Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Backup Microsoft Small Business Productivity Quick Tips Saving Money Managed Service Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Training Covid-19 Managed Service Provider Compliance Remote Work Server Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Managed Services Apple Networking Voice over Internet Protocol WiFi App Employer-Employee Relationship BYOD Tip of the week Conferencing How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Augmented Reality 2FA Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Website Analytics Office Tips Document Management Windows 11 Firewall Excel Telephone Scam Data loss Remote Workers The Internet of Things Cooperation Going Green Patch Management Social Save Money Remote Monitoring Free Resource Vulnerability Project Management End of Support Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security Customer Service Display Printer Solutions Paperless Office Infrastructure Monitoring Money Saving Time Holidays Humor Word Data Storage Supply Chain Managed IT Service Video Conferencing Maintenance Sports Downloads Antivirus Managed Services Provider Mouse Virtual Machines Professional Services Licensing Safety Entertainment Administration iPhone Telephone System Robot Cost Management Vulnerabilities Settings Data Privacy Printing Wireless Images 101 Content Filtering Customer Relationship Management IT Management VPN Multi-Factor Authentication YouTube Meetings Mobility Cryptocurrency User Tip Modem Hacking Presentation Processor Computer Repair Mobile Security Virtual Desktop Employees Wireless Technology Data storage LiFi Integration Smart Technology Outlook Machine Learning Lenovo Screen Reader Medical IT Writing Distributed Denial of Service Reviews Hard Drives Domains Development Service Level Agreement Transportation Small Businesses Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Hacks Server Management Hypervisor Displays Superfish Bookmark Optimization Identity Theft Smart Tech PowerPoint Fun Shopping Refrigeration Public Speaking Deep Learning Download Employer/Employee Relationships Outsourcing Twitter Alerts Error Navigation Lithium-ion battery PCI DSS Gig Economy Browsers Entrepreneur Education Connectivity Workplace Social Engineering Break Fix Internet Service Provider Upload Teamwork Hiring/Firing Remote Computing Evernote Paperless Multi-Factor Security Regulations Compliance Mobile Computing Social Network Undo Memes Tablet IoT Co-managed IT Search Dark Web Net Neutrality Best Practice Trends SQL Server Technology Care Alert Managed IT Customer Resource management History Buisness File Sharing Regulations Business Communications Dark Data Google Calendar Financial Data Smartwatch Legal Data Analysis IT IT solutions Star Wars Scams How To Microsoft Excel Notifications Staff Procurement Business Growth Gamification Azure Hybrid Work Cyber security Travel Social Networking Tech Human Resources Legislation Telework Application CES Techology Fileless Malware Communitications Google Maps Cables Cortana Wearable Technology IBM Supply Chain Management Alt Codes Content Health IT Downtime Unified Threat Management Motherboard Term Google Apps Comparison FinTech Unified Threat Management Directions IT Assessment Hosted Solution Assessment IT Maintenance Permissions Flexibility Typing Value Business Intelligence Shortcuts Network Congestion Specifications Organization Digital Security Cameras Competition Google Drive User Error Microchip Smart Devices Internet Exlporer Ransmoware Knowledge Fraud Remote Working Username Memory Vendors Data Breach Point of Sale Google Play Be Proactive 5G Black Friday Videos Google Docs Electronic Health Records Unified Communications Database Workforce Experience Running Cable Tech Support IT Technicians User Bitcoin Network Management Wasting Time Threats Google Wallet Proxy Server Trend Micro Cookies Security Cameras Workplace Strategies Monitors Cyber Monday Software as a Service Tactics Meta Hotspot Laptop Websites Mirgation IP Address Windows 8 Managing Costs Amazon Drones eCommerce Nanotechnology SSID SharePoint Surveillance Addiction Virtual Assistant Outsource IT Electronic Medical Records Language Halloween Chatbots Media Recovery Management Virtual Machine Environment

Blog Archive