Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Smartphone Managed Service Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Remote Work Managed Service Provider Compliance Outsourced IT Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Mobile Office Data Security Vendor Two-factor Authentication Apps App Networking Mobile Device Management Gmail BYOD Managed Services Voice over Internet Protocol Chrome Employer-Employee Relationship Budget Tip of the week Apple Avoiding Downtime Marketing How To BDR Computing Information Technology HIPAA Applications WiFi Office 365 Access Control Conferencing Hacker Website Managed IT Services Operating System Risk Management Router 2FA Virtual Private Network Big Data Analytics Office Tips Healthcare Augmented Reality Health Help Desk Storage Password Bring Your Own Device Computers Retail Scam Solutions Data loss Going Green Cooperation Cybercrime Patch Management Firewall Save Money Remote Monitoring Vulnerability End of Support Windows 11 Vendor Management The Internet of Things Physical Security Excel Display Remote Workers Social Printer Paperless Office Monitoring Infrastructure Free Resource Project Management Windows 7 Document Management Customer Service Microsoft 365 Telephone Maintenance Wireless Technology Licensing Antivirus Entertainment Employees Integration Settings Wireless Word Printing Content Filtering Telephone System Cost Management Robot Holidays YouTube Data Storage Cryptocurrency Video Conferencing Safety Managed Services Provider IT Management Virtual Desktop VPN Professional Services Meetings Virtual Machines Data storage Modem Supply Chain LiFi User Tip Processor Mobile Security Outlook Computer Repair iPhone Money Humor Smart Technology Vulnerabilities Customer Relationship Management Saving Time Machine Learning Sports Images 101 Mouse Hacking Managed IT Service Presentation Data Privacy Multi-Factor Authentication Mobility Administration Downloads Browsers Remote Working Connectivity IT Maintenance Best Practice Memory Break Fix Twitter Error Upload Business Intelligence Data Breach Buisness Google Play Shortcuts IT solutions Multi-Factor Security IP Address Social Engineering Videos Social Network Legal Electronic Health Records IoT Ransmoware Business Growth Wasting Time Dark Web Remote Computing Trends Vendors Trend Micro Security Cameras Software as a Service Regulations Be Proactive Google Calendar Cortana Tablet Customer Resource management Recovery Data Analysis Hard Drives Star Wars Workforce Alt Codes Managing Costs Microsoft Excel Alert Managed IT SSID File Sharing Domains Dark Data Gamification Threats eCommerce Staff Downtime Surveillance Social Networking Workplace Strategies Hosted Solution Virtual Assistant Legislation How To Notifications Fileless Malware Refrigeration Meta Typing Virtual Machine Medical IT Travel Public Speaking Reviews Content Amazon Wearable Technology Google Drive Development Motherboard Techology Transportation Comparison Knowledge Google Maps Lithium-ion battery Health IT Directions Assessment Outsource IT Entrepreneur Hypervisor Permissions Media PowerPoint 5G Unified Threat Management Shopping Environment Optimization Google Docs Unified Communications Unified Threat Management Employer/Employee Relationships Specifications Experience Microchip Undo PCI DSS Internet Exlporer Small Businesses Bitcoin Fraud Running Cable Navigation Network Congestion Gig Economy Username Displays Google Wallet Internet Service Provider User Error Teamwork Black Friday Regulations Compliance Database Outsourcing Windows 8 Laptop Evernote Point of Sale Drones Memes IT Technicians Application Net Neutrality Cookies Workplace SQL Server Cyber Monday Proxy Server Tech Support Financial Data Tactics Hiring/Firing History Hotspot Halloween Network Management Paperless IBM Monitors Smartwatch IT Mirgation Procurement Nanotechnology Co-managed IT Azure Websites Telework Addiction Technology Care Hacks Cyber security Language Scary Stories Tech Business Communications Fun CES Management Communitications Chatbots Supply Chain Management Screen Reader Scams Deep Learning SharePoint Distributed Denial of Service Electronic Medical Records Competition FinTech Service Level Agreement Hybrid Work Computing Infrastructure Term Identity Human Resources Education Lenovo Writing IT Assessment Bookmark Flexibility Smart Tech Cables Value Virtual Reality Private Cloud Organization Download Mobile Computing Alerts Server Management Google Apps Superfish Search Identity Theft Digital Security Cameras User Smart Devices

Blog Archive