Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android Data Recovery Disaster Recovery AI Upgrade Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Miscellaneous Artificial Intelligence Information Holiday Automation Facebook Gadgets Cloud Computing Covid-19 Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Business Technology Windows 10 Virtualization Data Security Apps Vendor Mobile Office Two-factor Authentication Chrome Networking Budget Employer-Employee Relationship Apple BYOD App Mobile Device Management Tip of the week Gmail Managed Services Voice over Internet Protocol WiFi How To BDR HIPAA Hacker Avoiding Downtime Applications Marketing Access Control Computing Information Technology Conferencing Office 365 Augmented Reality Managed IT Services Storage Password Bring Your Own Device Computers Router Virtual Private Network Website Operating System Health 2FA Help Desk Risk Management Retail Healthcare Analytics Office Tips Big Data Social Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Solutions Physical Security Going Green Display Printer Paperless Office Windows 11 Cybercrime Infrastructure Monitoring Firewall Excel Document Management Remote Workers The Internet of Things Telephone Scam Data loss Money Entertainment Humor Vulnerabilities Data Privacy Images 101 Sports Customer Relationship Management Telephone System Mouse Multi-Factor Authentication Robot Mobility Cost Management Hacking Administration Presentation IT Management VPN Employees Meetings Wireless Technology Integration User Tip Modem Settings Processor Computer Repair Mobile Security Printing Wireless Holidays Content Filtering Word Data Storage YouTube Smart Technology Supply Chain Video Conferencing Cryptocurrency Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Virtual Desktop Safety Data storage LiFi Managed IT Service Maintenance Antivirus Downloads Outlook iPhone Licensing Social Network Telework Application Cyber security Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Dark Web Cables Alert Scary Stories IBM Trends Supply Chain Management Hacks Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Fun Data Analysis Star Wars IT Assessment Deep Learning How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Gamification Flexibility Organization Travel Social Networking Education Legislation Shortcuts Techology Fileless Malware Digital Security Cameras Competition Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Content Remote Working Mobile Computing Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Search Unified Threat Management Directions Videos Assessment Electronic Health Records Best Practice Permissions Workforce User Wasting Time Threats Buisness Legal Trend Micro IT solutions Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Business Growth Fraud Meta Managing Costs Amazon IP Address Username Point of Sale eCommerce Black Friday SSID Cortana Database Surveillance Alt Codes Virtual Assistant Outsource IT Network Management Recovery Tech Support IT Technicians Virtual Machine Environment Downtime Media Proxy Server Reviews Hard Drives Cookies Hosted Solution Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Tactics Development Typing Websites Mirgation Hypervisor Displays Shopping Google Drive Refrigeration Nanotechnology Optimization PowerPoint Knowledge Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Public Speaking Addiction Management PCI DSS Chatbots Navigation 5G Lithium-ion battery Lenovo Gig Economy Google Docs Screen Reader Unified Communications Entrepreneur Writing Distributed Denial of Service Workplace Experience Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Running Cable Service Level Agreement Internet Service Provider Bitcoin Server Management Regulations Compliance Google Wallet Private Cloud Identity Evernote Paperless Superfish Bookmark Undo Identity Theft Smart Tech Memes Co-managed IT Twitter Alerts SQL Server Technology Care Laptop Download Net Neutrality Windows 8 Financial Data Drones Error History Business Communications Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Halloween Upload Procurement

Blog Archive