Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Google Email Phishing Workplace Strategy Hosted Solutions Collaboration Users Small Business Backup Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery AI Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Miscellaneous Automation Artificial Intelligence Information Facebook Holiday Training Gadgets Cloud Computing Covid-19 Server Compliance Managed Service Provider Remote Work Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Government Data Management Business Continuity Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Data Security Vendor App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Apple Access Control Computing Conferencing Hacker Information Technology Avoiding Downtime Marketing How To Office 365 BDR HIPAA Applications 2FA Health Help Desk Operating System Computers Retail Risk Management Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Router Physical Security Bring Your Own Device Big Data Virtual Private Network Social Printer Windows 11 Paperless Office Infrastructure Going Green Monitoring Excel Customer Service Document Management Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Firewall Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions The Internet of Things Display Computer Repair Mobile Security Processor Holidays Supply Chain Data Storage Customer Relationship Management Smart Technology Settings Video Conferencing Printing Machine Learning Managed Services Provider Wireless Saving Time Virtual Machines Content Filtering Professional Services Hacking Presentation YouTube Managed IT Service Cryptocurrency Maintenance Wireless Technology Antivirus Downloads iPhone Licensing Data Privacy Virtual Desktop Data storage Entertainment LiFi Vulnerabilities Word Outlook Images 101 Money Telephone System Multi-Factor Authentication Robot Mobility Humor Cost Management Safety IT Management Sports Mouse VPN Employees Meetings Integration User Tip Administration Modem Virtual Assistant Application Best Practice Database Surveillance Small Businesses Network Management Buisness Tech Support IT Technicians Virtual Machine Displays IBM Legal Proxy Server Reviews IT solutions Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Business Growth Tactics Development Outsourcing Websites Mirgation Hypervisor Shopping Nanotechnology Optimization Cortana PowerPoint Electronic Medical Records Language Employer/Employee Relationships SharePoint Workplace Alt Codes Addiction Hiring/Firing Competition Management PCI DSS Downtime Chatbots Navigation Lenovo Gig Economy Paperless Hosted Solution Screen Reader Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Teamwork Co-managed IT Typing Service Level Agreement Internet Service Provider Technology Care Server Management Regulations Compliance Private Cloud Identity Evernote Google Drive Superfish Bookmark Business Communications User Identity Theft Smart Tech Memes Knowledge Twitter Alerts SQL Server Scams Download Net Neutrality Hybrid Work Financial Data Error History 5G IP Address Google Docs Browsers Smartwatch Human Resources Unified Communications Connectivity IT Experience Social Engineering Break Fix Running Cable Remote Computing Azure Cables Bitcoin Upload Procurement Google Wallet Social Network Telework Cyber security Multi-Factor Security Tech CES Google Apps Recovery Tablet IoT Communitications Dark Web Laptop Alert IT Maintenance Hard Drives Windows 8 Trends Supply Chain Management Business Intelligence Domains Drones Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Data Analysis Shortcuts Star Wars IT Assessment How To Microsoft Excel Gamification Flexibility Halloween Notifications Staff Value Ransmoware Refrigeration Vendors Public Speaking Organization Travel Social Networking Legislation Lithium-ion battery Techology Fileless Malware Digital Security Cameras Be Proactive Google Maps Smart Devices Content Remote Working Entrepreneur Scary Stories Wearable Technology Memory Workforce Hacks Threats Health IT Unified Threat Management Motherboard Data Breach Fun Comparison Google Play Permissions Unified Threat Management Directions Videos Workplace Strategies Deep Learning Assessment Electronic Health Records Undo Wasting Time Meta Amazon Education Trend Micro Network Congestion Specifications Security Cameras Fraud User Error Microchip Internet Exlporer Software as a Service Mobile Computing Username Managing Costs Outsource IT Environment Media Point of Sale eCommerce Search Black Friday SSID

Blog Archive