outlook Virtual Machines Machine Learning Money Saving Time Humor Customer Relationship Management Scams Smartwatch Deep Learning Download IT Twitter Alerts Procurement Error Competition Azure Hybrid Work Browsers Telework Education Connectivity Cyber security Social Engineering Break Fix Tech Human Resources Cables CES Upload Communitications Remote Computing Supply Chain Management Multi-Factor Security Mobile Computing Social Network FinTech Tablet IoT Search Dark Web User Term Google Apps IT Maintenance Best Practice Trends IT Assessment Alert Managed IT Customer Resource management Flexibility Buisness File Sharing Regulations Value Business Intelligence Dark Data Google Calendar Legal Data Analysis Organization IT solutions Star Wars IP Address How To Microsoft Excel Shortcuts Notifications Staff Ransmoware Digital Security Cameras Business Growth Gamification Smart Devices Remote Working Travel Social Networking Memory Vendors Legislation Techology Fileless Malware Google Maps Data Breach Cortana Recovery Google Play Be Proactive Electronic Health Records Wearable Technology Hard Drives Workforce Videos Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Domains Wasting Time Threats Comparison Security Cameras Workplace Strategies Unified Threat Management Directions Hosted Solution Assessment Trend Micro Permissions Software as a Service Refrigeration Meta Typing Public Speaking Managing Costs Amazon Network Congestion Specifications SSID Google Drive User Error Microchip Internet Exlporer Lithium-ion battery eCommerce Knowledge Fraud Surveillance Virtual Assistant Outsource IT Entrepreneur Username Point of Sale Virtual Machine Environment 5G Black Friday Media Medical IT Google Docs Reviews Unified Communications Database Experience Development Running Cable Tech Support IT Technicians Undo Transportation Small Businesses Bitcoin Network Management Google Wallet Proxy Server Cookies Hypervisor Displays Monitors Cyber Monday PowerPoint Shopping Tactics Optimization Hotspot Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Windows 8 Drones PCI DSS Nanotechnology Navigation Workplace SharePoint Gig Economy Addiction Electronic Medical Records Language Application Internet Service Provider Halloween Chatbots Teamwork Hiring/Firing Management Lenovo Regulations Compliance Screen Reader IBM Writing Distributed Denial of Service Evernote Paperless Co-managed IT Service Level Agreement Memes Virtual Reality Computing Infrastructure Net Neutrality Scary Stories Private Cloud Identity SQL Server Technology Care Hacks Server Management Superfish Bookmark Financial Data Identity Theft Smart Tech History Fun Business Communications

Blog Archive