Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Productivity Saving Money Communication Cybersecurity Data Backup Managed Service Smartphone Android Upgrade Business Management VoIP Smartphones AI communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Automation Artificial Intelligence Facebook Information Holiday Training Miscellaneous Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Tip of the week Mobile Device Management Chrome Managed Services Voice over Internet Protocol Gmail Budget Networking Apple App Employer-Employee Relationship BYOD Computing Applications Hacker Information Technology Access Control Avoiding Downtime Marketing Office 365 Conferencing How To WiFi BDR HIPAA Router Operating System Virtual Private Network Computers Health Risk Management Website Help Desk Office Tips Analytics Retail Augmented Reality Healthcare Storage Managed IT Services Password Bring Your Own Device Big Data 2FA Customer Service Cybercrime Display Printer Paperless Office Infrastructure Monitoring Document Management Firewall Remote Workers Scam Data loss Telephone The Internet of Things Windows 11 Free Resource Cooperation Project Management Social Patch Management Windows 7 Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Excel Vendor Management Going Green Solutions Physical Security Employees Content Filtering Hacking Integration Computer Repair Presentation YouTube Modem User Tip Processor Mobile Security Cryptocurrency Wireless Technology Holidays Data Privacy Virtual Desktop Data Storage Machine Learning Smart Technology Data storage LiFi Video Conferencing Word Managed Services Provider Saving Time Virtual Machines Professional Services Outlook Maintenance Money Antivirus Managed IT Service Humor Downloads iPhone Safety Sports Licensing Mouse Entertainment Vulnerabilities Administration Robot Images 101 Supply Chain Mobility Telephone System Multi-Factor Authentication Cost Management IT Management Customer Relationship Management Settings VPN Meetings Printing Wireless Security Cameras Specifications Technology Care Hosted Solution Trend Micro Microchip Software as a Service Internet Exlporer Point of Sale Fraud Typing Business Communications Scams Username Managing Costs eCommerce Network Management SSID Tech Support Black Friday Google Drive Hybrid Work User Knowledge Surveillance Database Virtual Assistant Monitors Human Resources Cables 5G Virtual Machine IT Technicians Cookies Medical IT Websites Cyber Monday Google Docs IP Address Unified Communications Reviews Experience Proxy Server Google Apps Running Cable Development Tactics Transportation Hotspot Bitcoin Electronic Medical Records Google Wallet IT Maintenance SharePoint Hypervisor Mirgation Optimization Nanotechnology PowerPoint Business Intelligence Shopping Recovery Windows 8 Shortcuts Hard Drives Laptop Lenovo Addiction Employer/Employee Relationships Language Writing Navigation Virtual Reality Drones Ransmoware Domains PCI DSS Management Chatbots Server Management Screen Reader Private Cloud Distributed Denial of Service Vendors Gig Economy Be Proactive Refrigeration Halloween Internet Service Provider Superfish Service Level Agreement Teamwork Identity Theft Computing Infrastructure Identity Evernote Twitter Workforce Public Speaking Regulations Compliance Bookmark Memes Smart Tech Error Threats Lithium-ion battery Social Engineering Hacks Workplace Strategies Scary Stories Net Neutrality Entrepreneur Download SQL Server Alerts Remote Computing Meta Financial Data Fun History Browsers IT Connectivity Break Fix Amazon Deep Learning Smartwatch Undo Procurement Upload Azure Tablet Tech Alert Multi-Factor Security Outsource IT Education Telework Social Network Cyber security Communitications Managed IT IoT File Sharing Dark Web Environment Dark Data Media CES How To Mobile Computing Supply Chain Management Trends Regulations Term Notifications Google Calendar Small Businesses FinTech Search Customer Resource management Data Analysis IT Assessment Star Wars Travel Microsoft Excel Displays Best Practice Application Buisness Flexibility Techology Gamification Value Google Maps Staff Social Networking Legislation Legal Outsourcing IBM IT solutions Organization Fileless Malware Smart Devices Unified Threat Management Business Growth Digital Security Cameras Workplace Remote Working Unified Threat Management Content Memory Wearable Technology Motherboard Google Play Comparison Hiring/Firing Cortana Health IT Data Breach Directions Electronic Health Records Assessment Permissions Network Congestion Alt Codes Paperless Videos Co-managed IT Competition Downtime User Error Wasting Time

Blog Archive