Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Computer Google Email Workplace Tips Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Small Business Mobile Device Productivity Microsoft Backup Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Android Data Recovery Upgrade Disaster Recovery VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Gadgets Covid-19 Cloud Computing Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Tip of the week Mobile Device Management Managed Services Chrome Voice over Internet Protocol Budget Gmail WiFi Apple Networking App HIPAA Applications Computing Hacker Information Technology Avoiding Downtime Access Control Office 365 Marketing Conferencing How To BDR Router Operating System Computers Virtual Private Network Risk Management 2FA Health Help Desk Website Analytics Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Going Green Patch Management Save Money Solutions Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime Customer Service Physical Security Display Printer Windows 11 Monitoring Paperless Office Infrastructure Excel Document Management Remote Workers Firewall Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Microsoft 365 Robot Settings Customer Relationship Management Printing Wireless Content Filtering Employees Integration IT Management VPN YouTube Meetings User Tip Modem Hacking Mobile Security Cryptocurrency Processor Presentation Computer Repair Holidays Wireless Technology Data Storage Virtual Desktop LiFi Data storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Saving Time Virtual Machines Outlook Professional Services Word Machine Learning Money Humor Managed IT Service Downloads Maintenance iPhone Licensing Antivirus Sports Safety Mouse Entertainment Vulnerabilities Data Privacy Administration Images 101 Telephone System Multi-Factor Authentication Mobility Cost Management Content Remote Working IBM Wearable Technology Memory Vendors Travel Cortana Health IT Motherboard Data Breach Techology Comparison Google Play Be Proactive Google Maps Permissions Workforce Alt Codes Directions Videos Assessment Electronic Health Records Wasting Time Threats Downtime Unified Threat Management Trend Micro Unified Threat Management Specifications Security Cameras Workplace Strategies Hosted Solution Fraud Meta Typing Microchip Internet Exlporer Software as a Service Competition Username Managing Costs Amazon Network Congestion Knowledge eCommerce Google Drive User Error Black Friday SSID Virtual Assistant Outsource IT Database Surveillance IT Technicians Virtual Machine Environment User Media Point of Sale 5G Experience Proxy Server Reviews Cookies Google Docs Cyber Monday Medical IT Unified Communications Hotspot Transportation Small Businesses Bitcoin Network Management Running Cable Tech Support Tactics Development IP Address Mirgation Hypervisor Displays Google Wallet Monitors Shopping Nanotechnology Optimization PowerPoint Language Employer/Employee Relationships Outsourcing Windows 8 Laptop Websites Addiction Management PCI DSS Chatbots Recovery Drones Navigation Electronic Medical Records Gig Economy Screen Reader Hard Drives SharePoint Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Halloween Service Level Agreement Internet Service Provider Domains Writing Regulations Compliance Identity Lenovo Evernote Paperless Virtual Reality Bookmark Smart Tech Memes Refrigeration Co-managed IT Alerts SQL Server Technology Care Hacks Server Management Scary Stories Private Cloud Download Net Neutrality Public Speaking Fun Financial Data Lithium-ion battery History Superfish Business Communications Identity Theft Deep Learning Twitter Browsers Smartwatch Connectivity IT Break Fix Scams Entrepreneur Azure Hybrid Work Error Upload Procurement Social Engineering Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Education Remote Computing CES IoT Communitications Undo Dark Web Cables Mobile Computing Trends Supply Chain Management Search Customer Resource management FinTech Regulations Google Calendar Term Google Apps Tablet Best Practice Alert Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Gamification Flexibility Staff Value Business Intelligence Managed IT Buisness File Sharing Dark Data How To Organization Social Networking Application Legal Legislation Shortcuts IT solutions Ransmoware Business Growth Notifications Fileless Malware Digital Security Cameras Smart Devices

Blog Archive