Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Users Hosted Solutions Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade Data Recovery VoIP AI Business Management Smartphones Mobile Devices Disaster Recovery communications Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Information Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Spam IT Support Encryption Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Apps Two-factor Authentication Mobile Office Data Security Vendor Employer-Employee Relationship Tip of the week Chrome Managed Services Voice over Internet Protocol Budget Apple Networking Mobile Device Management App Gmail BYOD Access Control Office 365 Hacker Conferencing Avoiding Downtime Marketing How To BDR HIPAA WiFi Computing Applications Information Technology Health 2FA Help Desk Analytics Office Tips Augmented Reality Computers Retail Storage Healthcare Password Website Bring Your Own Device Managed IT Services Operating System Router Big Data Virtual Private Network Risk Management Windows 11 Paperless Office Infrastructure Monitoring Customer Service Excel Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Firewall Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability The Internet of Things Vendor Management Solutions Cybercrime Physical Security Social Display Printer Virtual Desktop Holidays LiFi Customer Relationship Management Data storage Data Storage Supply Chain Smart Technology Outlook Video Conferencing Machine Learning Managed Services Provider Hacking Virtual Machines Presentation Professional Services Money Saving Time Humor Wireless Technology Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Word Entertainment Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Safety Settings Wireless Printing Content Filtering IT Management Employees VPN YouTube Meetings Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Monitors Cyber Monday Medical IT Reviews Google Wallet Proxy Server Cookies Development Tactics Small Businesses Hotspot Transportation Windows 8 Displays Laptop Websites Mirgation Hypervisor Competition PowerPoint Shopping Drones Nanotechnology Optimization SharePoint Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships PCI DSS Management Halloween Chatbots Navigation Screen Reader Workplace Writing Distributed Denial of Service Gig Economy Lenovo Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork User Paperless Evernote Regulations Compliance Hacks Server Management Scary Stories Private Cloud Identity Memes Identity Theft Smart Tech Co-managed IT Fun Superfish Bookmark Net Neutrality Deep Learning Download IP Address Technology Care Twitter Alerts SQL Server Business Communications Financial Data Error History IT Education Connectivity Scams Social Engineering Break Fix Smartwatch Browsers Procurement Upload Hybrid Work Remote Computing Azure Recovery Hard Drives Human Resources Multi-Factor Security Tech Telework Mobile Computing Social Network Cyber security Communitications Tablet IoT Domains Cables Search Dark Web CES Supply Chain Management Best Practice Trends Alert Refrigeration Google Apps Dark Data Google Calendar Term FinTech Managed IT Customer Resource management Buisness File Sharing Regulations IT Assessment IT solutions Star Wars Public Speaking IT Maintenance How To Microsoft Excel Legal Data Analysis Flexibility Business Growth Gamification Lithium-ion battery Business Intelligence Notifications Staff Value Shortcuts Legislation Entrepreneur Organization Travel Social Networking Smart Devices Google Maps Ransmoware Cortana Digital Security Cameras Techology Fileless Malware Remote Working Alt Codes Content Vendors Wearable Technology Memory Undo Be Proactive Comparison Google Play Health IT Downtime Unified Threat Management Motherboard Data Breach Electronic Health Records Hosted Solution Assessment Workforce Permissions Videos Unified Threat Management Directions Typing Threats Wasting Time Workplace Strategies Network Congestion Specifications Security Cameras Trend Micro Software as a Service Internet Exlporer Meta Knowledge Fraud Google Drive User Error Microchip Username Amazon Managing Costs Application 5G Black Friday SSID Point of Sale eCommerce Surveillance Unified Communications Database IBM Outsource IT Experience Virtual Assistant Google Docs Bitcoin Network Management Environment Running Cable Tech Support IT Technicians Virtual Machine Media

Blog Archive