Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Email Google Phishing Workplace Tips Computer Collaboration Users IT Services Hosted Solutions Mobile Device Ransomware Quick Tips Microsoft Cybersecurity Small Business Workplace Strategy Data Backup Communication Passwords Smartphone Saving Money Android Backup Business Management Smartphones VoIP communications Mobile Devices Managed Service Upgrade Disaster Recovery Data Recovery Managed IT Services Browser Social Media Microsoft Office Windows Tech Term Network Remote Internet of Things Automation Artificial Intelligence Facebook Current Events Cloud Computing Covid-19 Productivity Server Remote Work Managed Service Provider Miscellaneous Gadgets Information Holiday Outsourced IT AI Employee/Employer Relationship Spam Encryption Windows 10 Government Office Training Data Management Business Continuity Compliance Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Mobile Office Two-factor Authentication Apps Data Security Vendor Mobile Device Management Gmail Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Employer-Employee Relationship App Hacker BYOD Computing Avoiding Downtime Applications Marketing Information Technology Access Control Office 365 Tip of the week Conferencing WiFi How To BDR Computers Operating System HIPAA Router Website Virtual Private Network Risk Management Health Help Desk Analytics Office Tips IT Support Augmented Reality Retail Storage Healthcare Big Data Password Bring Your Own Device Managed IT Services 2FA Remote Monitoring End of Support Vulnerability Vendor Management Solutions Excel Cybercrime Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management The Internet of Things Remote Workers Telephone Social Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Windows 11 Going Green Patch Management Save Money Microsoft 365 Presentation Settings Wireless Supply Chain Printing Content Filtering Wireless Technology IT Management VPN Employees YouTube Meetings Physical Security Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Word Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Data Privacy Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Safety Money Saving Time Humor Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Customer Relationship Management Images 101 Robot Mobility Telephone System Multi-Factor Authentication Hacking Cost Management Displays Alt Codes Content Remote Working Wearable Technology Memory Comparison Google Play Health IT User Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Outsourcing Unified Threat Management Directions Videos Typing Wasting Time Network Congestion Specifications Security Cameras IP Address Workplace Trend Micro Internet Exlporer Software as a Service Knowledge Fraud Hiring/Firing Google Drive User Error Microchip Paperless Username Managing Costs 5G Black Friday SSID Co-managed IT Recovery Point of Sale eCommerce Hard Drives Unified Communications Database Surveillance Experience Virtual Assistant Technology Care Google Docs Domains Business Communications Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Scams Google Wallet Proxy Server Reviews Cookies Refrigeration Tactics Development Hotspot Transportation Hybrid Work Public Speaking Human Resources Windows 8 Laptop Websites Mirgation Hypervisor PowerPoint Lithium-ion battery Cables Drones Shopping Nanotechnology Optimization SharePoint Addiction Entrepreneur Electronic Medical Records Language Employer/Employee Relationships Google Apps Management PCI DSS Halloween Chatbots Navigation Screen Reader Writing Distributed Denial of Service IT Maintenance Lenovo Gig Economy Business Intelligence Undo Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Evernote Shortcuts Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Fun Ransmoware Superfish Bookmark Vendors Deep Learning Download Net Neutrality Twitter Alerts SQL Server Be Proactive Financial Data Error History Application Education Connectivity IT Social Engineering Break Fix Workforce Browsers Smartwatch Threats Upload Procurement Remote Computing Azure Multi-Factor Security Tech IBM Workplace Strategies Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Search Dark Web Meta CES Amazon Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel Outsource IT Legal Data Analysis Environment Competition Media Business Growth Gamification Flexibility Notifications Staff Value Legislation Organization Travel Social Networking Google Maps Smart Devices Cortana Small Businesses Techology Fileless Malware Digital Security Cameras

Blog Archive