Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Quick Tips Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Tech Term Current Events Network Remote Internet of Things Automation Artificial Intelligence Information Facebook Cloud Computing Holiday Training Covid-19 Miscellaneous Gadgets Server Managed Service Provider Remote Work Compliance Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Two-factor Authentication Mobile Office Vendor Data Security Apps Managed Services Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App Employer-Employee Relationship Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Applications WiFi How To BDR Operating System Computers Healthcare Virtual Private Network Risk Management Website Health Analytics Office Tips Augmented Reality Retail Router Storage Password Bring Your Own Device Managed IT Services Big Data 2FA Help Desk Customer Service Vendor Management Cybercrime Remote Workers Physical Security Telephone Display Printer Cooperation Free Resource Paperless Office Infrastructure Project Management Windows 7 Microsoft 365 Firewall Document Management Solutions Scam The Internet of Things Data loss Social Windows 11 Monitoring Going Green Patch Management Save Money Excel Remote Monitoring End of Support Vulnerability Content Filtering Managed IT Service IT Management Hacking VPN Presentation YouTube Meetings Downloads iPhone Cryptocurrency Licensing Wireless Technology Computer Repair Vulnerabilities Entertainment Data Privacy Virtual Desktop LiFi Data storage Images 101 Word Telephone System Multi-Factor Authentication Outlook Mobility Machine Learning Cost Management Money Humor Safety Maintenance Employees Integration Antivirus Sports Mouse User Tip Modem Mobile Security Processor Administration Holidays Data Storage Smart Technology Supply Chain Video Conferencing Robot Customer Relationship Management Managed Services Provider Professional Services Settings Saving Time Virtual Machines Wireless Printing Hosted Solution Regulations Compliance Identity Unified Threat Management Evernote Paperless Co-managed IT Typing Bookmark Smart Tech Memes Network Congestion Download Net Neutrality Alerts SQL Server Technology Care User Knowledge Financial Data History Google Drive User Error Business Communications Break Fix Scams Browsers Smartwatch Connectivity IT 5G Upload Procurement Azure Hybrid Work Point of Sale IP Address Unified Communications Experience Social Network Telework Cyber security Google Docs Multi-Factor Security Tech Human Resources Dark Web Cables Bitcoin Network Management Running Cable Tech Support CES IoT Communitications Monitors Trends Supply Chain Management Google Wallet Recovery Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Windows 8 Hard Drives Laptop Websites Data Analysis Star Wars IT Assessment Gamification Flexibility Staff Value Business Intelligence Drones Domains Electronic Medical Records Organization Social Networking SharePoint Legislation Shortcuts Ransmoware Refrigeration Halloween Fileless Malware Digital Security Cameras Smart Devices Writing Content Remote Working Wearable Technology Memory Vendors Lenovo Public Speaking Lithium-ion battery Virtual Reality Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Hacks Server Management Scary Stories Private Cloud Directions Videos Entrepreneur Assessment Electronic Health Records Fun Wasting Time Threats Superfish Identity Theft Deep Learning Twitter Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Undo Error Microchip Internet Exlporer Software as a Service Social Engineering Username Managing Costs Amazon Education Remote Computing eCommerce Black Friday SSID Virtual Assistant Outsource IT Mobile Computing Database Surveillance Search IT Technicians Virtual Machine Environment Media Tablet Best Practice Application Alert Proxy Server Reviews Cookies Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Managed IT Buisness File Sharing Dark Data How To Mirgation Hypervisor Displays Legal IBM IT solutions PowerPoint Business Growth Notifications Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Travel Google Maps Cortana Management PCI DSS Chatbots Techology Navigation Distributed Denial of Service Workplace Alt Codes Gig Economy Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Downtime Unified Threat Management

Blog Archive