Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Hosted Solutions Collaboration Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Artificial Intelligence Automation Facebook Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Bandwidth Windows 10 Business Technology Virtualization Apps Data Security Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship Networking BYOD Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple WiFi Tip of the week Computing How To HIPAA BDR Hacker Information Technology Applications Avoiding Downtime Marketing Office 365 Conferencing Access Control Retail 2FA Operating System Managed IT Services Router Computers Risk Management Website Analytics Office Tips Help Desk Augmented Reality Virtual Private Network Storage Healthcare Password Health Bring Your Own Device Big Data Social Windows 11 Windows 7 Cooperation Going Green Microsoft 365 Scam Data loss Excel Solutions Cybercrime Customer Service Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Monitoring Physical Security Display Printer Firewall Remote Workers Paperless Office Infrastructure Telephone The Internet of Things Document Management Free Resource Project Management Images 101 Multi-Factor Authentication Mobility Maintenance Supply Chain Antivirus Settings Telephone System Wireless Cost Management Customer Relationship Management Printing Content Filtering Employees YouTube Integration Hacking Presentation Cryptocurrency Robot Modem Wireless Technology User Tip Processor Holidays Mobile Security Virtual Desktop Data storage LiFi Data Privacy Data Storage IT Management Outlook VPN Meetings Video Conferencing Managed Services Provider Smart Technology Word Virtual Machines Professional Services Money Humor Saving Time Computer Repair Managed IT Service Sports Safety iPhone Mouse Downloads Administration Machine Learning Vulnerabilities Licensing Entertainment IT solutions Private Cloud IT Assessment Trends Legal Application Server Management Value Regulations Superfish Google Calendar Business Growth Identity Theft Small Businesses Flexibility Customer Resource management Organization Data Analysis Star Wars IBM Microsoft Excel Displays Twitter Error Digital Security Cameras Cortana Smart Devices Gamification Staff Memory Social Networking Legislation Alt Codes Outsourcing Social Engineering Remote Working Fileless Malware Data Breach Google Play Downtime Remote Computing Hosted Solution Workplace Videos Electronic Health Records Content Wearable Technology Wasting Time Motherboard Competition Comparison Typing Tablet Hiring/Firing Health IT Directions Trend Micro Assessment Security Cameras Permissions Alert Paperless File Sharing Co-managed IT Knowledge Dark Data Software as a Service Google Drive Managed IT Managing Costs Specifications Technology Care How To 5G Microchip eCommerce Internet Exlporer SSID Fraud User Notifications Business Communications Unified Communications Travel Scams Experience Surveillance Username Virtual Assistant Google Docs Virtual Machine Techology Black Friday Bitcoin Google Maps Hybrid Work Running Cable Human Resources Reviews Database IP Address Medical IT Google Wallet Unified Threat Management Cables Development Transportation IT Technicians Hypervisor Cookies Unified Threat Management Cyber Monday Windows 8 Laptop Proxy Server Google Apps Shopping Optimization Tactics PowerPoint Hotspot Drones Recovery Hard Drives IT Maintenance Network Congestion Employer/Employee Relationships Mirgation Nanotechnology Domains User Error Navigation Business Intelligence Halloween PCI DSS Shortcuts Gig Economy Addiction Language Chatbots Refrigeration Point of Sale Ransmoware Internet Service Provider Management Teamwork Screen Reader Public Speaking Evernote Distributed Denial of Service Hacks Vendors Scary Stories Regulations Compliance Tech Support Be Proactive Fun Memes Service Level Agreement Lithium-ion battery Computing Infrastructure Network Management Identity Deep Learning Entrepreneur Workforce Monitors Net Neutrality SQL Server Bookmark History Smart Tech Threats Financial Data Education Websites Workplace Strategies Smartwatch IT Download Alerts Undo Meta Procurement Azure Browsers Cyber security Connectivity SharePoint Tech Break Fix Mobile Computing Amazon Electronic Medical Records Telework CES Search Communitications Upload Lenovo Multi-Factor Security Best Practice Outsource IT Writing Supply Chain Management Social Network FinTech IoT Term Dark Web Environment Buisness Virtual Reality Media

Blog Archive