Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer IT Services Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Saving Money Managed Service Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Covid-19 Gadgets Cloud Computing Training Managed Service Provider Remote Work Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Data Security Apps Vendor Two-factor Authentication Mobile Office Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Conferencing How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services 2FA Big Data Operating System Healthcare Router Risk Management Virtual Private Network Computers Health Help Desk Analytics Website Office Tips Document Management Solutions Firewall Telephone Scam Data loss Windows 11 The Internet of Things Cooperation Excel Social Going Green Patch Management Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Cybercrime Physical Security Customer Service Display Printer Free Resource Project Management Paperless Office Windows 7 Infrastructure Monitoring Microsoft 365 Money Saving Time Humor Word Employees Managed IT Service Integration Maintenance Downloads Antivirus Sports Mouse Licensing Holidays Safety Administration Entertainment Data Storage Supply Chain Video Conferencing Managed Services Provider Robot Virtual Machines Telephone System Professional Services Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN iPhone Cryptocurrency Modem Hacking User Tip Vulnerabilities Processor Data Privacy Presentation Computer Repair Mobile Security Virtual Desktop Images 101 Data storage LiFi Wireless Technology Multi-Factor Authentication Mobility Smart Technology Outlook Machine Learning Screen Reader Hard Drives Writing Distributed Denial of Service Videos Electronic Health Records Lenovo Workforce Wasting Time Threats Service Level Agreement Domains Virtual Reality Computing Infrastructure Trend Micro Hacks Server Management Security Cameras Workplace Strategies Scary Stories Private Cloud Identity Identity Theft Smart Tech Refrigeration Fun Software as a Service Superfish Bookmark Meta Managing Costs Amazon Deep Learning Download Public Speaking Twitter Alerts eCommerce SSID Lithium-ion battery Error Education Connectivity Social Engineering Break Fix Entrepreneur Surveillance Browsers Virtual Assistant Outsource IT Virtual Machine Environment Upload Media Remote Computing Multi-Factor Security Reviews Mobile Computing Social Network Medical IT Tablet IoT Undo Search Dark Web Development Transportation Small Businesses Hypervisor Displays Best Practice Trends Alert Dark Data Google Calendar Shopping Optimization Managed IT Customer Resource management PowerPoint Buisness File Sharing Regulations Employer/Employee Relationships Outsourcing IT solutions Star Wars How To Microsoft Excel Legal Data Analysis PCI DSS Business Growth Gamification Navigation Notifications Staff Application Legislation Gig Economy Workplace Travel Social Networking Techology Fileless Malware Teamwork Hiring/Firing Google Maps Cortana Internet Service Provider Regulations Compliance Alt Codes Content Evernote Paperless IBM Wearable Technology Downtime Unified Threat Management Motherboard Comparison Memes Health IT Co-managed IT Unified Threat Management Directions SQL Server Technology Care Hosted Solution Assessment Permissions Net Neutrality Financial Data History Typing Business Communications Network Congestion Specifications Smartwatch IT Scams Google Drive User Error Microchip Azure Hybrid Work Internet Exlporer Competition Knowledge Fraud Procurement Telework Cyber security Username Tech Human Resources Point of Sale 5G Black Friday CES Communitications Cables Google Docs Unified Communications Database Experience Supply Chain Management FinTech Bitcoin Network Management Term Google Apps Running Cable Tech Support IT Technicians User Cookies Monitors Cyber Monday IT Assessment Google Wallet Proxy Server IT Maintenance Value Business Intelligence Tactics Hotspot Flexibility Organization Windows 8 Shortcuts IP Address Laptop Websites Mirgation Nanotechnology Digital Security Cameras Smart Devices Drones Ransmoware SharePoint Memory Vendors Addiction Electronic Medical Records Language Remote Working Data Breach Management Google Play Be Proactive Halloween Chatbots Recovery

Blog Archive