Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android AI Upgrade Disaster Recovery Data Recovery VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Facebook Miscellaneous Holiday Automation Artificial Intelligence Covid-19 Gadgets Cloud Computing Training Remote Work Compliance Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Vendor Data Security Apps Two-factor Authentication Mobile Office Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship Managed Services Voice over Internet Protocol BYOD Tip of the week Chrome HIPAA Applications How To BDR Conferencing Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Retail Storage Router Password Bring Your Own Device Managed IT Services 2FA Big Data Help Desk Operating System Healthcare Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Augmented Reality Solutions Firewall Scam Data loss Windows 11 The Internet of Things Monitoring Social Going Green Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Remote Workers Physical Security Telephone Customer Service Display Printer Cooperation Free Resource Paperless Office Project Management Infrastructure Windows 7 Microsoft 365 Document Management Maintenance Employees Antivirus Integration Sports Mouse Modem User Tip Processor Mobile Security Safety Administration Holidays Data Storage Smart Technology Supply Chain Robot Video Conferencing Managed Services Provider Virtual Machines Professional Services Settings Saving Time Wireless Printing Content Filtering IT Management Managed IT Service Customer Relationship Management VPN YouTube Meetings Downloads Cryptocurrency iPhone Hacking Licensing Presentation Computer Repair Entertainment Vulnerabilities Data Privacy Virtual Desktop LiFi Wireless Technology Data storage Images 101 Outlook Multi-Factor Authentication Mobility Telephone System Cost Management Machine Learning Money Humor Word Directions Videos Assessment Electronic Health Records Hacks Server Management Permissions Workforce Scary Stories Private Cloud Identity Theft Refrigeration Fun Superfish Wasting Time Threats Trend Micro Deep Learning Specifications Security Cameras Workplace Strategies Public Speaking Twitter Microchip Internet Exlporer Software as a Service Fraud Meta Lithium-ion battery Error Education Social Engineering Entrepreneur Username Managing Costs Amazon eCommerce Black Friday SSID Remote Computing Database Surveillance Mobile Computing Virtual Assistant Outsource IT Tablet Media Undo Search IT Technicians Virtual Machine Environment Cookies Best Practice Cyber Monday Medical IT Alert Proxy Server Reviews Dark Data Tactics Development Managed IT Hotspot Transportation Small Businesses Buisness File Sharing IT solutions How To Legal Mirgation Hypervisor Displays Nanotechnology Optimization Business Growth PowerPoint Notifications Shopping Addiction Language Employer/Employee Relationships Outsourcing Travel Application Google Maps Navigation Cortana Management PCI DSS Techology Chatbots Screen Reader Alt Codes Distributed Denial of Service Workplace IBM Gig Economy Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Downtime Unified Threat Management Hosted Solution Evernote Paperless Regulations Compliance Unified Threat Management Identity Smart Tech Memes Typing Co-managed IT Bookmark Network Congestion Download Net Neutrality Alerts SQL Server Technology Care Business Communications Competition Knowledge Financial Data Google Drive User Error History Connectivity IT Break Fix Scams Browsers Smartwatch 5G Upload Procurement Azure Hybrid Work Point of Sale Unified Communications Multi-Factor Security Tech Human Resources Experience Social Network Telework Google Docs Cyber security CES IoT Communitications Bitcoin Network Management Dark Web Cables Running Cable Tech Support User Monitors Trends Supply Chain Management Google Wallet Regulations Google Calendar Term Google Apps Customer Resource management FinTech Data Analysis Star Wars IT Assessment Windows 8 Microsoft Excel IT Maintenance IP Address Laptop Websites Gamification Flexibility Drones Staff Value Business Intelligence SharePoint Social Networking Legislation Shortcuts Electronic Medical Records Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Halloween Recovery Hard Drives Writing Content Remote Working Lenovo Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Domains Virtual Reality Health IT

Blog Archive