Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Data Recovery Business Management VoIP AI Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Gadgets Covid-19 Cloud Computing Holiday Training Managed Service Provider Remote Work Server Compliance Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship BYOD Conferencing Office 365 WiFi How To BDR HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Router Operating System Computers 2FA Virtual Private Network Help Desk Risk Management Website Health Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Windows 11 Physical Security Monitoring Display Printer Excel Paperless Office Infrastructure Managed IT Service Word Outlook Machine Learning Downloads iPhone Money Licensing Humor Vulnerabilities Entertainment Maintenance Data Privacy Safety Antivirus Sports Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Administration Cost Management Employees Robot Integration Customer Relationship Management Settings Printing User Tip Modem Wireless Content Filtering Mobile Security Processor Hacking IT Management Presentation VPN YouTube Meetings Holidays Cryptocurrency Data Storage Smart Technology Supply Chain Wireless Technology Video Conferencing Computer Repair Managed Services Provider Professional Services Saving Time Virtual Desktop Virtual Machines LiFi Data storage Hard Drives Windows 8 Regulations Compliance Laptop Websites Identity Evernote Paperless Co-managed IT Domains Drones Bookmark Smart Tech Memes Download Net Neutrality Electronic Medical Records Alerts SQL Server Technology Care SharePoint Refrigeration Financial Data Halloween History Business Communications Writing Break Fix Scams Public Speaking Lenovo Browsers Smartwatch Connectivity IT Upload Procurement Virtual Reality Azure Hybrid Work Lithium-ion battery Hacks Server Management Social Network Telework Entrepreneur Scary Stories Private Cloud Cyber security Tech Human Resources Multi-Factor Security Fun Dark Web Cables Superfish CES Identity Theft IoT Communitications Deep Learning Trends Supply Chain Management Twitter Undo Customer Resource management FinTech Error Regulations Term Google Apps Google Calendar Social Engineering Microsoft Excel IT Maintenance Data Analysis Education Star Wars IT Assessment Gamification Flexibility Remote Computing Staff Value Business Intelligence Mobile Computing Organization Social Networking Shortcuts Legislation Search Ransmoware Fileless Malware Digital Security Cameras Tablet Smart Devices Application Best Practice Content Remote Working Alert Wearable Technology Memory Vendors Managed IT Health IT Buisness File Sharing Motherboard Data Breach Dark Data Google Play Be Proactive Comparison How To Permissions Workforce IBM Legal Directions Videos IT solutions Assessment Electronic Health Records Business Growth Notifications Wasting Time Threats Travel Trend Micro Security Cameras Workplace Strategies Specifications Internet Exlporer Software as a Service Cortana Fraud Meta Techology Microchip Google Maps Alt Codes Username Managing Costs Amazon Black Friday SSID Competition Downtime Unified Threat Management eCommerce Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Hosted Solution Typing IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Cookies Network Congestion Tactics Development Knowledge Hotspot Transportation Small Businesses Google Drive User Error User Mirgation Hypervisor Displays PowerPoint Shopping Point of Sale Nanotechnology Optimization 5G Addiction Experience Language Employer/Employee Relationships Outsourcing IP Address Google Docs Unified Communications Bitcoin Network Management Management PCI DSS Running Cable Tech Support Chatbots Navigation Distributed Denial of Service Workplace Google Wallet Gig Economy Screen Reader Monitors Recovery Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing

Blog Archive