Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Productivity Data Business Software Hackers Innovation Network Security Cloud Hardware IT Support Internet User Tips Efficiency Malware Email Phishing Privacy Computer Google Workplace Tips Collaboration IT Services Users Hosted Solutions Quick Tips Cybersecurity Mobile Device Ransomware Microsoft Data Backup Workplace Strategy Communication Small Business Android Saving Money Smartphone Business Management Smartphones VoIP communications Mobile Devices Data Recovery Passwords Backup Managed Service Managed IT Services Microsoft Office Upgrade Social Media Browser Disaster Recovery Network Tech Term Internet of Things Facebook Remote Artificial Intelligence Automation Cloud Computing Covid-19 Server Managed Service Provider Remote Work Gadgets Outsourced IT Windows Miscellaneous Encryption Information Employee/Employer Relationship Spam Holiday Windows 10 Government Data Management Business Continuity Current Events Office Compliance Wi-Fi Blockchain Windows 10 Virtualization Business Technology Productivity Mobile Office Data Security AI Two-factor Authentication Bandwidth Apps App Networking Mobile Device Management Gmail Vendor Training Chrome Budget Employer-Employee Relationship Managed Services Apple Voice over Internet Protocol Avoiding Downtime How To BDR Computing Information Technology BYOD Applications WiFi Office 365 Access Control Conferencing Hacker Managed IT Services Website Marketing Operating System Risk Management HIPAA Router Virtual Private Network Analytics Office Tips Big Data Augmented Reality Health Help Desk Storage Password Bring Your Own Device Retail Computers Healthcare Scam Data loss Going Green Cooperation Free Resource Project Management Windows 7 Cybercrime Patch Management Save Money Microsoft 365 Firewall Remote Monitoring End of Support Vulnerability Solutions Vendor Management The Internet of Things Display Printer Windows 11 IT Support Paperless Office Social 2FA Infrastructure Monitoring Excel Tip of the week Document Management Customer Service Remote Workers Telephone iPhone Licensing Wireless Technology Data Privacy Entertainment Vulnerabilities Settings Wireless Printing Images 101 Content Filtering Word YouTube Robot Telephone System Multi-Factor Authentication Mobility Cost Management Cryptocurrency IT Management Safety Virtual Desktop Employees VPN Meetings Integration Data storage LiFi User Tip Modem Mobile Security Outlook Computer Repair Processor Money Holidays Humor Supply Chain Data Storage Smart Technology Video Conferencing Sports Managed Services Provider Machine Learning Customer Relationship Management Mouse Saving Time Virtual Machines Professional Services Administration Hacking Managed IT Service Maintenance Presentation Antivirus Downloads Legal IT solutions Social Engineering Browsers Smartwatch Connectivity IT Human Resources Break Fix Cables Azure Business Growth Remote Computing Upload Procurement IP Address Social Network Telework Cyber security Multi-Factor Security Tech Tablet CES Cortana IoT Communitications Google Apps Dark Web IT Maintenance Alt Codes Alert Trends Supply Chain Management Downtime Dark Data Customer Resource management FinTech Recovery Business Intelligence Regulations Managed IT Google Calendar Term File Sharing Hosted Solution How To Data Analysis Hard Drives Star Wars IT Assessment Shortcuts Microsoft Excel Ransmoware Staff Value Typing Notifications Domains Gamification Flexibility Organization Vendors Social Networking Legislation Travel Google Drive Google Maps Fileless Malware Digital Security Cameras Refrigeration Knowledge Smart Devices Be Proactive Techology Content Remote Working Workforce Wearable Technology Memory Public Speaking Lithium-ion battery Health IT Threats 5G Motherboard Data Breach Comparison Google Play Unified Threat Management Permissions Google Docs Unified Communications Directions Videos Experience Assessment Electronic Health Records Entrepreneur Workplace Strategies Unified Threat Management Meta Wasting Time Bitcoin Running Cable Network Congestion Amazon Trend Micro Specifications Security Cameras Google Wallet User Error Fraud Physical Security Microchip Undo Internet Exlporer Software as a Service Username Outsource IT Managing Costs Windows 8 Laptop Drones Point of Sale Environment eCommerce Media Black Friday SSID Virtual Assistant Database Surveillance Halloween Small Businesses IT Technicians Virtual Machine Network Management Tech Support Monitors Proxy Server Reviews Application Displays Cookies Cyber Monday Medical IT Hotspot Transportation Tactics Development Scary Stories Outsourcing Mirgation Hypervisor Hacks Websites IBM Shopping Fun Nanotechnology Optimization PowerPoint SharePoint Language Employer/Employee Relationships Deep Learning Electronic Medical Records Addiction Workplace Management PCI DSS Hiring/Firing Chatbots Navigation Education Writing Gig Economy Screen Reader Paperless Lenovo Distributed Denial of Service Computing Infrastructure Teamwork Virtual Reality Competition Service Level Agreement Internet Service Provider Co-managed IT Regulations Compliance Technology Care Identity Server Management Evernote Mobile Computing Private Cloud Identity Theft Bookmark Search Smart Tech Memes Business Communications Superfish Scams Alerts SQL Server Best Practice Twitter Download Net Neutrality Buisness Financial Data User Hybrid Work History Error

Blog Archive