Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Google Email Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Saving Money Cybersecurity Managed Service Communication Data Backup Smartphone Android Upgrade Disaster Recovery AI Business Management Smartphones Data Recovery VoIP communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Gadgets Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Employer-Employee Relationship Managed Services Voice over Internet Protocol Tip of the week Chrome Budget Mobile Device Management Gmail Apple Networking App HIPAA Applications Computing Information Technology Hacker Access Control Office 365 Avoiding Downtime Conferencing Marketing How To BDR WiFi Big Data Router Operating System Risk Management Virtual Private Network 2FA Help Desk Computers Health Analytics Office Tips Augmented Reality Website Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Solutions Going Green Patch Management Save Money Remote Monitoring Social End of Support Vulnerability Vendor Management Cybercrime Physical Security Windows 11 Display Printer Monitoring Customer Service Paperless Office Excel Infrastructure Remote Workers Document Management Telephone Firewall Cooperation Free Resource Scam Data loss Project Management Windows 7 Microsoft 365 The Internet of Things Robot Settings Employees Wireless Integration Printing Content Filtering Modem IT Management User Tip Processor Mobile Security VPN YouTube Meetings Customer Relationship Management Holidays Cryptocurrency Computer Repair Data Storage Smart Technology Supply Chain Hacking Virtual Desktop Video Conferencing Presentation Data storage LiFi Managed Services Provider Virtual Machines Professional Services Saving Time Wireless Technology Outlook Managed IT Service Machine Learning Money Humor Downloads iPhone Word Licensing Maintenance Vulnerabilities Antivirus Sports Entertainment Data Privacy Mouse Images 101 Administration Safety Mobility Telephone System Multi-Factor Authentication Cost Management Directions Videos Assessment Electronic Health Records Permissions Workforce Travel Google Maps Cortana Wasting Time Threats Techology Trend Micro Specifications Security Cameras Workplace Strategies Application Alt Codes Microchip Internet Exlporer Software as a Service Fraud Meta Downtime Unified Threat Management Hosted Solution Username Managing Costs Amazon IBM Unified Threat Management eCommerce Black Friday SSID Typing Network Congestion Database Surveillance Virtual Assistant Outsource IT Google Drive User Error Media Knowledge IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Proxy Server Reviews Point of Sale 5G Tactics Development Hotspot Transportation Small Businesses Competition Google Docs Unified Communications Experience Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Bitcoin Network Management Running Cable Tech Support Shopping Monitors Addiction Language Employer/Employee Relationships Outsourcing Google Wallet Navigation User Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Windows 8 Laptop Websites Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Drones IP Address SharePoint Evernote Paperless Electronic Medical Records Regulations Compliance Identity Smart Tech Memes Co-managed IT Halloween Bookmark Writing Download Net Neutrality Alerts SQL Server Technology Care Lenovo Business Communications Recovery Virtual Reality Financial Data History Connectivity IT Break Fix Scams Hard Drives Hacks Server Management Scary Stories Private Cloud Browsers Smartwatch Identity Theft Fun Upload Procurement Azure Hybrid Work Domains Superfish Multi-Factor Security Tech Human Resources Deep Learning Twitter Social Network Telework Cyber security IoT Communitications Dark Web Cables Refrigeration Error CES Education Social Engineering Trends Supply Chain Management Public Speaking Lithium-ion battery Google Calendar Term Google Apps Remote Computing Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Mobile Computing Entrepreneur Data Analysis Tablet Search Gamification Flexibility Staff Value Business Intelligence Legislation Shortcuts Best Practice Alert Organization Social Networking Fileless Malware Digital Security Cameras Dark Data Smart Devices Ransmoware Undo Managed IT Buisness File Sharing IT solutions How To Content Remote Working Wearable Technology Memory Vendors Legal Motherboard Data Breach Comparison Google Play Be Proactive Business Growth Notifications Health IT

Blog Archive