Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Type Accents and Other Oddball Characters

b2ap3_thumbnail_special_character_400.jpgWe’ve all seen the various accent marks, or “diacritical marks,” used in languages all over the world. For example, the umlaut (as seen in the word “über” ) is used in some German and Hungarian words to signal how to pronounce specific vowels. While these have mostly disappeared from the English language, we see them from time to time when going about our business on the web, and every time, the same question plays in our heads: “How the heck do you type that?”

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Small Business Workplace Strategy Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Saving Money Backup VoIP Business Management Smartphones Android Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Managed Service Managed IT Services Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Current Events Productivity Covid-19 Cloud Computing Server Managed Service Provider Miscellaneous Remote Work Gadgets Outsourced IT Information Holiday AI Encryption Employee/Employer Relationship Spam Windows 10 Compliance Business Continuity Data Management Government Training Office Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Mobile Office Data Security Apps Two-factor Authentication Chrome Mobile Device Management Budget Gmail Apple Networking Vendor App Employer-Employee Relationship Managed Services Voice over Internet Protocol Avoiding Downtime Office 365 Tip of the week Marketing How To WiFi BDR Applications BYOD Computing Information Technology Hacker Conferencing Access Control Healthcare Office Tips Analytics Website IT Support Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services HIPAA Router Big Data Operating System Help Desk Virtual Private Network Risk Management Computers Health Telephone Document Management Cooperation Free Resource Project Management Firewall Windows 7 Scam Microsoft 365 Data loss The Internet of Things Solutions Going Green Patch Management Social Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Cybercrime 2FA Monitoring Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Downloads iPhone Outlook Machine Learning Licensing Money Entertainment Word Vulnerabilities Humor Data Privacy Images 101 Maintenance Antivirus Sports Multi-Factor Authentication Mobility Mouse Telephone System Cost Management Safety Administration Employees Integration Robot Modem User Tip Processor Settings Mobile Security Printing Wireless Content Filtering Holidays IT Management Customer Relationship Management VPN YouTube Meetings Data Storage Physical Security Smart Technology Supply Chain Cryptocurrency Video Conferencing Hacking Managed Services Provider Computer Repair Virtual Machines Professional Services Presentation Saving Time Virtual Desktop Managed IT Service Data storage LiFi Wireless Technology Windows 8 IP Address Laptop Websites Download Net Neutrality Alerts SQL Server Technology Care Business Communications Drones Financial Data History Browsers Smartwatch Electronic Medical Records Connectivity IT Break Fix Scams SharePoint Halloween Recovery Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Lenovo Hard Drives Social Network Telework Writing Domains CES Virtual Reality IoT Communitications Dark Web Cables Hacks Server Management Scary Stories Private Cloud Trends Supply Chain Management Regulations Google Calendar Term Google Apps Superfish Identity Theft Refrigeration Customer Resource management FinTech Fun Public Speaking Data Analysis Twitter Star Wars IT Assessment Microsoft Excel IT Maintenance Deep Learning Lithium-ion battery Error Gamification Flexibility Staff Value Business Intelligence Entrepreneur Social Networking Legislation Shortcuts Education Organization Social Engineering Fileless Malware Digital Security Cameras Remote Computing Smart Devices Ransmoware Mobile Computing Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Tablet Undo Health IT Search Best Practice Directions Videos Alert Assessment Electronic Health Records Permissions Workforce Managed IT Buisness File Sharing Dark Data Wasting Time Threats How To Trend Micro Specifications Security Cameras Workplace Strategies Legal IT solutions Business Growth Microchip Notifications Internet Exlporer Software as a Service Fraud Meta Travel Application Username Managing Costs Amazon Cortana eCommerce Black Friday SSID Techology Google Maps Alt Codes IBM Database Surveillance Virtual Assistant Outsource IT Media Downtime Unified Threat Management IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Unified Threat Management Hosted Solution Proxy Server Reviews Typing Tactics Development Hotspot Transportation Small Businesses Network Congestion Mirgation Hypervisor Displays Knowledge Nanotechnology Optimization PowerPoint Google Drive User Error Competition Shopping Addiction Language Employer/Employee Relationships Outsourcing Navigation Point of Sale Management PCI DSS 5G Chatbots Experience Screen Reader Distributed Denial of Service Workplace Google Docs Unified Communications Gig Economy Bitcoin Network Management Running Cable Tech Support User Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Wallet Regulations Compliance Monitors Identity Smart Tech Memes Co-managed IT Bookmark

Blog Archive