Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity AI Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Holiday Miscellaneous Automation Artificial Intelligence Facebook Information Gadgets Training Cloud Computing Covid-19 Remote Work Server Compliance Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Virtualization Business Technology Wi-Fi Windows 10 Bandwidth Blockchain Vendor Apps Two-factor Authentication Mobile Office Data Security Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail Budget BYOD WiFi Applications Access Control Computing Hacker Conferencing Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA Router Big Data Physical Security Virtual Private Network Health 2FA Help Desk Operating System Computers Risk Management Retail Healthcare Website Managed IT Services Analytics Office Tips Augmented Reality Storage Password Bring Your Own Device Social Display Printer Paperless Office Windows 11 Going Green Infrastructure Monitoring Customer Service Excel Cybercrime Document Management Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Firewall Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support The Internet of Things Vendor Management Solutions VPN Employees Meetings Administration Integration User Tip Modem Processor Computer Repair Mobile Security Holidays Customer Relationship Management Settings Data Storage Wireless Smart Technology Supply Chain Printing Content Filtering Video Conferencing Machine Learning Managed Services Provider Hacking YouTube Saving Time Virtual Machines Professional Services Presentation Cryptocurrency Managed IT Service Wireless Technology Maintenance Downloads Antivirus Virtual Desktop iPhone Data storage LiFi Licensing Word Entertainment Vulnerabilities Outlook Data Privacy Money Images 101 Humor Telephone System Multi-Factor Authentication Robot Mobility Cost Management Safety Sports Mouse IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Mobile Computing User Error Microchip Search Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Application Best Practice Username Buisness Point of Sale eCommerce Black Friday SSID IBM Legal IT solutions Database Surveillance Virtual Assistant Outsource IT Tech Support IT Technicians Virtual Machine Environment Media Business Growth Network Management Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Cortana Tactics Development Hotspot Transportation Small Businesses Websites Mirgation Hypervisor Displays Alt Codes Downtime Shopping Nanotechnology Optimization PowerPoint Competition Hosted Solution SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Chatbots Navigation Typing Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Google Drive User Knowledge Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Server Management Regulations Compliance Superfish Bookmark 5G Identity Theft Smart Tech Memes Co-managed IT IP Address Google Docs Unified Communications Experience Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Bitcoin Running Cable Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Google Wallet Recovery Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Hard Drives Windows 8 Laptop Social Network Telework CES Tablet IoT Communitications Dark Web Cables Domains Drones Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech File Sharing Regulations Dark Data Google Calendar Term Google Apps Refrigeration Halloween Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Public Speaking Notifications Staff Value Business Intelligence Lithium-ion battery Gamification Flexibility Scary Stories Organization Travel Social Networking Legislation Shortcuts Hacks Entrepreneur Techology Fileless Malware Digital Security Cameras Fun Google Maps Smart Devices Ransmoware Wearable Technology Memory Vendors Deep Learning Content Remote Working Health IT Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Undo Education Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats

Blog Archive