Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Workplace Strategy Cybersecurity Microsoft Small Business Passwords Data Backup Communication Smartphone Backup Saving Money Smartphones Android VoIP Business Management Mobile Devices communications Upgrade Managed Service Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Internet of Things Productivity Automation Artificial Intelligence Facebook Current Events Gadgets Cloud Computing Covid-19 Miscellaneous AI Server Remote Work Managed Service Provider Holiday Information Outsourced IT Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Government Training Business Continuity Data Management Wi-Fi Blockchain Business Technology Bandwidth Windows 10 Virtualization Apps Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Vendor Chrome Mobile Device Management Budget Gmail Apple Networking Managed Services Voice over Internet Protocol App Computing Information Technology Hacker Access Control Avoiding Downtime Office 365 Applications Marketing IT Support Tip of the week Conferencing How To WiFi BDR Operating System Virtual Private Network Risk Management Computers HIPAA Health Router Analytics Website Office Tips Augmented Reality Retail Storage Help Desk Password Bring Your Own Device Managed IT Services Healthcare Big Data Social Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Cooperation Free Resource Vendor Management Cybercrime Project Management Windows 7 Physical Security Customer Service Display Microsoft 365 Printer Paperless Office Solutions Infrastructure Document Management Windows 11 Monitoring 2FA Firewall Scam Excel Data loss The Internet of Things Remote Workers Telephone Robot iPhone Licensing Settings Printing Entertainment Wireless Vulnerabilities Data Privacy Content Filtering IT Management Customer Relationship Management VPN YouTube Meetings Images 101 Telephone System Multi-Factor Authentication Mobility Cryptocurrency Hacking Cost Management Presentation Computer Repair Virtual Desktop Data storage LiFi Wireless Technology Employees Integration Outlook Machine Learning User Tip Modem Money Processor Mobile Security Humor Word Holidays Data Storage Maintenance Sports Smart Technology Supply Chain Antivirus Mouse Video Conferencing Managed Services Provider Safety Saving Time Virtual Machines Professional Services Administration Managed IT Service Downloads Travel Application Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Techology Google Maps Cortana Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Alt Codes IBM Downtime Unified Threat Management CES IoT Communitications Dark Web Cables Unified Threat Management Hosted Solution Trends Supply Chain Management Customer Resource management FinTech Regulations Google Calendar Term Google Apps Typing Data Analysis Network Congestion Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Google Drive User Error Competition Knowledge Gamification Flexibility Organization Social Networking Legislation Shortcuts Point of Sale Fileless Malware Digital Security Cameras 5G Smart Devices Ransmoware Wearable Technology Memory Vendors Google Docs Unified Communications Experience Content Remote Working Running Cable Tech Support User Health IT Motherboard Data Breach Comparison Google Play Be Proactive Bitcoin Network Management Google Wallet Directions Videos Monitors Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Laptop Websites Trend Micro Specifications Security Cameras Workplace Strategies Windows 8 IP Address Drones Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon SharePoint Electronic Medical Records Username Halloween Recovery eCommerce Black Friday SSID Lenovo Hard Drives Writing Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Domains Virtual Reality Scary Stories Private Cloud Proxy Server Reviews Cookies Cyber Monday Medical IT Hacks Server Management Hotspot Transportation Small Businesses Superfish Identity Theft Refrigeration Fun Tactics Development Mirgation Hypervisor Displays Deep Learning Public Speaking Twitter Error Shopping Nanotechnology Optimization PowerPoint Lithium-ion battery Language Employer/Employee Relationships Outsourcing Education Social Engineering Entrepreneur Addiction Management PCI DSS Chatbots Navigation Remote Computing Gig Economy Screen Reader Distributed Denial of Service Workplace Mobile Computing Computing Infrastructure Teamwork Hiring/Firing Tablet Undo Search Service Level Agreement Internet Service Provider Regulations Compliance Identity Evernote Paperless Best Practice Alert Buisness File Sharing Bookmark Dark Data Smart Tech Memes Co-managed IT Managed IT Alerts SQL Server Technology Care Legal IT solutions How To Download Net Neutrality Financial Data History Business Communications Business Growth Notifications

Blog Archive