Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Saving Money AI Passwords Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Holiday Artificial Intelligence Gadgets Covid-19 Compliance Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Windows 10 Business Technology Virtualization Wi-Fi Blockchain Bandwidth Vendor Apps Data Security Two-factor Authentication Mobile Office Managed Services Gmail Tip of the week Apple WiFi App Employer-Employee Relationship Networking BYOD Chrome Voice over Internet Protocol Mobile Device Management Budget Password HIPAA Access Control Applications Managed IT Services Conferencing How To Computing BDR Information Technology Hacker Avoiding Downtime Office 365 Physical Security Marketing Storage Health Router Bring Your Own Device 2FA Big Data Retail Help Desk Operating System Risk Management Computers Office Tips Analytics Website Augmented Reality Virtual Private Network Healthcare Firewall Paperless Office Infrastructure Windows 11 Free Resource Project Management The Internet of Things Windows 7 Document Management Excel Microsoft 365 Going Green Social Monitoring Solutions Scam Data loss Cybercrime Managed IT Service Customer Service Telephone Patch Management Save Money Remote Monitoring Vulnerability End of Support Cooperation Vendor Management Display Remote Workers Printer iPhone Sports Mouse Vulnerabilities Safety User Tip Modem Supply Chain Machine Learning Administration Processor Images 101 Mobile Security Multi-Factor Authentication Mobility Maintenance Antivirus Smart Technology Settings Printing Wireless Saving Time Employees Content Filtering Customer Relationship Management Integration YouTube Cryptocurrency Data Privacy Downloads Hacking Holidays Presentation Robot Licensing Data Storage Virtual Desktop Entertainment Data storage LiFi Wireless Technology Video Conferencing IT Management Managed Services Provider Professional Services VPN Outlook Meetings Virtual Machines Telephone System Money Word Humor Cost Management Computer Repair Public Speaking Monitors Directions Assessment Outsource IT Smartwatch Deep Learning Permissions IT Media Procurement Lithium-ion battery Azure Environment Entrepreneur Telework Websites Education Specifications Cyber security Tech Microchip Internet Exlporer Small Businesses CES Fraud Communitications Mobile Computing Supply Chain Management Electronic Medical Records SharePoint Username Displays FinTech Black Friday Undo Search Term Writing Lenovo Database Outsourcing Best Practice IT Assessment IT Technicians Flexibility Virtual Reality Buisness Value Proxy Server Server Management Legal Cookies Workplace Organization Private Cloud IT solutions Cyber Monday Smart Devices Superfish Tactics Hiring/Firing Digital Security Cameras Identity Theft Business Growth Hotspot Mirgation Paperless Remote Working Twitter Memory Application Google Play Nanotechnology Co-managed IT Error Data Breach Cortana Electronic Health Records IBM Social Engineering Addiction Technology Care Videos Alt Codes Language Management Chatbots Business Communications Remote Computing Downtime Wasting Time Security Cameras Screen Reader Scams Hosted Solution Distributed Denial of Service Trend Micro Computing Infrastructure Software as a Service Service Level Agreement Hybrid Work Tablet Typing Identity Human Resources Alert Managing Costs SSID Bookmark Managed IT Google Drive Smart Tech Cables File Sharing eCommerce Competition Dark Data Knowledge Alerts Surveillance How To Virtual Assistant Download Google Apps Notifications Virtual Machine 5G Experience Medical IT Browsers Google Docs Connectivity IT Maintenance Reviews Travel Unified Communications Break Fix Bitcoin Development Running Cable Transportation User Techology Upload Business Intelligence Google Maps Social Network Google Wallet Shortcuts Multi-Factor Security Hypervisor PowerPoint IoT Ransmoware Shopping Unified Threat Management Dark Web Optimization Windows 8 IP Address Laptop Employer/Employee Relationships Unified Threat Management Trends Vendors Customer Resource management Drones Regulations Be Proactive PCI DSS Google Calendar Navigation Data Analysis Star Wars Workforce Gig Economy Microsoft Excel Network Congestion Staff Internet Service Provider Halloween Teamwork Recovery User Error Gamification Threats Social Networking Workplace Strategies Regulations Compliance Legislation Hard Drives Evernote Fileless Malware Meta Point of Sale Memes Domains Hacks Wearable Technology Net Neutrality Scary Stories SQL Server Content Amazon Health IT Network Management Motherboard Financial Data Tech Support Comparison History Refrigeration Fun

Blog Archive