Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Hosted Solutions Collaboration Backup Small Business Users Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Saving Money Communication Passwords Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Artificial Intelligence Holiday Facebook Automation Miscellaneous Cloud Computing Covid-19 Training Gadgets Managed Service Provider Remote Work Compliance Server IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Windows 10 Office Government Business Continuity Data Management Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Blockchain Mobile Office Vendor Apps Data Security Two-factor Authentication Chrome BYOD Mobile Device Management Budget Gmail Apple WiFi Tip of the week App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Marketing HIPAA Applications Access Control Conferencing Computing Information Technology How To Hacker BDR Avoiding Downtime Office 365 Analytics Website 2FA Office Tips Augmented Reality Router Physical Security Storage Virtual Private Network Password Bring Your Own Device Health Help Desk Big Data Retail Operating System Healthcare Risk Management Managed IT Services Computers Remote Monitoring End of Support Vulnerability Vendor Management Solutions Excel Firewall Display Printer Paperless Office Infrastructure Monitoring The Internet of Things Document Management Social Going Green Remote Workers Telephone Cybercrime Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Windows 11 Patch Management Save Money Microsoft 365 Outlook Supply Chain Money Humor IT Management Word Meetings VPN Employees Integration Modem Sports User Tip Processor Mouse Computer Repair Mobile Security Holidays Safety Administration Data Storage Smart Technology Data Privacy Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Saving Time Settings Managed IT Service Wireless Printing Maintenance Content Filtering Downloads Antivirus Customer Relationship Management YouTube iPhone Licensing Cryptocurrency Hacking Vulnerabilities Entertainment Presentation Images 101 Virtual Desktop Data storage LiFi Wireless Technology Multi-Factor Authentication Robot Mobility Telephone System Cost Management Displays Content Remote Working Wearable Technology Memory Unified Threat Management Motherboard Data Breach Halloween Recovery Comparison Google Play Health IT Unified Threat Management Directions Videos Outsourcing Assessment Electronic Health Records Hard Drives Permissions Domains Wasting Time Workplace Trend Micro Scary Stories Network Congestion Specifications Security Cameras Hacks User Error Microchip Hiring/Firing Internet Exlporer Software as a Service Refrigeration Fraud Fun Username Deep Learning Public Speaking Paperless Managing Costs Co-managed IT Point of Sale eCommerce Black Friday SSID Lithium-ion battery Technology Care Database Surveillance Education Virtual Assistant Entrepreneur Network Management Business Communications Tech Support IT Technicians Virtual Machine Scams Cookies Monitors Cyber Monday Medical IT Proxy Server Reviews Mobile Computing Hybrid Work Tactics Development Undo Hotspot Transportation Search Best Practice Human Resources Websites Mirgation Hypervisor Cables Nanotechnology Optimization Buisness PowerPoint Shopping SharePoint Legal Addiction IT solutions Electronic Medical Records Language Employer/Employee Relationships Navigation Management PCI DSS Business Growth Google Apps Chatbots IT Maintenance Screen Reader Application Writing Distributed Denial of Service Lenovo Gig Economy Business Intelligence Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Cortana Evernote Server Management Regulations Compliance Alt Codes IBM Shortcuts Private Cloud Identity Ransmoware Identity Theft Smart Tech Memes Downtime Superfish Bookmark Vendors Download Net Neutrality Hosted Solution Twitter Alerts SQL Server Financial Data Typing Be Proactive Error History Workforce Connectivity IT Social Engineering Break Fix Browsers Smartwatch Google Drive Threats Upload Procurement Competition Remote Computing Azure Knowledge Multi-Factor Security Tech Social Network Telework Workplace Strategies Cyber security Meta Tablet IoT Communitications Dark Web 5G CES Google Docs Amazon Trends Supply Chain Management Unified Communications Alert Experience Running Cable User Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Bitcoin File Sharing Regulations Data Analysis Google Wallet Outsource IT Star Wars IT Assessment How To Microsoft Excel Environment Gamification Flexibility Media Notifications Staff Value Travel Social Networking Laptop Legislation Organization Windows 8 IP Address Techology Fileless Malware Digital Security Cameras Drones Small Businesses Google Maps Smart Devices

Blog Archive