Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Hosted Solutions Backup Collaboration Small Business Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Compliance Training Covid-19 Server IT Support Managed Service Provider Remote Work Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Blockchain Bandwidth Windows 10 Virtualization Managed Services Apps Two-factor Authentication Mobile Office Vendor Data Security Voice over Internet Protocol Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Conferencing Computing Physical Security Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing HIPAA Applications Password Managed IT Services How To BDR Operating System Healthcare Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Augmented Reality Router Retail Storage Bring Your Own Device 2FA Help Desk Big Data Going Green Patch Management Social Save Money Remote Monitoring Vulnerability Remote Workers End of Support Managed IT Service Vendor Management Cybercrime Telephone Customer Service Display Cooperation Free Resource Printer Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Firewall Scam Data loss Windows 11 Monitoring The Internet of Things Excel Saving Time Robot Virtual Machines Professional Services Settings Printing Wireless Content Filtering Downloads IT Management Customer Relationship Management VPN YouTube Meetings iPhone Licensing Cryptocurrency Entertainment Hacking Vulnerabilities Data Privacy Presentation Computer Repair Virtual Desktop Images 101 Data storage LiFi Wireless Technology Telephone System Multi-Factor Authentication Mobility Cost Management Outlook Machine Learning Money Word Humor Employees Integration Maintenance Sports User Tip Modem Antivirus Mobile Security Mouse Processor Safety Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Travel Gig Economy Application Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Techology Google Maps Cortana Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Alt Codes IBM Downtime Unified Threat Management Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Unified Threat Management Hosted Solution Download Net Neutrality Financial Data History Business Communications Typing Browsers Smartwatch Network Congestion Connectivity IT Break Fix Scams Azure Hybrid Work Google Drive User Error Competition Knowledge Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Point of Sale CES 5G IoT Communitications Dark Web Cables Google Docs Unified Communications Experience Trends Supply Chain Management Running Cable Tech Support Customer Resource management FinTech User Regulations Google Calendar Term Google Apps Bitcoin Network Management Google Wallet Data Analysis Monitors Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Gamification Flexibility Laptop Websites Organization Social Networking Legislation Shortcuts Windows 8 IP Address Drones Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors SharePoint Electronic Medical Records Content Remote Working Halloween Health IT Recovery Motherboard Data Breach Comparison Google Play Be Proactive Lenovo Directions Videos Hard Drives Writing Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Domains Virtual Reality Scary Stories Private Cloud Trend Micro Specifications Security Cameras Workplace Strategies Hacks Server Management Superfish Identity Theft Microchip Refrigeration Fun Internet Exlporer Software as a Service Fraud Meta Username Managing Costs Amazon Deep Learning Public Speaking Twitter Lithium-ion battery Error eCommerce Black Friday SSID Virtual Assistant Outsource IT Education Social Engineering Database Surveillance Entrepreneur IT Technicians Virtual Machine Environment Media Remote Computing Mobile Computing Proxy Server Reviews Cookies Cyber Monday Medical IT Hotspot Transportation Small Businesses Tablet Undo Search Tactics Development Alert Mirgation Hypervisor Displays Best Practice Managed IT Buisness File Sharing Shopping Dark Data Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Legal IT solutions How To Addiction Notifications Management PCI DSS Chatbots Navigation Business Growth

Blog Archive