Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup AI Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Covid-19 Gadgets Server Managed Service Provider Remote Work Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking Managed Services App Voice over Internet Protocol Employer-Employee Relationship HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing How To BDR Operating System Computers Router Physical Security Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password 2FA Bring Your Own Device Big Data Managed IT Services Healthcare Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Free Resource Project Management Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Monitoring Solutions Firewall Document Management Windows 11 Telephone The Internet of Things Scam Data loss Excel Social Cooperation Remote Workers Going Green Patch Management Save Money Settings iPhone Printing Wireless Content Filtering Hacking IT Management Vulnerabilities Data Privacy Presentation VPN YouTube Meetings Cryptocurrency Images 101 Wireless Technology User Tip Modem Computer Repair Mobile Security Multi-Factor Authentication Processor Mobility Virtual Desktop Data storage LiFi Word Smart Technology Employees Outlook Machine Learning Integration Money Saving Time Humor Managed IT Service Holidays Safety Maintenance Antivirus Sports Downloads Data Storage Mouse Licensing Supply Chain Video Conferencing Managed Services Provider Entertainment Administration Virtual Machines Professional Services Telephone System Robot Customer Relationship Management Cost Management Alt Codes Content Wearable Technology Smartwatch IT Scams Azure Hybrid Work Competition Health IT Downtime Unified Threat Management Motherboard Comparison Procurement Permissions Telework Cyber security Unified Threat Management Directions Tech Human Resources Hosted Solution Assessment Typing CES Communitications Cables Network Congestion Specifications Supply Chain Management Knowledge Fraud FinTech Google Drive User Error Microchip Term Google Apps User Internet Exlporer Username IT Assessment IT Maintenance Value Business Intelligence Point of Sale 5G Black Friday Flexibility Experience Organization IP Address Google Docs Shortcuts Unified Communications Database Bitcoin Network Management Running Cable Tech Support IT Technicians Digital Security Cameras Smart Devices Ransmoware Memory Vendors Google Wallet Proxy Server Cookies Monitors Cyber Monday Remote Working Hotspot Data Breach Google Play Be Proactive Recovery Tactics Hard Drives Windows 8 Laptop Websites Mirgation Videos Electronic Health Records Workforce Wasting Time Threats Domains Drones Nanotechnology Electronic Medical Records Language Trend Micro SharePoint Security Cameras Workplace Strategies Addiction Refrigeration Management Halloween Chatbots Software as a Service Meta Managing Costs Amazon Public Speaking Lenovo Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure eCommerce Lithium-ion battery SSID Service Level Agreement Virtual Assistant Outsource IT Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Surveillance Virtual Machine Environment Superfish Bookmark Media Identity Theft Smart Tech Fun Twitter Alerts Reviews Medical IT Deep Learning Download Transportation Small Businesses Undo Error Development Hypervisor Displays Browsers Education Connectivity Social Engineering Break Fix Remote Computing Shopping Optimization PowerPoint Upload Employer/Employee Relationships Outsourcing Mobile Computing Social Network Multi-Factor Security PCI DSS Navigation Tablet IoT Search Dark Web Alert Gig Economy Workplace Application Best Practice Trends Teamwork Hiring/Firing Managed IT Customer Resource management Buisness File Sharing Regulations Dark Data Google Calendar Internet Service Provider Regulations Compliance IBM Legal Data Analysis Evernote Paperless IT solutions Star Wars How To Microsoft Excel Business Growth Gamification Notifications Staff Memes Co-managed IT SQL Server Technology Care Travel Social Networking Legislation Net Neutrality Cortana Financial Data History Techology Fileless Malware Business Communications Google Maps

Blog Archive