Error
  • Error loading component: com_advancedmodules, 1

Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Managed Service Microsoft Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup AI Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Holiday Miscellaneous Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Blockchain Business Technology Bandwidth Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Vendor Mobile Office Data Security Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management App Managed Services Voice over Internet Protocol Gmail BYOD WiFi Access Control Office 365 HIPAA Applications Hacker Avoiding Downtime Marketing How To BDR Conferencing Computing Information Technology Health Analytics Office Tips Augmented Reality Router Computers Retail Storage Password Bring Your Own Device 2FA Website Managed IT Services Help Desk Healthcare Operating System Physical Security Big Data Virtual Private Network Risk Management Paperless Office Infrastructure Microsoft 365 Solutions Customer Service Document Management Windows 11 Scam Data loss Monitoring Excel Firewall Going Green Patch Management Save Money Remote Workers Remote Monitoring End of Support Vulnerability Telephone Vendor Management Cybercrime The Internet of Things Cooperation Free Resource Display Project Management Windows 7 Printer Social Mobility Telephone System Virtual Desktop Multi-Factor Authentication LiFi Cost Management Data storage Customer Relationship Management Outlook Machine Learning Money Employees Integration Hacking Humor Presentation User Tip Modem Processor Maintenance Mobile Security Wireless Technology Antivirus Sports Holidays Mouse Data Storage Smart Technology Supply Chain Administration Video Conferencing Word Managed Services Provider Virtual Machines Professional Services Saving Time Robot Managed IT Service Settings Wireless Downloads Printing Content Filtering iPhone Safety IT Management Licensing VPN YouTube Meetings Vulnerabilities Entertainment Cryptocurrency Data Privacy Computer Repair Images 101 Monitors Legislation Shortcuts IBM Google Wallet Organization Social Networking Smart Devices Ransmoware Fileless Malware Digital Security Cameras Windows 8 Content Remote Working Laptop Websites Wearable Technology Memory Vendors Comparison Google Play Be Proactive Drones Health IT Motherboard Data Breach Assessment Electronic Health Records Electronic Medical Records Permissions Workforce SharePoint Directions Videos Competition Halloween Wasting Time Threats Writing Specifications Security Cameras Workplace Strategies Lenovo Trend Micro Internet Exlporer Software as a Service Virtual Reality Fraud Meta Microchip Hacks Server Management Username Scary Stories Private Cloud Managing Costs Amazon Fun Black Friday SSID User Superfish Identity Theft eCommerce Deep Learning Database Surveillance Twitter Virtual Assistant Outsource IT Error IT Technicians Virtual Machine Environment Media Cookies Social Engineering Cyber Monday Medical IT IP Address Proxy Server Reviews Education Tactics Development Remote Computing Hotspot Transportation Small Businesses Mobile Computing Mirgation Hypervisor Displays Nanotechnology Optimization Search PowerPoint Recovery Shopping Tablet Best Practice Addiction Alert Language Employer/Employee Relationships Outsourcing Hard Drives Navigation Domains Managed IT Management PCI DSS Buisness File Sharing Chatbots Dark Data IT solutions Screen Reader How To Distributed Denial of Service Workplace Legal Gig Economy Business Growth Service Level Agreement Internet Service Provider Notifications Computing Infrastructure Teamwork Hiring/Firing Refrigeration Evernote Paperless Public Speaking Regulations Compliance Travel Identity Google Maps Smart Tech Memes Cortana Co-managed IT Lithium-ion battery Techology Bookmark Entrepreneur Alt Codes Download Net Neutrality Alerts SQL Server Technology Care Business Communications Financial Data Downtime Unified Threat Management History Hosted Solution Connectivity IT Break Fix Scams Unified Threat Management Browsers Smartwatch Typing Upload Procurement Azure Hybrid Work Undo Network Congestion Multi-Factor Security Tech Human Resources Social Network Telework Cyber security IoT Communitications Knowledge Dark Web Cables Google Drive User Error CES Trends Supply Chain Management 5G Google Calendar Term Google Apps Customer Resource management FinTech Point of Sale Regulations Unified Communications Star Wars IT Assessment Experience Microsoft Excel IT Maintenance Application Google Docs Data Analysis Bitcoin Network Management Gamification Flexibility Running Cable Tech Support Staff Value Business Intelligence

Blog Archive