Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Privacy Computer Phishing Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Saving Money Quick Tips Passwords AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Facebook Holiday Miscellaneous Automation Artificial Intelligence Covid-19 Cloud Computing Gadgets Training Compliance Remote Work Server Outsourced IT Managed Service Provider IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Business Technology Blockchain Bandwidth Data Security Vendor Apps Managed Services Two-factor Authentication Mobile Office Apple Gmail App BYOD WiFi Employer-Employee Relationship Voice over Internet Protocol Tip of the week Chrome Budget Networking Mobile Device Management BDR Applications Physical Security Computing Conferencing Information Technology Access Control Hacker Office 365 Avoiding Downtime Marketing Managed IT Services Password How To HIPAA Router Big Data Help Desk Operating System Virtual Private Network Risk Management Health Healthcare Computers Analytics Office Tips Retail Augmented Reality Website Storage 2FA Bring Your Own Device Solutions Firewall Patch Management Save Money Remote Monitoring Vulnerability End of Support Going Green The Internet of Things Vendor Management Monitoring Social Cybercrime Display Printer Paperless Office Managed IT Service Infrastructure Telephone Remote Workers Customer Service Document Management Cooperation Free Resource Project Management Windows 7 Windows 11 Scam Data loss Microsoft 365 Excel Administration Employees Robot Integration User Tip Modem Safety Mobile Security Processor IT Management Settings VPN Meetings Holidays Printing Smart Technology Wireless Data Storage Data Privacy Content Filtering YouTube Saving Time Computer Repair Video Conferencing Managed Services Provider Virtual Machines Cryptocurrency Professional Services Customer Relationship Management Downloads Virtual Desktop Machine Learning Data storage Licensing LiFi Hacking Presentation iPhone Entertainment Outlook Vulnerabilities Wireless Technology Money Maintenance Humor Antivirus Telephone System Images 101 Cost Management Multi-Factor Authentication Mobility Supply Chain Sports Word Mouse Public Speaking Specifications Workplace Videos How To Electronic Health Records Mobile Computing Internet Exlporer Lithium-ion battery Fraud Wasting Time Hiring/Firing Search Microchip Notifications Entrepreneur Travel Username Trend Micro Best Practice Security Cameras Paperless Black Friday Co-managed IT Buisness Techology Google Maps Software as a Service Database Legal Managing Costs Technology Care IT solutions Unified Threat Management IT Technicians eCommerce Business Growth Undo SSID Business Communications Cyber Monday Virtual Assistant Scams Unified Threat Management Proxy Server Cookies Surveillance Tactics Hotspot Virtual Machine Hybrid Work Cortana Reviews Network Congestion Mirgation Alt Codes Medical IT Human Resources Transportation Cables Downtime User Error Nanotechnology Development Addiction Language Hypervisor Hosted Solution Application Google Apps Point of Sale Management Shopping Chatbots Optimization Typing PowerPoint IBM Distributed Denial of Service Employer/Employee Relationships IT Maintenance Screen Reader Tech Support Service Level Agreement PCI DSS Google Drive Computing Infrastructure Business Intelligence Navigation Knowledge Network Management Shortcuts Gig Economy Monitors Identity Teamwork Ransmoware 5G Bookmark Smart Tech Internet Service Provider Websites Download Regulations Compliance Google Docs Alerts Vendors Unified Communications Evernote Experience Be Proactive Running Cable Memes Bitcoin Competition Google Wallet Break Fix SQL Server Workforce SharePoint Browsers Electronic Medical Records Connectivity Net Neutrality Upload Financial Data History Threats Workplace Strategies Laptop Lenovo Social Network Smartwatch Writing IT Windows 8 Multi-Factor Security Procurement Drones Dark Web Azure Meta User Virtual Reality IoT Private Cloud Trends Telework Cyber security Amazon Tech Server Management Halloween Superfish Identity Theft Customer Resource management CES Regulations Communitications Google Calendar Supply Chain Management IP Address Microsoft Excel Outsource IT Data Analysis Twitter Star Wars Error Gamification FinTech Staff Environment Term Media Scary Stories Social Engineering Social Networking IT Assessment Hacks Legislation Flexibility Value Small Businesses Recovery Fun Fileless Malware Remote Computing Content Organization Wearable Technology Displays Deep Learning Hard Drives Comparison Tablet Health IT Digital Security Cameras Motherboard Smart Devices Domains Assessment Remote Working Permissions Memory Outsourcing Education Directions Alert File Sharing Dark Data Data Breach Refrigeration Google Play Managed IT

Blog Archive