Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Productivity Small Business Quick Tips Passwords Managed Service Saving Money Communication Cybersecurity Data Backup Smartphone Android AI Disaster Recovery Data Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Miscellaneous Holiday Training Covid-19 Cloud Computing Gadgets Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship Tip of the week Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Managed Services Voice over Internet Protocol Access Control Office 365 Hacker Avoiding Downtime HIPAA Marketing Applications How To BDR Conferencing Computing Information Technology Health Analytics Computers Office Tips Augmented Reality Retail Storage Website Password Router Bring Your Own Device Managed IT Services 2FA Help Desk Operating System Big Data Virtual Private Network Healthcare Risk Management Printer Paperless Office Infrastructure Cooperation Free Resource Customer Service Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Data loss Firewall Windows 11 Monitoring Going Green Patch Management Save Money The Internet of Things Remote Monitoring End of Support Vulnerability Excel Vendor Management Cybercrime Social Physical Security Remote Workers Display Telephone iPhone Computer Repair Licensing Customer Relationship Management Virtual Desktop Vulnerabilities LiFi Entertainment Data storage Data Privacy Hacking Presentation Images 101 Outlook Machine Learning Telephone System Multi-Factor Authentication Money Mobility Humor Wireless Technology Cost Management Maintenance Antivirus Sports Employees Mouse Integration Word Administration User Tip Modem Mobile Security Processor Holidays Robot Data Storage Safety Smart Technology Supply Chain Settings Video Conferencing Wireless Managed Services Provider Printing Content Filtering Saving Time Virtual Machines Professional Services IT Management VPN YouTube Meetings Managed IT Service Cryptocurrency Downloads Break Fix Scams Unified Communications Experience Browsers Smartwatch Connectivity IT Google Docs Upload Procurement Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support Monitors Social Network Telework Cyber security Google Wallet Multi-Factor Security Tech Human Resources Dark Web Cables Competition CES IoT Communitications Trends Supply Chain Management Windows 8 Laptop Websites Customer Resource management FinTech Regulations Drones Google Calendar Term Google Apps Microsoft Excel IT Maintenance Electronic Medical Records Data Analysis Star Wars IT Assessment SharePoint Gamification Flexibility Staff Value Business Intelligence User Halloween Writing Organization Social Networking Lenovo Legislation Shortcuts Ransmoware Virtual Reality Fileless Malware Digital Security Cameras Smart Devices Content Remote Working Wearable Technology Memory Vendors IP Address Hacks Server Management Scary Stories Private Cloud Identity Theft Fun Health IT Motherboard Data Breach Superfish Comparison Google Play Be Proactive Permissions Workforce Deep Learning Twitter Directions Videos Assessment Electronic Health Records Wasting Time Threats Recovery Error Education Social Engineering Trend Micro Specifications Security Cameras Workplace Strategies Hard Drives Fraud Meta Domains Remote Computing Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Mobile Computing Tablet Search eCommerce Black Friday SSID Refrigeration Virtual Assistant Outsource IT Public Speaking Best Practice Alert Database Surveillance Dark Data IT Technicians Virtual Machine Environment Lithium-ion battery Managed IT Media Buisness File Sharing IT solutions Entrepreneur How To Proxy Server Reviews Cookies Legal Cyber Monday Medical IT Hotspot Transportation Small Businesses Business Growth Notifications Tactics Development Mirgation Hypervisor Displays Travel Google Maps Cortana Shopping Nanotechnology Optimization Techology PowerPoint Undo Language Employer/Employee Relationships Outsourcing Alt Codes Addiction Management PCI DSS Chatbots Navigation Downtime Unified Threat Management Hosted Solution Gig Economy Screen Reader Unified Threat Management Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Typing Service Level Agreement Internet Service Provider Network Congestion Regulations Compliance Identity Evernote Paperless Application Knowledge Bookmark Smart Tech Memes Google Drive User Error Co-managed IT Download Net Neutrality Alerts SQL Server Technology Care IBM 5G Financial Data History Business Communications Point of Sale

Blog Archive