Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade AI Business Management VoIP Smartphones Mobile Devices communications Data Recovery Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Cloud Computing Holiday Covid-19 Training Miscellaneous Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Chrome Budget Gmail Managed Services Voice over Internet Protocol Apple Networking App Computing Hacker HIPAA Information Technology Applications Avoiding Downtime Access Control Office 365 Marketing Conferencing WiFi How To BDR Operating System Computers Virtual Private Network Risk Management Router Health Website Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Password Bring Your Own Device Managed IT Services Healthcare Big Data Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Microsoft 365 Cybercrime Customer Service Physical Security Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Firewall Excel Scam Data loss Remote Workers The Internet of Things Telephone Social Cooperation Free Resource Going Green Patch Management Save Money Project Management Settings Images 101 Customer Relationship Management Printing Wireless Content Filtering Telephone System Multi-Factor Authentication Mobility IT Management Cost Management VPN YouTube Meetings Hacking Presentation Cryptocurrency Computer Repair Employees Wireless Technology Integration Virtual Desktop LiFi User Tip Modem Data storage Mobile Security Processor Holidays Outlook Word Machine Learning Data Storage Money Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Professional Services Maintenance Saving Time Virtual Machines Antivirus Sports Safety Mouse Managed IT Service Downloads Administration iPhone Licensing Vulnerabilities Entertainment Data Privacy Robot Microsoft Excel IT Maintenance Alt Codes Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Downtime Unified Threat Management Organization Social Networking Unified Threat Management Legislation Shortcuts Hosted Solution Competition Ransmoware Typing Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors Network Congestion Knowledge Health IT Motherboard Data Breach Google Drive User Error Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records Wasting Time Threats User Point of Sale 5G Experience Trend Micro Google Docs Specifications Security Cameras Workplace Strategies Unified Communications Internet Exlporer Software as a Service Fraud Meta Bitcoin Network Management Running Cable Tech Support Microchip Username IP Address Managing Costs Amazon Google Wallet Monitors Black Friday SSID eCommerce Database Surveillance Virtual Assistant Outsource IT Windows 8 Laptop Websites IT Technicians Virtual Machine Environment Drones Recovery Media Hard Drives Cyber Monday Medical IT Electronic Medical Records Proxy Server Reviews Cookies SharePoint Tactics Development Domains Hotspot Transportation Small Businesses Halloween Writing Mirgation Hypervisor Displays Lenovo Refrigeration PowerPoint Virtual Reality Shopping Nanotechnology Optimization Addiction Public Speaking Language Employer/Employee Relationships Outsourcing Hacks Server Management Scary Stories Private Cloud Fun Management PCI DSS Lithium-ion battery Chatbots Superfish Navigation Identity Theft Distributed Denial of Service Workplace Deep Learning Entrepreneur Twitter Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Error Social Engineering Regulations Compliance Identity Evernote Paperless Education Undo Co-managed IT Remote Computing Bookmark Smart Tech Memes Download Net Neutrality Alerts SQL Server Technology Care Mobile Computing Search Financial Data History Business Communications Tablet Break Fix Scams Best Practice Alert Browsers Smartwatch Connectivity IT Upload Procurement Azure Hybrid Work Managed IT Buisness File Sharing Dark Data How To Social Network Telework Cyber security Legal Application Multi-Factor Security Tech Human Resources IT solutions Dark Web Cables Business Growth Notifications CES IoT Communitications Trends Supply Chain Management IBM Travel Cortana Customer Resource management FinTech Regulations Techology Google Calendar Term Google Apps Google Maps

Blog Archive