Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Data Productivity Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Ransomware Quick Tips Data Backup Microsoft Communication Small Business Mobile Device Smartphones Saving Money Business Management Workplace Strategy Mobile Devices communications Android Smartphone VoIP Managed IT Services Microsoft Office Data Recovery Browser Managed Service Passwords Upgrade Social Media Backup Disaster Recovery Network Tech Term Internet of Things Artificial Intelligence Automation Covid-19 Cloud Computing Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Encryption Gadgets Spam Information Employee/Employer Relationship Holiday Windows 10 Business Continuity Data Management Government Windows 10 Blockchain Wi-Fi Productivity Business Technology Bandwidth Compliance Data Security Current Events Virtualization Apps Two-factor Authentication Managed Services Voice over Internet Protocol Chrome Mobile Device Management Budget Gmail Networking Apple App Vendor Employer-Employee Relationship Office Avoiding Downtime Office 365 Conferencing Mobile Office How To BDR Applications Computing Information Technology Hacker Access Control Analytics Office Tips Website Healthcare Marketing Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services WiFi AI Big Data HIPAA Router BYOD Operating System Virtual Private Network Training Risk Management Computers Health Help Desk Remote Workers Tip of the week Document Management IT Support Telephone Scam Firewall Free Resource Project Management Data loss Windows 7 Cooperation Microsoft 365 The Internet of Things Solutions Patch Management Save Money Remote Monitoring Social Going Green End of Support Vulnerability Vendor Management Windows 11 Cybercrime Display Customer Service Printer Excel Paperless Office Monitoring Infrastructure Saving Time Machine Learning Outlook Managed IT Service Money iPhone Word Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Sports Entertainment Mouse Images 101 Multi-Factor Authentication Safety Mobility Administration Telephone System Cost Management Robot Employees Integration Settings Wireless IT Management Printing Meetings Content Filtering VPN Modem User Tip Customer Relationship Management YouTube Processor Holidays 2FA Mobile Security Supply Chain Cryptocurrency Computer Repair Data Storage Hacking Video Conferencing Presentation Smart Technology Managed Services Provider Virtual Desktop Virtual Machines Professional Services Data storage LiFi Wireless Technology IP Address SharePoint Screen Reader Evernote Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop Memes Business Communications Service Level Agreement Computing Infrastructure Drones Lenovo Identity Writing Net Neutrality Scams SQL Server Bookmark History Smart Tech Recovery Virtual Reality Financial Data Hybrid Work Halloween Private Cloud Smartwatch IT Human Resources Download Hard Drives Server Management Alerts Superfish Identity Theft Procurement Cables Azure Domains Scary Stories Browsers Cyber security Connectivity Tech Break Fix Hacks Twitter Telework Error CES Communitications Google Apps Fun Upload Refrigeration Multi-Factor Security Deep Learning Social Engineering Supply Chain Management IT Maintenance Social Network Public Speaking Lithium-ion battery IoT Term Dark Web Remote Computing FinTech Business Intelligence Education IT Assessment Shortcuts Trends Entrepreneur Regulations Tablet Google Calendar Flexibility Ransmoware Customer Resource management Value Data Analysis Star Wars Microsoft Excel Mobile Computing Alert Organization Vendors File Sharing Digital Security Cameras Dark Data Smart Devices Be Proactive Search Gamification Undo Managed IT Staff Social Networking Legislation Best Practice How To Remote Working Workforce Memory Buisness Fileless Malware Data Breach Google Play Notifications Threats Legal Travel Videos IT solutions Electronic Health Records Workplace Strategies Content Wearable Technology Techology Motherboard Google Maps Comparison Business Growth Meta Health IT Wasting Time Directions Trend Micro Assessment Security Cameras Application Permissions Amazon Unified Threat Management Software as a Service Cortana Unified Threat Management Specifications Alt Codes Outsource IT Managing Costs IBM Downtime Microchip eCommerce Media Internet Exlporer SSID Fraud Environment Hosted Solution Network Congestion Surveillance Username Virtual Assistant User Error Black Friday Typing Physical Security Small Businesses Virtual Machine Database Medical IT Reviews Displays Google Drive Point of Sale Development Knowledge Transportation Competition IT Technicians Cookies Cyber Monday Outsourcing Proxy Server Hypervisor Optimization 5G Tactics PowerPoint Network Management Hotspot Tech Support Shopping Google Docs Unified Communications Monitors Workplace Experience Employer/Employee Relationships Mirgation Nanotechnology Navigation User Bitcoin PCI DSS Hiring/Firing Running Cable Gig Economy Paperless Addiction Language Google Wallet Websites Internet Service Provider Co-managed IT Management Teamwork Chatbots

Blog Archive