Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Workplace Tips Google Email Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Managed Service Ransomware Users AI Productivity Mobile Device Microsoft Saving Money Quick Tips Passwords Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Training Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Outsourced IT Compliance Gadgets Remote Work Server IT Support Managed Service Provider Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Blockchain Wi-Fi Vendor Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Tip of the week Mobile Office Managed Services Data Security Employer-Employee Relationship BYOD Chrome Mobile Device Management Budget Gmail Voice over Internet Protocol Apple Networking WiFi App Computing Physical Security Information Technology HIPAA Hacker Applications Access Control Avoiding Downtime Office 365 Marketing Password Conferencing Managed IT Services How To BDR Operating System Virtual Private Network Risk Management Router Computers Health Analytics Website Office Tips Augmented Reality 2FA Help Desk Retail Storage Bring Your Own Device Healthcare Big Data Vendor Management Microsoft 365 Cybercrime Solutions Customer Service Display Printer Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Scam Remote Workers Data loss Managed IT Service Telephone The Internet of Things Cooperation Free Resource Social Going Green Patch Management Project Management Save Money Remote Monitoring Windows 7 End of Support Vulnerability Telephone System Multi-Factor Authentication Content Filtering Mobility IT Management Cost Management Customer Relationship Management YouTube Meetings VPN Cryptocurrency Hacking Employees Presentation Computer Repair Integration Virtual Desktop Data storage User Tip LiFi Modem Wireless Technology Mobile Security Processor Outlook Holidays Machine Learning Money Data Storage Humor Smart Technology Supply Chain Word Video Conferencing Managed Services Provider Saving Time Maintenance Virtual Machines Professional Services Sports Antivirus Mouse Safety Administration Downloads iPhone Licensing Entertainment Vulnerabilities Data Privacy Robot Images 101 Settings Wireless Printing Unified Threat Management Organization Hosted Solution Social Networking Legislation Shortcuts Ransmoware Fileless Malware Digital Security Cameras Typing Smart Devices Content Remote Working Wearable Technology Memory Vendors Network Congestion Google Drive User Error Health IT Motherboard Data Breach Competition Knowledge Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records Point of Sale Wasting Time Threats 5G Google Docs Unified Communications Trend Micro Experience Specifications Security Cameras Workplace Strategies Running Cable Tech Support Fraud Meta User Microchip Bitcoin Network Management Internet Exlporer Software as a Service Google Wallet Username Managing Costs Amazon Monitors eCommerce Black Friday SSID Laptop Websites Virtual Assistant Outsource IT Windows 8 Database Surveillance IP Address Drones IT Technicians Virtual Machine Environment Media SharePoint Proxy Server Reviews Cookies Electronic Medical Records Cyber Monday Medical IT Halloween Hotspot Transportation Small Businesses Recovery Tactics Development Lenovo Mirgation Hypervisor Displays Hard Drives Writing Shopping Nanotechnology Optimization Domains Virtual Reality PowerPoint Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Hacks Server Management Addiction Superfish Management PCI DSS Identity Theft Chatbots Refrigeration Fun Navigation Gig Economy Deep Learning Screen Reader Public Speaking Twitter Distributed Denial of Service Workplace Error Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Lithium-ion battery Regulations Compliance Education Identity Social Engineering Evernote Paperless Entrepreneur Bookmark Smart Tech Memes Remote Computing Co-managed IT Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Financial Data Tablet History Undo Search Business Communications Browsers Smartwatch Best Practice Connectivity IT Alert Break Fix Scams Buisness File Sharing Azure Hybrid Work Dark Data Managed IT Upload Procurement Legal Social Network Telework IT solutions Cyber security How To Multi-Factor Security Tech Human Resources CES Business Growth IoT Communitications Notifications Dark Web Cables Travel Application Trends Supply Chain Management Techology Customer Resource management FinTech Google Maps Regulations Cortana Google Calendar Term Google Apps Data Analysis Alt Codes Star Wars IT Assessment IBM Microsoft Excel IT Maintenance Gamification Flexibility Downtime Unified Threat Management Staff Value Business Intelligence

Blog Archive