Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email IT Services Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Quick Tips Managed Service Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Miscellaneous Information Holiday Automation Gadgets Cloud Computing Covid-19 Training Managed Service Provider Compliance Remote Work Server IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Business Technology Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Managed Services Budget Voice over Internet Protocol Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Marketing Conferencing How To BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Office Tips Analytics Website Augmented Reality Retail 2FA Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Router Virtual Private Network Risk Management Computers Health Help Desk Document Management Windows 11 Remote Workers Firewall Telephone Scam Excel Data loss Cooperation Free Resource The Internet of Things Project Management Windows 7 Going Green Patch Management Social Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Paperless Office Infrastructure Monitoring Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Word Humor Managed IT Service Maintenance Antivirus Sports Supply Chain Downloads Mouse iPhone Licensing Safety Entertainment Administration Vulnerabilities Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Data Privacy Content Filtering Customer Relationship Management IT Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Computer Repair Mobile Security Processor Presentation Virtual Desktop Holidays Data storage LiFi Wireless Technology Data Storage Smart Technology Amazon Electronic Medical Records Language Employer/Employee Relationships SharePoint Addiction Management PCI DSS Halloween Chatbots Recovery Navigation Lenovo Gig Economy Screen Reader Hard Drives Outsource IT Writing Distributed Denial of Service Environment Virtual Reality Computing Infrastructure Teamwork Media Service Level Agreement Internet Service Provider Domains Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Superfish Bookmark Identity Theft Smart Tech Memes Refrigeration Small Businesses Fun Displays Twitter Alerts SQL Server Deep Learning Download Net Neutrality Public Speaking Financial Data Lithium-ion battery Error History Browsers Smartwatch Education Connectivity IT Outsourcing Social Engineering Break Fix Entrepreneur Remote Computing Azure Upload Procurement Mobile Computing Social Network Telework Cyber security Workplace Multi-Factor Security Tech CES Tablet IoT Communitications Undo Hiring/Firing Search Dark Web Alert Paperless Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Co-managed IT Dark Data Google Calendar Term Legal Data Analysis IT solutions Star Wars IT Assessment Technology Care How To Microsoft Excel Notifications Staff Value Business Communications Business Growth Gamification Flexibility Organization Travel Social Networking Application Scams Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Hybrid Work Cortana IBM Wearable Technology Memory Human Resources Alt Codes Content Remote Working Health IT Downtime Unified Threat Management Motherboard Data Breach Cables Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Wasting Time Google Apps Typing Trend Micro IT Maintenance Network Congestion Specifications Security Cameras Google Drive User Error Microchip Internet Exlporer Software as a Service Competition Business Intelligence Knowledge Fraud Username Managing Costs Shortcuts Point of Sale eCommerce Ransmoware 5G Black Friday SSID Experience Virtual Assistant Google Docs Unified Communications Database Surveillance Vendors Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine User Be Proactive Google Wallet Proxy Server Reviews Cookies Workforce Monitors Cyber Monday Medical IT Hotspot Transportation Tactics Development Threats Windows 8 IP Address Laptop Websites Mirgation Hypervisor Workplace Strategies Drones Shopping Nanotechnology Optimization Meta PowerPoint

Blog Archive