Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Data Backup AI Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Information Miscellaneous Artificial Intelligence Holiday Automation Covid-19 Gadgets Cloud Computing Training Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Wi-Fi Blockchain Virtualization Bandwidth Business Technology Windows 10 Vendor Two-factor Authentication Apps Data Security Mobile Office WiFi Networking Employer-Employee Relationship Chrome Budget BYOD Managed Services Apple Voice over Internet Protocol App Mobile Device Management Tip of the week Gmail Computing Information Technology HIPAA Applications How To Office 365 BDR Hacker Conferencing Avoiding Downtime Marketing Access Control Retail Risk Management Big Data Router Managed IT Services Analytics Office Tips Augmented Reality 2FA Help Desk Storage Computers Password Physical Security Bring Your Own Device Virtual Private Network Website Healthcare Health Operating System Microsoft 365 The Internet of Things Solutions Scam Data loss Social Windows 11 Patch Management Save Money Remote Monitoring Customer Service Monitoring End of Support Vulnerability Vendor Management Excel Remote Workers Display Printer Telephone Paperless Office Infrastructure Going Green Cooperation Free Resource Firewall Project Management Document Management Windows 7 Cybercrime Telephone System YouTube Multi-Factor Authentication Mobility Safety Cost Management Maintenance Cryptocurrency Antivirus Employees Virtual Desktop Data storage LiFi Integration User Tip Modem Outlook Processor Mobile Security Customer Relationship Management Money Robot Holidays Humor Data Storage Hacking Smart Technology Supply Chain Presentation Video Conferencing Sports Managed Services Provider IT Management Meetings Mouse Saving Time Virtual Machines Professional Services VPN Wireless Technology Administration Managed IT Service Computer Repair Downloads iPhone Licensing Word Entertainment Vulnerabilities Settings Data Privacy Printing Wireless Machine Learning Images 101 Content Filtering Organization Social Networking Legislation Shortcuts Server Management Private Cloud Identity Theft Undo Google Drive Fileless Malware Digital Security Cameras Smart Devices Knowledge Ransmoware Superfish Wearable Technology Memory Vendors Twitter Content Remote Working Health IT Motherboard Data Breach 5G Comparison Google Play Be Proactive Error Google Docs Directions Videos Social Engineering Unified Communications Assessment Electronic Health Records Experience Permissions Workforce Running Cable Wasting Time Threats Remote Computing Bitcoin Application Google Wallet Trend Micro Specifications Security Cameras Workplace Strategies Tablet Microchip Internet Exlporer Software as a Service Fraud Meta Laptop Managing Costs Amazon IBM Alert Windows 8 Username Drones Dark Data eCommerce Black Friday SSID Managed IT File Sharing How To Database Surveillance Virtual Assistant Outsource IT Halloween IT Technicians Virtual Machine Environment Media Notifications Proxy Server Reviews Cookies Cyber Monday Medical IT Travel Techology Google Maps Competition Tactics Development Hotspot Transportation Small Businesses Scary Stories Mirgation Hypervisor Displays Hacks Unified Threat Management Shopping Nanotechnology Optimization Fun PowerPoint Unified Threat Management Deep Learning Addiction Language Employer/Employee Relationships Outsourcing Chatbots Navigation User Management PCI DSS Gig Economy Network Congestion Education Screen Reader Distributed Denial of Service Workplace User Error Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Mobile Computing Regulations Compliance Identity Evernote Paperless IP Address Point of Sale Bookmark Smart Tech Memes Search Co-managed IT Alerts SQL Server Technology Care Best Practice Download Net Neutrality Financial Data Buisness History Business Communications Network Management Tech Support Recovery Hard Drives Legal Browsers Smartwatch Monitors IT solutions Connectivity IT Break Fix Scams Azure Hybrid Work Domains Business Growth Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Websites Refrigeration CES IoT Communitications Cortana Dark Web Cables SharePoint Public Speaking Electronic Medical Records Alt Codes Trends Supply Chain Management Customer Resource management FinTech Downtime Regulations Google Calendar Term Google Apps Lithium-ion battery Data Analysis Writing Entrepreneur Hosted Solution Star Wars IT Assessment Microsoft Excel IT Maintenance Lenovo Staff Value Business Intelligence Virtual Reality Typing Gamification Flexibility

Blog Archive