Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips IT Services Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Data Recovery Disaster Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Covid-19 Cloud Computing Training Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Tip of the week Mobile Device Management Managed Services Voice over Internet Protocol Chrome Gmail Budget WiFi Networking Apple App Employer-Employee Relationship BYOD Office 365 Conferencing How To BDR HIPAA Computing Applications Hacker Information Technology Avoiding Downtime Access Control Marketing Analytics Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router Computers Virtual Private Network Risk Management 2FA Health Website Help Desk Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Free Resource Project Management Windows 7 Cooperation Social Microsoft 365 Patch Management Save Money Going Green Remote Monitoring Solutions End of Support Vulnerability Vendor Management Customer Service Cybercrime Physical Security Display Windows 11 Printer Paperless Office Infrastructure Monitoring Excel Virtual Machines Professional Services Word Machine Learning Outlook Saving Time Money Managed IT Service Humor Maintenance iPhone Downloads Antivirus Safety Vulnerabilities Sports Licensing Mouse Data Privacy Entertainment Images 101 Administration Mobility Multi-Factor Authentication Robot Telephone System Cost Management Customer Relationship Management Settings Employees Printing IT Management Integration Wireless Content Filtering VPN Meetings Hacking Presentation YouTube User Tip Modem Holidays Cryptocurrency Computer Repair Mobile Security Processor Wireless Technology Data Storage Supply Chain Video Conferencing Virtual Desktop Smart Technology Data storage Managed Services Provider LiFi SharePoint Hard Drives Windows 8 Addiction Workplace Laptop Electronic Medical Records Language Gig Economy Internet Service Provider Domains Drones Management Teamwork Hiring/Firing Chatbots Screen Reader Evernote Paperless Writing Distributed Denial of Service Regulations Compliance Lenovo Memes Refrigeration Service Level Agreement Co-managed IT Halloween Virtual Reality Computing Infrastructure Net Neutrality Public Speaking Server Management SQL Server Technology Care Private Cloud Identity Identity Theft Smart Tech Business Communications Financial Data Lithium-ion battery Superfish Bookmark History IT Hacks Download Scams Entrepreneur Scary Stories Twitter Alerts Smartwatch Fun Procurement Azure Hybrid Work Error Deep Learning Connectivity Tech Human Resources Social Engineering Break Fix Telework Browsers Cyber security Communitications Undo Upload Cables Remote Computing CES Multi-Factor Security Supply Chain Management Social Network Education Tablet IoT Term Google Apps Dark Web FinTech IT Assessment Mobile Computing Trends IT Maintenance Alert Search Dark Data Google Calendar Flexibility Managed IT Customer Resource management Value Business Intelligence File Sharing Regulations Application Best Practice Star Wars Shortcuts How To Microsoft Excel Organization Data Analysis Smart Devices Gamification Ransmoware Buisness Notifications Staff Digital Security Cameras Legislation Remote Working IBM Legal Memory Vendors IT solutions Travel Social Networking Business Growth Google Maps Google Play Be Proactive Techology Fileless Malware Data Breach Electronic Health Records Content Workforce Wearable Technology Videos Cortana Comparison Health IT Wasting Time Threats Unified Threat Management Motherboard Alt Codes Assessment Security Cameras Workplace Strategies Permissions Unified Threat Management Directions Trend Micro Software as a Service Competition Meta Downtime Network Congestion Specifications Managing Costs Amazon Hosted Solution eCommerce Typing Internet Exlporer SSID Fraud User Error Microchip Surveillance Username Virtual Assistant Outsource IT Media Knowledge Black Friday Google Drive Virtual Machine Environment User Point of Sale Database Medical IT Reviews Development Network Management Transportation Small Businesses Tech Support IT Technicians 5G Experience Monitors Cyber Monday IP Address Google Docs Proxy Server Hypervisor Displays Unified Communications Cookies Optimization Bitcoin Tactics PowerPoint Running Cable Hotspot Shopping Google Wallet Employer/Employee Relationships Outsourcing Websites Mirgation Nanotechnology Navigation PCI DSS Recovery

Blog Archive