Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Miscellaneous Information Artificial Intelligence Holiday Facebook Automation Training Gadgets Compliance Cloud Computing Covid-19 Remote Work Outsourced IT Server Managed Service Provider IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Business Continuity Government Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Blockchain Vendor Managed Services Apps Data Security Two-factor Authentication Mobile Office Chrome Gmail Budget WiFi Apple Tip of the week App Employer-Employee Relationship Voice over Internet Protocol Networking Mobile Device Management BYOD Physical Security Applications Password Access Control Conferencing Computing Hacker Managed IT Services How To Information Technology BDR Avoiding Downtime Marketing Office 365 HIPAA Router Augmented Reality Virtual Private Network Storage Health Bring Your Own Device 2FA Help Desk Big Data Retail Healthcare Operating System Computers Risk Management Website Analytics Office Tips Firewall Display Printer Paperless Office The Internet of Things Windows 11 Infrastructure Monitoring Social Excel Document Management Going Green Remote Workers Managed IT Service Telephone Scam Customer Service Cybercrime Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Meetings Money VPN Employees Humor Integration Modem User Tip Processor Safety Computer Repair Mobile Security Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Professional Services Customer Relationship Management Settings Maintenance Printing Downloads Wireless Antivirus iPhone Content Filtering Licensing Hacking Presentation YouTube Entertainment Vulnerabilities Data Privacy Cryptocurrency Wireless Technology Images 101 Multi-Factor Authentication Robot Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Word Outlook IT Management Trend Micro Public Speaking Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Lithium-ion battery Fraud Meta Hacks Entrepreneur Scary Stories Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID Fun Database Surveillance Virtual Assistant Outsource IT Deep Learning Undo Media Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Education Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Mobile Computing Websites Mirgation Hypervisor Displays Shopping Nanotechnology Optimization PowerPoint Search SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Application Best Practice Chatbots Navigation Buisness Management PCI DSS Lenovo Gig Economy Screen Reader IBM Legal Writing Distributed Denial of Service Workplace IT solutions Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Business Growth Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Cortana Download Net Neutrality Twitter Alerts SQL Server Technology Care Alt Codes Error History Competition Business Communications Downtime Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Hosted Solution Upload Procurement Remote Computing Azure Hybrid Work Typing Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES Tablet IoT Communitications Google Drive Dark Web Cables User Knowledge Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps 5G Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment IP Address Google Docs How To Microsoft Excel IT Maintenance Unified Communications Experience Running Cable Gamification Flexibility Notifications Staff Value Business Intelligence Bitcoin Travel Social Networking Google Wallet Legislation Shortcuts Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Recovery Laptop Content Remote Working Wearable Technology Memory Vendors Hard Drives Windows 8 Unified Threat Management Motherboard Data Breach Domains Drones Comparison Google Play Be Proactive Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Halloween Wasting Time Threats Refrigeration

Blog Archive