Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware Mobile Device AI Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Automation Artificial Intelligence Facebook Holiday Training Covid-19 Compliance Gadgets Cloud Computing Remote Work Server IT Support Managed Service Provider Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Vendor Two-factor Authentication Mobile Office Managed Services Data Security Apps Tip of the week Chrome Mobile Device Management Budget Gmail Voice over Internet Protocol Apple Networking WiFi App Employer-Employee Relationship BYOD Hacker HIPAA Access Control Avoiding Downtime Applications Office 365 Marketing Password Conferencing Managed IT Services How To BDR Computing Physical Security Information Technology Computers Router Health Website Office Tips Analytics Augmented Reality 2FA Retail Help Desk Storage Bring Your Own Device Healthcare Big Data Operating System Virtual Private Network Risk Management Solutions Printer Paperless Office Infrastructure Windows 11 Document Management Monitoring Firewall Excel Scam Data loss Managed IT Service Remote Workers The Internet of Things Telephone Going Green Patch Management Social Save Money Remote Monitoring Cooperation Free Resource Vulnerability End of Support Project Management Vendor Management Windows 7 Cybercrime Microsoft 365 Customer Service Display Presentation Computer Repair Virtual Desktop Employees Wireless Technology Integration Data storage LiFi Modem User Tip Processor Mobile Security Outlook Machine Learning Holidays Money Word Humor Data Storage Smart Technology Supply Chain Maintenance Video Conferencing Antivirus Sports Managed Services Provider Virtual Machines Professional Services Mouse Saving Time Safety Administration Downloads iPhone Licensing Robot Vulnerabilities Entertainment Settings Data Privacy Printing Wireless Content Filtering Images 101 IT Management Customer Relationship Management Mobility VPN YouTube Meetings Telephone System Multi-Factor Authentication Cost Management Cryptocurrency Hacking Experience Assessment Electronic Health Records Permissions Workforce Google Docs Unified Communications Directions Videos Bitcoin Network Management Running Cable Tech Support User Wasting Time Threats Specifications Security Cameras Workplace Strategies Google Wallet Monitors Trend Micro Microchip Internet Exlporer Software as a Service Fraud Meta Windows 8 IP Address Laptop Websites Username Managing Costs Amazon eCommerce Black Friday SSID Drones Electronic Medical Records Database Surveillance Virtual Assistant Outsource IT SharePoint Media Halloween Recovery IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Lenovo Proxy Server Reviews Hard Drives Writing Domains Virtual Reality Tactics Development Hotspot Transportation Small Businesses Hacks Server Management Scary Stories Private Cloud Mirgation Hypervisor Displays Fun Nanotechnology Optimization PowerPoint Superfish Identity Theft Shopping Refrigeration Deep Learning Public Speaking Twitter Addiction Language Employer/Employee Relationships Outsourcing Navigation Lithium-ion battery Error Management PCI DSS Chatbots Social Engineering Screen Reader Entrepreneur Distributed Denial of Service Workplace Education Gig Economy Remote Computing Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Mobile Computing Regulations Compliance Identity Search Smart Tech Memes Co-managed IT Tablet Bookmark Undo Best Practice Alert Download Net Neutrality Alerts SQL Server Technology Care Business Communications Managed IT Buisness File Sharing Financial Data Dark Data History How To Connectivity IT Break Fix Scams Legal IT solutions Browsers Smartwatch Business Growth Notifications Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Travel Social Network Telework Application Cyber security Cortana IoT Communitications Dark Web Cables Techology Google Maps CES Alt Codes IBM Trends Supply Chain Management Google Calendar Term Google Apps Downtime Unified Threat Management Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Unified Threat Management Hosted Solution Data Analysis Typing Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Organization Network Congestion Social Networking Knowledge Smart Devices Ransmoware Google Drive User Error Fileless Malware Digital Security Cameras Competition Content Remote Working Wearable Technology Memory Vendors Comparison Google Play Be Proactive Point of Sale Health IT 5G Motherboard Data Breach

Blog Archive