Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Cybersecurity Communication Smartphone Managed Service Data Backup Android Upgrade Data Recovery VoIP AI Business Management Smartphones Disaster Recovery communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Holiday Training Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Virtualization Business Technology Bandwidth Mobile Office Data Security Vendor Two-factor Authentication Apps Apple Networking App Mobile Device Management Gmail BYOD Employer-Employee Relationship Managed Services Tip of the week Voice over Internet Protocol Chrome Budget Avoiding Downtime How To Marketing BDR HIPAA Computing Applications Information Technology WiFi Access Control Office 365 Conferencing Hacker Bring Your Own Device Managed IT Services Website Operating System Router Virtual Private Network Risk Management 2FA Big Data Health Help Desk Analytics Office Tips Augmented Reality Healthcare Retail Storage Computers Password Free Resource Scam Data loss Project Management Windows 7 Cooperation Microsoft 365 Going Green Patch Management Solutions Save Money Remote Monitoring Firewall End of Support Vulnerability Vendor Management Cybercrime Physical Security The Internet of Things Windows 11 Display Printer Social Paperless Office Infrastructure Excel Monitoring Remote Workers Document Management Customer Service Telephone Data Privacy Mouse Wireless Technology Licensing Images 101 Administration Entertainment Multi-Factor Authentication Mobility Word Robot Telephone System Cost Management Employees Settings Wireless Printing Integration Content Filtering IT Management Safety VPN YouTube Meetings Cryptocurrency Holidays User Tip Modem Data Storage Computer Repair Mobile Security Processor Supply Chain Video Conferencing Virtual Desktop LiFi Managed Services Provider Data storage Virtual Machines Professional Services Smart Technology Outlook Customer Relationship Management Machine Learning Money Saving Time Humor iPhone Managed IT Service Hacking Presentation Maintenance Antivirus Sports Vulnerabilities Downloads Education Connectivity Social Engineering Break Fix Browsers Supply Chain Management FinTech Upload Remote Computing Term Google Apps Multi-Factor Security IP Address Mobile Computing Social Network IT Assessment IT Maintenance Tablet IoT Value Business Intelligence Search Dark Web Flexibility Organization Best Practice Trends Alert Shortcuts Dark Data Google Calendar Digital Security Cameras Managed IT Customer Resource management Recovery Smart Devices Buisness File Sharing Regulations Ransmoware IT solutions Star Wars Memory Vendors How To Microsoft Excel Legal Data Analysis Hard Drives Remote Working Domains Business Growth Gamification Data Breach Notifications Staff Google Play Be Proactive Legislation Videos Electronic Health Records Travel Social Networking Workforce Google Maps Wasting Time Threats Cortana Techology Fileless Malware Refrigeration Public Speaking Alt Codes Content Trend Micro Wearable Technology Security Cameras Workplace Strategies Comparison Lithium-ion battery Health IT Software as a Service Downtime Unified Threat Management Motherboard Meta Hosted Solution Assessment Entrepreneur Managing Costs Amazon Permissions Unified Threat Management Directions Typing eCommerce SSID Virtual Assistant Outsource IT Network Congestion Specifications Surveillance Undo Internet Exlporer Virtual Machine Environment Knowledge Fraud Media Google Drive User Error Microchip Reviews Username Medical IT Transportation Small Businesses 5G Black Friday Development Point of Sale Unified Communications Database Hypervisor Displays Experience Google Docs Shopping Bitcoin Network Management Optimization Running Cable Tech Support IT Technicians PowerPoint Employer/Employee Relationships Outsourcing Monitors Cyber Monday Google Wallet Proxy Server Application Cookies PCI DSS Tactics Hotspot Navigation IBM Gig Economy Windows 8 Laptop Websites Mirgation Workplace Teamwork Hiring/Firing Drones Internet Service Provider Nanotechnology Regulations Compliance Addiction Electronic Medical Records Language Evernote Paperless SharePoint Management Memes Halloween Chatbots Co-managed IT SQL Server Technology Care Writing Distributed Denial of Service Lenovo Net Neutrality Screen Reader Competition Financial Data Service Level Agreement History Virtual Reality Computing Infrastructure Business Communications Smartwatch Hacks Server Management IT Scary Stories Private Cloud Identity Scams Azure Hybrid Work Fun Superfish Bookmark Procurement Identity Theft Smart Tech Telework Deep Learning Download Cyber security Twitter Alerts Tech Human Resources CES User Communitications Error Cables

Blog Archive