Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Users Small Business Ransomware Backup Mobile Device Productivity Microsoft Managed Service Quick Tips Communication Passwords Saving Money Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery AI Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Remote Work Server Managed Service Provider Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Tip of the week Chrome Managed Services Voice over Internet Protocol Mobile Device Management Budget How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Bring Your Own Device Managed IT Services Big Data Operating System Router Physical Security Virtual Private Network Risk Management Computers 2FA Health Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Password Scam Data loss Free Resource Project Management Cooperation Windows 7 The Internet of Things Microsoft 365 Going Green Patch Management Social Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Mouse Licensing Vulnerabilities Safety Data Privacy Entertainment Administration Images 101 Multi-Factor Authentication Mobility Telephone System Robot Cost Management Settings Printing Wireless Employees Content Filtering Integration IT Management Customer Relationship Management VPN YouTube Meetings Cryptocurrency User Tip Modem Hacking Processor Holidays Presentation Computer Repair Mobile Security Data Storage Virtual Desktop Supply Chain Data storage LiFi Wireless Technology Video Conferencing Managed Services Provider Smart Technology Professional Services Outlook Virtual Machines Machine Learning Money Saving Time Word Humor Managed IT Service iPhone Maintenance Antivirus Sports Downloads Browsers Telework Education Connectivity Cyber security Social Engineering Break Fix Tech Human Resources Entrepreneur Remote Computing Cables CES Upload Communitications Mobile Computing Social Network Supply Chain Management Multi-Factor Security FinTech Tablet IoT Undo Search Dark Web Term Google Apps Alert IT Maintenance Best Practice Trends IT Assessment Managed IT Customer Resource management Flexibility Buisness File Sharing Regulations Value Business Intelligence Dark Data Google Calendar Legal Data Analysis Organization IT solutions Star Wars How To Microsoft Excel Shortcuts Notifications Staff Ransmoware Digital Security Cameras Business Growth Gamification Smart Devices Remote Working Travel Social Networking Memory Vendors Application Legislation Techology Fileless Malware Google Maps Data Breach Cortana Google Play Be Proactive Wearable Technology Workforce Videos Alt Codes Content Electronic Health Records IBM Health IT Downtime Unified Threat Management Motherboard Wasting Time Threats Comparison Unified Threat Management Directions Hosted Solution Assessment Trend Micro Permissions Security Cameras Workplace Strategies Meta Typing Software as a Service Managing Costs Amazon Network Congestion Specifications Google Drive User Error Microchip Internet Exlporer eCommerce Competition Knowledge Fraud SSID Virtual Assistant Outsource IT Username Surveillance Point of Sale Virtual Machine Environment 5G Black Friday Media Google Docs Reviews Unified Communications Database Experience Medical IT Development Running Cable Tech Support IT Technicians Transportation Small Businesses User Bitcoin Network Management Google Wallet Proxy Server Cookies Hypervisor Displays Monitors Cyber Monday PowerPoint Shopping Tactics Optimization Hotspot IP Address Laptop Websites Mirgation Employer/Employee Relationships Outsourcing Windows 8 Drones PCI DSS Nanotechnology Navigation Workplace SharePoint Gig Economy Addiction Electronic Medical Records Language Internet Service Provider Halloween Chatbots Teamwork Hiring/Firing Recovery Management Lenovo Regulations Compliance Screen Reader Hard Drives Writing Distributed Denial of Service Evernote Paperless Co-managed IT Service Level Agreement Memes Domains Virtual Reality Computing Infrastructure Hacks Server Management Net Neutrality Scary Stories Private Cloud Identity SQL Server Technology Care Superfish Bookmark Financial Data Identity Theft Smart Tech History Refrigeration Fun Business Communications Twitter Alerts Scams Smartwatch Deep Learning Download IT Public Speaking Procurement Lithium-ion battery Error Azure Hybrid Work

Blog Archive