Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Google Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Managed Service Smartphone Data Backup Android Upgrade AI Data Recovery Business Management Smartphones Disaster Recovery VoIP communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Artificial Intelligence Automation Information Covid-19 Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Spam IT Support Encryption Office Windows 10 Data Management Government Business Continuity Wi-Fi Virtualization Bandwidth Blockchain Business Technology Windows 10 Data Security Two-factor Authentication Apps Mobile Office Vendor Gmail Networking Employer-Employee Relationship BYOD Chrome Managed Services Voice over Internet Protocol Budget Apple Tip of the week Mobile Device Management App Applications Computing WiFi How To Information Technology BDR Conferencing Office 365 Hacker Avoiding Downtime Access Control Marketing HIPAA Operating System Managed IT Services Big Data Help Desk Risk Management 2FA Office Tips Analytics Augmented Reality Computers Healthcare Virtual Private Network Storage Password Bring Your Own Device Health Website Router Retail Solutions Scam Cybercrime Data loss The Internet of Things Monitoring Social Patch Management Windows 11 Save Money Remote Monitoring Vulnerability End of Support Vendor Management Excel Telephone Customer Service Physical Security Remote Workers Display Cooperation Printer Paperless Office Infrastructure Free Resource Project Management Windows 7 Document Management Microsoft 365 Going Green Firewall Settings Maintenance Antivirus Printing User Tip Modem Wireless Content Filtering Mobile Security Safety Processor Employees Integration YouTube Cryptocurrency Smart Technology Holidays Saving Time Robot Data Storage Virtual Desktop Data storage LiFi Video Conferencing Managed IT Service Supply Chain Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Outlook Downloads IT Management VPN Meetings Money Hacking Licensing Humor Presentation Entertainment iPhone Computer Repair Wireless Technology Sports Mouse Vulnerabilities Telephone System Administration Cost Management Images 101 Data Privacy Machine Learning Word Multi-Factor Authentication Mobility Twitter Videos Alt Codes Username Electronic Health Records Entrepreneur Vendors Black Friday Error Be Proactive Downtime Wasting Time Database Trend Micro Security Cameras Workforce Social Engineering Hosted Solution Remote Computing Typing Undo Software as a Service IT Technicians Threats Cyber Monday Workplace Strategies Proxy Server Cookies Managing Costs Tactics eCommerce Knowledge Hotspot SSID Tablet Google Drive Meta Alert Surveillance Mirgation Virtual Assistant Amazon Managed IT File Sharing Dark Data Nanotechnology Virtual Machine 5G Application Addiction Experience Language Medical IT Google Docs Outsource IT How To Reviews Unified Communications Environment Notifications Bitcoin Media Management Development Running Cable Chatbots Transportation Distributed Denial of Service Travel Google Wallet IBM Screen Reader Hypervisor Service Level Agreement Optimization Computing Infrastructure PowerPoint Techology Google Maps Small Businesses Shopping Displays Windows 8 Laptop Identity Employer/Employee Relationships Navigation Unified Threat Management Drones Bookmark PCI DSS Smart Tech Download Alerts Unified Threat Management Outsourcing Gig Economy Competition Internet Service Provider Halloween Teamwork Break Fix Evernote Workplace Browsers Network Congestion Regulations Compliance Connectivity Upload Memes User Error Hiring/Firing Hacks Paperless Social Network Net Neutrality Scary Stories SQL Server Multi-Factor Security Fun Dark Web Point of Sale Co-managed IT Financial Data User IoT History Deep Learning Trends IT Technology Care Smartwatch Tech Support Business Communications Customer Resource management Procurement Regulations Azure Google Calendar Network Management Microsoft Excel Tech Scams IP Address Data Analysis Monitors Telework Education Star Wars Cyber security Gamification Communitications Staff Hybrid Work CES Websites Mobile Computing Human Resources Supply Chain Management Social Networking Legislation Search Term Cables Fileless Malware FinTech Recovery Best Practice Hard Drives Content IT Assessment Wearable Technology SharePoint Electronic Medical Records Google Apps Domains Health IT Flexibility Buisness Motherboard Value Comparison Permissions Lenovo Legal IT Maintenance Directions Writing Organization IT solutions Assessment Virtual Reality Digital Security Cameras Business Growth Refrigeration Smart Devices Business Intelligence Server Management Private Cloud Shortcuts Public Speaking Remote Working Memory Specifications Internet Exlporer Data Breach Cortana Fraud Google Play Superfish Identity Theft Ransmoware Lithium-ion battery Microchip

Blog Archive