Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware AI Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Automation Artificial Intelligence Facebook Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server IT Support Managed Service Provider Outsourced IT Remote Work Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Managed Services Data Security Apps Vendor Tip of the week Chrome Mobile Device Management Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR Computing Physical Security HIPAA Information Technology Applications Hacker Health 2FA Analytics Website Office Tips Help Desk Augmented Reality Retail Storage Healthcare Bring Your Own Device Big Data Operating System Router Risk Management Virtual Private Network Computers Paperless Office Infrastructure Windows 11 Monitoring Document Management Excel Firewall Managed IT Service Remote Workers Scam Data loss Telephone The Internet of Things Cooperation Free Resource Project Management Social Windows 7 Going Green Patch Management Save Money Remote Monitoring End of Support Microsoft 365 Vulnerability Vendor Management Cybercrime Solutions Customer Service Display Printer Virtual Desktop Processor Mobile Security Data storage LiFi Wireless Technology Holidays Outlook Data Storage Smart Technology Supply Chain Machine Learning Video Conferencing Money Humor Word Managed Services Provider Virtual Machines Professional Services Saving Time Maintenance Antivirus Sports Mouse Downloads iPhone Safety Administration Licensing Vulnerabilities Entertainment Data Privacy Images 101 Robot Multi-Factor Authentication Mobility Settings Telephone System Wireless Cost Management Printing Content Filtering IT Management Customer Relationship Management YouTube Meetings VPN Cryptocurrency Employees Hacking Integration Presentation Computer Repair Modem User Tip Monitors Database Surveillance Virtual Assistant Outsource IT Google Wallet Media IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Windows 8 IP Address Laptop Websites Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Drones SharePoint Electronic Medical Records Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Halloween Shopping Recovery Hard Drives Writing Addiction Language Employer/Employee Relationships Outsourcing Lenovo Navigation Domains Virtual Reality Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Hacks Server Management Scary Stories Private Cloud Gig Economy Identity Theft Refrigeration Fun Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Superfish Evernote Paperless Deep Learning Public Speaking Twitter Regulations Compliance Identity Smart Tech Memes Co-managed IT Lithium-ion battery Error Bookmark Education Social Engineering Download Net Neutrality Entrepreneur Alerts SQL Server Technology Care Business Communications Remote Computing Financial Data History Connectivity IT Break Fix Scams Mobile Computing Browsers Smartwatch Tablet Undo Search Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Best Practice Alert Social Network Telework Cyber security Dark Data IoT Communitications Dark Web Cables Managed IT Buisness File Sharing CES Legal IT solutions How To Trends Supply Chain Management Google Calendar Term Google Apps Business Growth Notifications Customer Resource management FinTech Regulations Travel Data Analysis Application Star Wars IT Assessment Microsoft Excel IT Maintenance Techology Google Maps Cortana Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Alt Codes IBM Organization Downtime Unified Threat Management Fileless Malware Digital Security Cameras Smart Devices Ransmoware Unified Threat Management Hosted Solution Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Comparison Google Play Be Proactive Typing Health IT Directions Videos Network Congestion Assessment Electronic Health Records Permissions Workforce Google Drive User Error Competition Knowledge Wasting Time Threats Trend Micro Specifications Security Cameras Workplace Strategies Point of Sale Microchip 5G Internet Exlporer Software as a Service Fraud Meta Google Docs Unified Communications Experience Username Managing Costs Amazon eCommerce Black Friday SSID Bitcoin Network Management Running Cable Tech Support User

Blog Archive