Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Email Workplace Tips Google Computer Workplace Strategy Hosted Solutions Small Business Collaboration Backup Users Managed Service Ransomware Mobile Device AI Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Automation Facebook Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Windows 10 Virtualization Bandwidth Blockchain Apps Data Security Vendor Mobile Office Two-factor Authentication Managed Services Employer-Employee Relationship Apple App BYOD Mobile Device Management Voice over Internet Protocol Tip of the week Gmail Chrome WiFi Budget Networking How To BDR HIPAA Applications Hacker Physical Security Avoiding Downtime Computing Marketing Access Control Information Technology Conferencing Office 365 Password Managed IT Services Bring Your Own Device Router Computers Operating System Virtual Private Network Help Desk Website 2FA Risk Management Health Healthcare Analytics Office Tips Retail Augmented Reality Big Data Storage Microsoft 365 Patch Management Solutions Save Money Customer Service Remote Monitoring Vulnerability End of Support Going Green Vendor Management Monitoring Display Cybercrime Windows 11 Printer Paperless Office Infrastructure Excel Managed IT Service Firewall Telephone Remote Workers Document Management Cooperation The Internet of Things Scam Free Resource Project Management Data loss Social Windows 7 Multi-Factor Authentication Mobility Mouse Administration Customer Relationship Management Robot Employees User Tip Modem Integration Hacking Presentation Processor Mobile Security IT Management VPN Meetings Settings Wireless Wireless Technology Printing Holidays Content Filtering Smart Technology Data Storage Computer Repair YouTube Saving Time Video Conferencing Cryptocurrency Supply Chain Word Managed Services Provider Virtual Machines Professional Services Virtual Desktop Data storage Machine Learning LiFi Downloads Licensing Outlook iPhone Safety Entertainment Maintenance Money Antivirus Humor Vulnerabilities Images 101 Telephone System Data Privacy Cost Management Sports Alert Wearable Technology Education IT Maintenance IBM Organization Content Digital Security Cameras Managed IT Health IT Smart Devices File Sharing Motherboard Dark Data Comparison Business Intelligence Shortcuts Directions Remote Working Assessment Mobile Computing Memory How To Permissions Data Breach Notifications Google Play Ransmoware Search Videos Electronic Health Records Travel Best Practice Specifications Vendors Be Proactive Competition Techology Microchip Google Maps Internet Exlporer Wasting Time Fraud Buisness Trend Micro IT solutions Security Cameras Workforce Username Legal Software as a Service Unified Threat Management Business Growth Black Friday Threats Workplace Strategies Unified Threat Management Database Managing Costs eCommerce IT Technicians SSID Meta Cortana User Proxy Server Surveillance Cookies Alt Codes Virtual Assistant Network Congestion Cyber Monday Amazon User Error Tactics Virtual Machine Hotspot Downtime Mirgation Hosted Solution Medical IT Outsource IT IP Address Reviews Development Point of Sale Nanotechnology Typing Transportation Environment Media Addiction Hypervisor Language Google Drive Optimization Tech Support Chatbots PowerPoint Small Businesses Knowledge Recovery Shopping Network Management Management Hard Drives Screen Reader Employer/Employee Relationships Monitors Distributed Denial of Service Displays Navigation 5G Domains PCI DSS Service Level Agreement Computing Infrastructure Google Docs Websites Identity Unified Communications Outsourcing Experience Gig Economy Refrigeration Bookmark Internet Service Provider Smart Tech Bitcoin Teamwork Running Cable Alerts Evernote Workplace Public Speaking SharePoint Regulations Compliance Download Google Wallet Electronic Medical Records Memes Hiring/Firing Lithium-ion battery Paperless Lenovo Browsers Entrepreneur Net Neutrality Connectivity Windows 8 SQL Server Writing Break Fix Laptop Co-managed IT Financial Data Upload Drones History Virtual Reality Smartwatch Server Management Social Network IT Private Cloud Multi-Factor Security Technology Care Business Communications Undo Superfish Procurement Identity Theft IoT Azure Dark Web Halloween Cyber security Twitter Tech Scams Telework Trends CES Customer Resource management Communitications Error Regulations Google Calendar Hybrid Work Human Resources Data Analysis Supply Chain Management Star Wars Hacks Social Engineering Microsoft Excel Scary Stories Remote Computing Staff Term Cables Fun FinTech Gamification IT Assessment Social Networking Deep Learning Legislation Application Google Apps Fileless Malware Flexibility Tablet Value

Blog Archive