Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Email Google Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Small Business Mobile Device Backup Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Data Recovery Android Disaster Recovery Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Training Gadgets Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Encryption Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Data Security Apps Vendor Mobile Office Two-factor Authentication Employer-Employee Relationship App BYOD Mobile Device Management Tip of the week Chrome Gmail Managed Services Budget Voice over Internet Protocol WiFi Apple Networking BDR HIPAA Hacker Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 Conferencing How To 2FA Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Windows 7 Going Green Patch Management Windows 11 Save Money Microsoft 365 Remote Monitoring Customer Service Vulnerability End of Support Vendor Management Solutions Cybercrime Excel Physical Security Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers The Internet of Things Telephone Scam Data loss Social Cooperation Free Resource Project Management Images 101 Customer Relationship Management Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Hacking Supply Chain Wireless Presentation Content Filtering IT Management VPN Employees YouTube Meetings Wireless Technology Integration Cryptocurrency User Tip Modem Processor Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Word Data Storage Smart Technology Outlook Video Conferencing Data Privacy Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Safety Managed IT Service Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Entertainment Administration Vulnerabilities Legal Data Analysis IT solutions Star Wars IT Assessment Outsource IT How To Microsoft Excel Environment Notifications Staff Value Media Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Competition Small Businesses Cortana Displays Wearable Technology Memory Alt Codes Content Remote Working Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Outsourcing Permissions Wasting Time User Typing Trend Micro Workplace Network Congestion Specifications Security Cameras Google Drive User Error Microchip Internet Exlporer Software as a Service Hiring/Firing Fraud Knowledge Managing Costs Paperless Username IP Address Point of Sale eCommerce Co-managed IT Black Friday SSID 5G Google Docs Unified Communications Database Surveillance Technology Care Virtual Assistant Experience Running Cable Tech Support IT Technicians Virtual Machine Recovery Business Communications Bitcoin Network Management Google Wallet Proxy Server Reviews Cookies Hard Drives Scams Monitors Cyber Monday Medical IT Tactics Development Domains Hybrid Work Hotspot Transportation Laptop Websites Mirgation Hypervisor Human Resources Windows 8 Drones Shopping Nanotechnology Optimization Refrigeration Cables PowerPoint SharePoint Addiction Public Speaking Electronic Medical Records Language Employer/Employee Relationships Halloween Chatbots Google Apps Navigation Management PCI DSS Lithium-ion battery Lenovo Gig Economy Screen Reader IT Maintenance Writing Distributed Denial of Service Entrepreneur Service Level Agreement Internet Service Provider Business Intelligence Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Shortcuts Evernote Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Undo Ransmoware Fun Deep Learning Download Net Neutrality Vendors Twitter Alerts SQL Server Financial Data Error History Be Proactive Browsers Smartwatch Education Connectivity IT Workforce Social Engineering Break Fix Remote Computing Azure Upload Procurement Threats Mobile Computing Social Network Telework Cyber security Application Workplace Strategies Multi-Factor Security Tech CES Tablet IoT Communitications Meta Dark Web Search Alert Best Practice Trends Supply Chain Management IBM Amazon Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term

Blog Archive