Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Mobile Device Managed Service Productivity Microsoft Passwords AI Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Automation Facebook Holiday Artificial Intelligence Gadgets Compliance Cloud Computing Covid-19 Training Outsourced IT Server Managed Service Provider Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Bandwidth Business Technology Virtualization Wi-Fi Blockchain Windows 10 Managed Services Apps Data Security Two-factor Authentication Mobile Office Vendor Gmail Budget WiFi Tip of the week Apple Voice over Internet Protocol App Employer-Employee Relationship Networking BYOD Mobile Device Management Chrome Access Control Password Conferencing Managed IT Services How To BDR Computing Hacker Information Technology Avoiding Downtime Marketing HIPAA Office 365 Physical Security Applications Health Storage Help Desk Bring Your Own Device Big Data Retail 2FA Healthcare Operating System Computers Risk Management Website Router Analytics Office Tips Virtual Private Network Augmented Reality Paperless Office Infrastructure Monitoring The Internet of Things Document Management Windows 11 Social Managed IT Service Remote Workers Telephone Going Green Scam Data loss Excel Customer Service Cooperation Free Resource Cybercrime Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Display Firewall Printer Holidays Safety Data Storage Smart Technology Sports Video Conferencing Mouse Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Administration Maintenance Downloads Supply Chain Antivirus iPhone Customer Relationship Management Licensing Settings Wireless Vulnerabilities Printing Entertainment Content Filtering Hacking YouTube Presentation Images 101 Robot Mobility Cryptocurrency Telephone System Multi-Factor Authentication Cost Management Wireless Technology Virtual Desktop Data Privacy Data storage LiFi IT Management VPN Employees Meetings Word Integration Outlook User Tip Modem Computer Repair Mobile Security Money Processor Humor Monitors Cyber Monday Medical IT Workforce Hacks Proxy Server Reviews Entrepreneur Scary Stories Cookies Tactics Development Fun Hotspot Transportation Threats Workplace Strategies Deep Learning Websites Mirgation Hypervisor PowerPoint Meta Undo Shopping Nanotechnology Optimization Education Addiction Electronic Medical Records Language Employer/Employee Relationships Amazon SharePoint Management PCI DSS Chatbots Navigation Writing Distributed Denial of Service Outsource IT Mobile Computing Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Search Virtual Reality Computing Infrastructure Teamwork Environment Media Application Best Practice Server Management Regulations Compliance Private Cloud Identity Evernote Identity Theft Smart Tech Memes Small Businesses Superfish Bookmark Buisness IBM Legal IT solutions Download Net Neutrality Twitter Alerts SQL Server Displays Business Growth Financial Data Error History Connectivity IT Social Engineering Break Fix Outsourcing Browsers Smartwatch Upload Procurement Cortana Remote Computing Azure Multi-Factor Security Tech Workplace Alt Codes Social Network Telework Cyber security Downtime Tablet IoT Communitications Dark Web Hiring/Firing Competition CES Hosted Solution Trends Supply Chain Management Alert Paperless Dark Data Google Calendar Term Co-managed IT Typing Managed IT Customer Resource management FinTech File Sharing Regulations Star Wars IT Assessment How To Microsoft Excel Technology Care Data Analysis Google Drive User Gamification Flexibility Knowledge Notifications Staff Value Business Communications Legislation Scams Organization Travel Social Networking Google Maps Smart Devices 5G Hybrid Work Techology Fileless Malware Digital Security Cameras IP Address Google Docs Unified Communications Content Remote Working Experience Wearable Technology Memory Human Resources Comparison Google Play Cables Bitcoin Health IT Running Cable Unified Threat Management Motherboard Data Breach Assessment Electronic Health Records Permissions Google Wallet Unified Threat Management Directions Videos Google Apps Recovery Wasting Time Network Congestion Specifications Security Cameras IT Maintenance Hard Drives Windows 8 Laptop Trend Micro Internet Exlporer Software as a Service Fraud Business Intelligence Domains Drones User Error Microchip Shortcuts Username Managing Costs Black Friday SSID Ransmoware Refrigeration Halloween Point of Sale eCommerce Database Surveillance Virtual Assistant Vendors Public Speaking Be Proactive Lithium-ion battery Network Management Tech Support IT Technicians Virtual Machine

Blog Archive