Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity AI Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Information Holiday Facebook Miscellaneous Automation Cloud Computing Covid-19 Training Gadgets Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Virtualization Business Technology Two-factor Authentication Data Security Mobile Office Vendor Apps Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi App Tip of the week Employer-Employee Relationship Computing Conferencing Information Technology Hacker Avoiding Downtime How To Office 365 BDR Marketing HIPAA Applications Access Control 2FA Retail Healthcare Risk Management Computers Managed IT Services Office Tips Analytics Website Augmented Reality Storage Password Router Physical Security Bring Your Own Device Virtual Private Network Big Data Health Help Desk Operating System Remote Workers Customer Service Excel Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Solutions Display The Internet of Things Printer Paperless Office Infrastructure Going Green Monitoring Social Document Management Windows 11 Cybercrime YouTube Managed IT Service Supply Chain Cryptocurrency Maintenance Downloads Hacking Antivirus iPhone Presentation Licensing Virtual Desktop Entertainment Data storage Vulnerabilities LiFi Wireless Technology Images 101 Outlook Multi-Factor Authentication Money Robot Mobility Telephone System Word Cost Management Humor Data Privacy Sports IT Management VPN Employees Meetings Mouse Integration Safety User Tip Modem Administration Processor Computer Repair Mobile Security Holidays Data Storage Smart Technology Settings Video Conferencing Machine Learning Managed Services Provider Printing Wireless Content Filtering Saving Time Virtual Machines Professional Services Customer Relationship Management Private Cloud Identity Displays Evernote Server Management Regulations Compliance Knowledge Superfish Bookmark Identity Theft Smart Tech Memes Google Drive Competition Outsourcing Download Net Neutrality Twitter Alerts SQL Server Error History 5G Financial Data Experience Browsers Smartwatch Connectivity IT Google Docs Social Engineering Break Fix Workplace Unified Communications Hiring/Firing Bitcoin Running Cable User Upload Procurement Remote Computing Azure Cyber security Google Wallet Multi-Factor Security Tech Paperless Social Network Telework CES Tablet IoT Communitications Dark Web Co-managed IT Technology Care Windows 8 IP Address Laptop Trends Supply Chain Management Alert File Sharing Regulations Drones Dark Data Google Calendar Term Business Communications Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel Scams Hybrid Work Halloween Recovery Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Human Resources Hard Drives Organization Domains Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cables Hacks Scary Stories Content Remote Working Wearable Technology Memory Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Google Apps Refrigeration Fun Public Speaking Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions IT Maintenance Deep Learning Wasting Time Business Intelligence Lithium-ion battery Entrepreneur Trend Micro Network Congestion Specifications Security Cameras Shortcuts Education User Error Microchip Internet Exlporer Software as a Service Fraud Ransmoware Managing Costs Vendors Mobile Computing Username Point of Sale eCommerce Black Friday SSID Be Proactive Undo Search Workforce Best Practice Database Surveillance Virtual Assistant Tech Support IT Technicians Virtual Machine Threats Buisness Network Management Proxy Server Reviews Cookies Legal Monitors Cyber Monday Medical IT Workplace Strategies IT solutions Meta Business Growth Tactics Development Hotspot Transportation Websites Mirgation Hypervisor Amazon Application Cortana Shopping Nanotechnology Optimization PowerPoint Outsource IT Alt Codes IBM SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Chatbots Environment Navigation Media Downtime Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Hosted Solution Small Businesses Typing Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork

Blog Archive