Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade AI Business Management Smartphones VoIP communications Data Recovery Mobile Devices Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Facebook Artificial Intelligence Automation Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Managed Service Provider Remote Work Server Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Windows 10 Virtualization Bandwidth Business Technology Blockchain Vendor Two-factor Authentication Data Security Apps Mobile Office Mobile Device Management Gmail Networking Chrome Budget Employer-Employee Relationship BYOD Apple App Managed Services Voice over Internet Protocol Tip of the week HIPAA Computing Applications Information Technology How To WiFi Office 365 BDR Conferencing Hacker Access Control Avoiding Downtime Marketing Operating System Router Retail Risk Management Managed IT Services Help Desk Office Tips Analytics Big Data Augmented Reality Storage Password Bring Your Own Device Virtual Private Network Computers 2FA Health Website Healthcare Document Management Cybercrime Firewall Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 Monitoring The Internet of Things Solutions Social Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Telephone Physical Security Customer Service Display Cooperation Windows 11 Printer Paperless Office Infrastructure Going Green Excel Remote Workers Content Filtering iPhone Word YouTube Vulnerabilities Maintenance Cryptocurrency User Tip Antivirus Modem Mobile Security Processor Images 101 Mobility Safety Virtual Desktop Multi-Factor Authentication Data Privacy Data storage LiFi Smart Technology Outlook Saving Time Money Employees Robot Integration Humor Managed IT Service IT Management Customer Relationship Management Sports Downloads VPN Mouse Meetings Holidays Licensing Data Storage Entertainment Administration Hacking Computer Repair Presentation Video Conferencing Managed Services Provider Professional Services Virtual Machines Wireless Technology Supply Chain Telephone System Cost Management Settings Printing Machine Learning Wireless Hard Drives IT Paperless Directions Lenovo Assessment Hosted Solution Smartwatch Permissions Writing Typing Virtual Reality Domains Procurement Azure Co-managed IT Tech Server Management Private Cloud Telework Specifications Cyber security Technology Care Refrigeration Knowledge Communitications Business Communications Microchip Superfish Google Drive Internet Exlporer Identity Theft CES Fraud Username Twitter Public Speaking Supply Chain Management Scams Term Error Lithium-ion battery FinTech Black Friday 5G Hybrid Work Social Engineering Experience IT Assessment Entrepreneur Human Resources Google Docs Database Unified Communications Bitcoin IT Technicians Remote Computing Running Cable Flexibility Value Cables Proxy Server Google Wallet Cookies Organization Cyber Monday Hotspot Undo Smart Devices Google Apps Tactics Tablet Digital Security Cameras Windows 8 Mirgation Alert Laptop Remote Working Memory IT Maintenance Google Play Managed IT Drones Nanotechnology File Sharing Dark Data Data Breach Business Intelligence Language How To Electronic Health Records Shortcuts Addiction Videos Management Chatbots Notifications Halloween Wasting Time Ransmoware Security Cameras Screen Reader Travel Distributed Denial of Service Application Trend Micro Vendors Computing Infrastructure Software as a Service Be Proactive Techology Service Level Agreement Google Maps Hacks Identity IBM Scary Stories Managing Costs Workforce SSID Bookmark Smart Tech Unified Threat Management Fun eCommerce Threats Alerts Surveillance Virtual Assistant Workplace Strategies Unified Threat Management Download Deep Learning Virtual Machine Meta Medical IT Browsers Connectivity Education Reviews Break Fix Network Congestion Amazon Competition Development Transportation User Error Upload Social Network Mobile Computing Multi-Factor Security Hypervisor Outsource IT PowerPoint Media IoT Point of Sale Shopping Dark Web Search Optimization Environment Employer/Employee Relationships Trends Best Practice Customer Resource management Network Management Regulations Tech Support Buisness PCI DSS Google Calendar User Small Businesses Navigation Data Analysis Legal Star Wars IT solutions Gig Economy Microsoft Excel Monitors Displays Staff Internet Service Provider Teamwork Gamification Business Growth Social Networking Websites IP Address Regulations Compliance Legislation Outsourcing Evernote Memes Fileless Malware Cortana Alt Codes Wearable Technology Electronic Medical Records Net Neutrality SQL Server Workplace SharePoint Content Health IT Motherboard Downtime Financial Data Comparison Recovery History Hiring/Firing

Blog Archive