Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade VoIP AI Business Management Smartphones Data Recovery communications Mobile Devices Windows Disaster Recovery Browser Social Media Microsoft Office Managed IT Services Current Events Network Internet of Things Tech Term Remote Artificial Intelligence Facebook Automation Information Cloud Computing Covid-19 Holiday Miscellaneous Training Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Government Data Management Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Mobile Office Data Security Apps Two-factor Authentication Vendor Managed Services Voice over Internet Protocol Chrome Networking Budget Mobile Device Management Gmail Apple BYOD App Employer-Employee Relationship Tip of the week Applications Office 365 Avoiding Downtime Marketing How To BDR Conferencing WiFi Access Control Computing Information Technology HIPAA Hacker Analytics Office Tips Healthcare Augmented Reality Website Managed IT Services Help Desk Storage Password Bring Your Own Device 2FA Virtual Private Network Big Data Operating System Health Risk Management Computers Router Retail Remote Workers Scam Data loss Monitoring Free Resource Project Management Patch Management Firewall Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Vendor Management Telephone Solutions The Internet of Things Windows 11 Physical Security Going Green Display Printer Social Cooperation Excel Paperless Office Cybercrime Infrastructure Customer Service Document Management Data Privacy Maintenance Antivirus Modem Wireless Technology User Tip Processor Outlook Mobile Security Money iPhone Humor Word Smart Technology Vulnerabilities Sports Saving Time Images 101 Mouse Robot Multi-Factor Authentication Mobility Administration Managed IT Service Safety Downloads IT Management VPN Meetings Licensing Employees Supply Chain Entertainment Integration Settings Computer Repair Printing Wireless Content Filtering Holidays YouTube Telephone System Customer Relationship Management Cost Management Data Storage Cryptocurrency Machine Learning Video Conferencing Managed Services Provider Hacking Virtual Machines Virtual Desktop Professional Services Presentation Data storage LiFi Laptop Evernote Username Regulations Compliance Windows 8 Twitter Drones Error Memes Black Friday Google Apps IP Address IT Maintenance Database Net Neutrality Social Engineering SQL Server Remote Computing History Halloween Business Intelligence Financial Data IT Technicians Proxy Server Smartwatch Cookies IT Cyber Monday Shortcuts Ransmoware Recovery Tactics Tablet Procurement Hotspot Azure Mirgation Alert Cyber security Scary Stories Tech Vendors Hard Drives Telework Hacks Managed IT CES Nanotechnology File Sharing Communitications Dark Data Fun Domains Be Proactive Workforce Addiction Supply Chain Management Deep Learning Language How To Chatbots Notifications Term Threats Refrigeration Management FinTech Screen Reader Travel IT Assessment Education Distributed Denial of Service Public Speaking Workplace Strategies Lithium-ion battery Meta Techology Service Level Agreement Google Maps Flexibility Computing Infrastructure Value Identity Amazon Entrepreneur Organization Mobile Computing Bookmark Digital Security Cameras Smart Tech Unified Threat Management Smart Devices Search Outsource IT Unified Threat Management Download Remote Working Best Practice Alerts Memory Data Breach Buisness Google Play Environment Undo Media Browsers Videos Legal Connectivity Electronic Health Records IT solutions Break Fix Network Congestion Small Businesses User Error Upload Business Growth Wasting Time Trend Micro Multi-Factor Security Security Cameras Displays Social Network IoT Point of Sale Software as a Service Dark Web Cortana Managing Costs Outsourcing Application Trends Alt Codes Regulations Tech Support eCommerce Downtime Google Calendar SSID Customer Resource management Network Management IBM Workplace Data Analysis Star Wars Surveillance Hosted Solution Microsoft Excel Monitors Virtual Assistant Virtual Machine Hiring/Firing Gamification Typing Staff Reviews Social Networking Websites Legislation Medical IT Paperless Co-managed IT Fileless Malware Google Drive Development Transportation Knowledge Hypervisor Technology Care SharePoint Content Wearable Technology Electronic Medical Records Shopping Motherboard Optimization Comparison PowerPoint 5G Competition Business Communications Health IT Scams Directions Lenovo Google Docs Assessment Unified Communications Permissions Writing Employer/Employee Relationships Experience Running Cable Navigation Hybrid Work PCI DSS Bitcoin Virtual Reality Gig Economy Google Wallet Private Cloud Specifications Human Resources Server Management Cables Microchip Superfish User Internet Exlporer Identity Theft Internet Service Provider Fraud Teamwork

Blog Archive