Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords AI Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Compliance Gadgets Cloud Computing Training Covid-19 Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office WiFi Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To BDR HIPAA Computing Hacker Physical Security Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing Bring Your Own Device Big Data Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage 2FA Password The Internet of Things Scam Excel Data loss Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Free Resource Customer Service Vendor Management Cybercrime Project Management Windows 7 Microsoft 365 Display Printer Solutions Paperless Office Infrastructure Monitoring Firewall Document Management Windows 11 Managed IT Service Telephone Video Conferencing Mouse Licensing Managed Services Provider Professional Services Virtual Machines Entertainment Administration iPhone Telephone System Robot Customer Relationship Management Cost Management Settings Vulnerabilities Printing Wireless Data Privacy Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Images 101 Multi-Factor Authentication Mobility Cryptocurrency Wireless Technology User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Data storage LiFi Employees Integration Word Smart Technology Outlook Machine Learning Money Saving Time Humor Holidays Data Storage Safety Maintenance Antivirus Sports Downloads Supply Chain Employer/Employee Relationships Outsourcing Browsers Education Connectivity Social Engineering Break Fix Remote Computing PCI DSS Navigation Upload Workplace Mobile Computing Social Network Gig Economy Multi-Factor Security Internet Service Provider Teamwork Hiring/Firing Tablet IoT Search Dark Web Alert Regulations Compliance Evernote Paperless Application Best Practice Trends Co-managed IT Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Memes Net Neutrality SQL Server Technology Care IBM Legal Data Analysis IT solutions Star Wars How To Microsoft Excel Notifications Staff Financial Data History Business Communications Business Growth Gamification Scams Travel Social Networking Smartwatch Legislation IT Procurement Azure Hybrid Work Techology Fileless Malware Google Maps Cortana Wearable Technology Telework Cyber security Tech Human Resources Alt Codes Content Cables Competition Health IT Downtime Unified Threat Management Motherboard CES Comparison Communitications Supply Chain Management Unified Threat Management Directions Hosted Solution Assessment Permissions FinTech Term Google Apps Typing IT Maintenance Network Congestion Specifications IT Assessment Flexibility Value Business Intelligence Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Organization Shortcuts Username Ransmoware Point of Sale Digital Security Cameras 5G Black Friday Smart Devices Remote Working Memory Vendors IP Address Google Docs Unified Communications Database Experience Running Cable Tech Support IT Technicians Data Breach Google Play Be Proactive Bitcoin Network Management Workforce Google Wallet Proxy Server Cookies Videos Monitors Cyber Monday Electronic Health Records Wasting Time Threats Recovery Tactics Hotspot Windows 8 Laptop Websites Mirgation Trend Micro Security Cameras Workplace Strategies Hard Drives Meta Domains Drones Nanotechnology Software as a Service Electronic Medical Records Language Managing Costs Amazon SharePoint Addiction Refrigeration Management Halloween Chatbots eCommerce SSID Virtual Assistant Outsource IT Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Surveillance Virtual Reality Computing Infrastructure Virtual Machine Environment Lithium-ion battery Media Service Level Agreement Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Reviews Medical IT Transportation Small Businesses Superfish Bookmark Identity Theft Smart Tech Fun Development Twitter Alerts Hypervisor Displays Deep Learning Download Undo Error Shopping Optimization PowerPoint

Blog Archive