Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Workplace Tips Google Email Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Productivity Small Business Backup Quick Tips Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade AI Smartphones Disaster Recovery Data Recovery VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Virtualization Vendor Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App HIPAA Applications Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Conferencing Marketing How To WiFi BDR Router Operating System Risk Management Virtual Private Network 2FA Computers Help Desk Health Analytics Website Office Tips Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Managed IT Services Big Data Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Customer Service Windows 11 Display Printer Monitoring Paperless Office Infrastructure Excel Remote Workers Document Management Telephone Firewall Scam Cooperation Free Resource Data loss Project Management Windows 7 The Internet of Things Microsoft 365 Robot Employees Settings Integration Wireless Printing Content Filtering User Tip IT Management Modem Customer Relationship Management YouTube Meetings Mobile Security Processor VPN Cryptocurrency Holidays Hacking Data Storage Presentation Computer Repair Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage LiFi Managed Services Provider Wireless Technology Saving Time Virtual Machines Professional Services Outlook Machine Learning Managed IT Service Money Humor Downloads Word iPhone Licensing Maintenance Sports Vulnerabilities Entertainment Antivirus Mouse Data Privacy Images 101 Safety Administration Telephone System Multi-Factor Authentication Mobility Cost Management Travel Permissions Workforce Application Directions Videos Assessment Electronic Health Records Techology Google Maps Wasting Time Threats Cortana Alt Codes Trend Micro IBM Specifications Security Cameras Workplace Strategies Downtime Unified Threat Management Fraud Meta Microchip Internet Exlporer Software as a Service Unified Threat Management Username Hosted Solution Managing Costs Amazon Typing eCommerce Black Friday SSID Virtual Assistant Outsource IT Network Congestion Database Surveillance Google Drive User Error IT Technicians Virtual Machine Environment Competition Knowledge Media Proxy Server Reviews Cookies Cyber Monday Medical IT Point of Sale Hotspot Transportation Small Businesses 5G Tactics Development Google Docs Unified Communications Mirgation Hypervisor Displays Experience User Shopping Bitcoin Network Management Nanotechnology Optimization Running Cable Tech Support PowerPoint Language Employer/Employee Relationships Outsourcing Monitors Google Wallet Addiction Management PCI DSS Chatbots Navigation Gig Economy Windows 8 Screen Reader IP Address Laptop Websites Distributed Denial of Service Workplace Drones Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing SharePoint Regulations Compliance Identity Electronic Medical Records Evernote Paperless Halloween Co-managed IT Recovery Bookmark Smart Tech Memes Lenovo Download Net Neutrality Alerts SQL Server Technology Care Hard Drives Writing Financial Data History Domains Virtual Reality Business Communications Scary Stories Private Cloud Break Fix Scams Browsers Smartwatch Hacks Server Management Connectivity IT Superfish Upload Procurement Identity Theft Azure Hybrid Work Refrigeration Fun Social Network Telework Deep Learning Cyber security Public Speaking Twitter Multi-Factor Security Tech Human Resources Error Dark Web Cables CES IoT Communitications Lithium-ion battery Trends Supply Chain Management Education Social Engineering Entrepreneur Customer Resource management FinTech Regulations Remote Computing Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Mobile Computing Star Wars IT Assessment Gamification Flexibility Tablet Staff Value Business Intelligence Undo Search Organization Best Practice Social Networking Alert Legislation Shortcuts Buisness File Sharing Ransmoware Dark Data Fileless Malware Digital Security Cameras Managed IT Smart Devices Legal Content Remote Working IT solutions Wearable Technology Memory Vendors How To Health IT Business Growth Motherboard Data Breach Notifications Comparison Google Play Be Proactive

Blog Archive