Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol WiFi Apple Networking App Employer-Employee Relationship Computing HIPAA Hacker Information Technology Applications Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR Operating System Computers Physical Security Router Virtual Private Network Risk Management Website Health Office Tips 2FA Analytics Help Desk Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Customer Service Vendor Management Cybercrime Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers The Internet of Things Scam Data loss Telephone Social Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability End of Support Microsoft 365 Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Employees Cryptocurrency Wireless Technology Integration Computer Repair User Tip Modem Processor Virtual Desktop Mobile Security Data storage LiFi Holidays Word Outlook Data Storage Machine Learning Smart Technology Supply Chain Money Video Conferencing Managed Services Provider Humor Saving Time Virtual Machines Professional Services Safety Maintenance Antivirus Sports Managed IT Service Mouse Downloads iPhone Administration Licensing Entertainment Vulnerabilities Data Privacy Images 101 Robot Customer Relationship Management Settings Multi-Factor Authentication Mobility Telephone System Printing Cost Management Wireless Unified Threat Management Hosted Solution Content Remote Working Wearable Technology Memory Vendors Health IT Motherboard Data Breach Comparison Google Play Be Proactive Typing Directions Videos Assessment Electronic Health Records Network Congestion Permissions Workforce Wasting Time Threats Google Drive User Error User Knowledge Trend Micro Specifications Security Cameras Workplace Strategies Microchip Point of Sale Internet Exlporer Software as a Service 5G Fraud Meta Managing Costs Amazon IP Address Google Docs Unified Communications Username Experience Bitcoin Network Management Running Cable Tech Support eCommerce Black Friday SSID Google Wallet Database Surveillance Monitors Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Recovery Hard Drives Windows 8 Proxy Server Reviews Laptop Websites Cookies Cyber Monday Medical IT Domains Drones Tactics Development Hotspot Transportation Small Businesses Electronic Medical Records Mirgation Hypervisor Displays SharePoint Refrigeration Shopping Halloween Nanotechnology Optimization PowerPoint Public Speaking Lenovo Addiction Writing Language Employer/Employee Relationships Outsourcing Virtual Reality Chatbots Navigation Lithium-ion battery Management PCI DSS Hacks Server Management Gig Economy Entrepreneur Scary Stories Private Cloud Screen Reader Distributed Denial of Service Workplace Superfish Identity Theft Service Level Agreement Internet Service Provider Fun Computing Infrastructure Teamwork Hiring/Firing Twitter Identity Evernote Paperless Deep Learning Regulations Compliance Undo Bookmark Error Smart Tech Memes Co-managed IT Education Download Net Neutrality Social Engineering Alerts SQL Server Technology Care Remote Computing History Business Communications Financial Data Mobile Computing Browsers Smartwatch Connectivity IT Break Fix Scams Tablet Upload Procurement Search Azure Hybrid Work Alert Cyber security Multi-Factor Security Tech Human Resources Application Best Practice Social Network Telework Managed IT CES Buisness File Sharing IoT Communitications Dark Data Dark Web Cables IBM Legal IT solutions Trends Supply Chain Management How To Notifications Regulations Google Calendar Term Google Apps Business Growth Customer Resource management FinTech Data Analysis Travel Star Wars IT Assessment Microsoft Excel IT Maintenance Techology Google Maps Gamification Flexibility Cortana Staff Value Business Intelligence Social Networking Legislation Shortcuts Alt Codes Organization Competition Fileless Malware Digital Security Cameras Downtime Unified Threat Management Smart Devices Ransmoware

Blog Archive