Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Cybersecurity Saving Money Communication Productivity Managed Service Data Backup Smartphone Android Upgrade Smartphones VoIP Business Management AI communications Mobile Devices Data Recovery Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Information Artificial Intelligence Facebook Automation Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Spam Employee/Employer Relationship IT Support Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Virtualization Apps Two-factor Authentication Data Security Vendor Mobile Office Employer-Employee Relationship Networking Chrome Managed Services Budget Voice over Internet Protocol BYOD Mobile Device Management Apple Gmail App Tip of the week Computing Information Technology How To Hacker Office 365 HIPAA BDR Avoiding Downtime Applications Marketing Conferencing Access Control WiFi Operating System Retail Risk Management Managed IT Services Computers Router Analytics Office Tips Augmented Reality Website Storage Healthcare Password Help Desk Bring Your Own Device Virtual Private Network Health 2FA Big Data Document Management Social Solutions Cybercrime Cooperation Scam Data loss Customer Service Patch Management Save Money Remote Monitoring Remote Workers Vulnerability End of Support Vendor Management Monitoring Physical Security Firewall Display Free Resource Printer Project Management Windows 11 Paperless Office Windows 7 Infrastructure The Internet of Things Going Green Telephone Microsoft 365 Excel Content Filtering Entertainment YouTube Employees Integration Maintenance Cryptocurrency Customer Relationship Management Antivirus Telephone System Cost Management Virtual Desktop Holidays Data storage LiFi Hacking Data Storage Data Privacy Presentation Outlook Video Conferencing Managed Services Provider Wireless Technology Virtual Machines Professional Services Robot Money Modem Humor User Tip Processor Mobile Security Sports IT Management Word Mouse VPN Meetings iPhone Smart Technology Administration Vulnerabilities Saving Time Computer Repair Safety Images 101 Managed IT Service Multi-Factor Authentication Mobility Supply Chain Downloads Settings Wireless Machine Learning Licensing Printing Writing Workplace Multi-Factor Security Hosted Solution Videos Lenovo Application Electronic Health Records Social Network Wasting Time Virtual Reality IoT Hiring/Firing Dark Web Typing IBM Server Management Trend Micro Private Cloud Trends Security Cameras Paperless Regulations Co-managed IT Google Drive Google Calendar Superfish Knowledge Software as a Service Identity Theft Customer Resource management Data Analysis Managing Costs Twitter Star Wars Technology Care Microsoft Excel 5G eCommerce Error Gamification SSID Staff Business Communications Social Engineering Social Networking Scams Google Docs Legislation Unified Communications Experience Surveillance Virtual Assistant Fileless Malware Virtual Machine Remote Computing Hybrid Work Bitcoin Running Cable Competition Reviews Content Medical IT Wearable Technology Human Resources Google Wallet Motherboard Cables Comparison Development Tablet Health IT Transportation Directions Hypervisor Alert Assessment Permissions Windows 8 Laptop Shopping Managed IT User Optimization File Sharing PowerPoint Dark Data Google Apps Drones Employer/Employee Relationships How To IT Maintenance Specifications PCI DSS Microchip Notifications Internet Exlporer Business Intelligence Navigation Fraud Halloween IP Address Gig Economy Travel Username Shortcuts Teamwork Ransmoware Black Friday Techology Internet Service Provider Google Maps Regulations Compliance Database Vendors Evernote Hacks Scary Stories Fun Recovery Memes Unified Threat Management IT Technicians Be Proactive Proxy Server SQL Server Cookies Workforce Cyber Monday Deep Learning Unified Threat Management Hard Drives Net Neutrality Domains Financial Data History Tactics Threats Hotspot Mirgation Workplace Strategies Education Smartwatch IT Network Congestion Azure Nanotechnology Meta User Error Refrigeration Procurement Public Speaking Telework Cyber security Addiction Amazon Tech Language Mobile Computing Chatbots Lithium-ion battery CES Search Communitications Point of Sale Management Entrepreneur Screen Reader Outsource IT Distributed Denial of Service Best Practice Supply Chain Management Buisness FinTech Network Management Tech Support Service Level Agreement Environment Term Computing Infrastructure Media Monitors Identity Legal IT solutions IT Assessment Bookmark Value Smart Tech Small Businesses Business Growth Undo Flexibility Organization Websites Download Displays Alerts Digital Security Cameras Cortana Smart Devices Browsers Memory Electronic Medical Records Connectivity Outsourcing Break Fix Alt Codes SharePoint Remote Working Downtime Data Breach Upload Google Play

Blog Archive