Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Backup Small Business Microsoft Productivity Managed Service Quick Tips Saving Money Passwords Communication Cybersecurity Smartphone Data Backup Android Upgrade Disaster Recovery Data Recovery AI VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Facebook Miscellaneous Holiday Automation Information Artificial Intelligence Cloud Computing Gadgets Training Covid-19 Remote Work Managed Service Provider Compliance Server Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Business Technology Blockchain Vendor Mobile Office Data Security Apps Two-factor Authentication Budget Mobile Device Management Apple Networking Gmail App WiFi Managed Services Voice over Internet Protocol BYOD Employer-Employee Relationship Tip of the week Chrome Marketing Applications How To BDR Conferencing Computing Information Technology Access Control Office 365 Hacker Avoiding Downtime HIPAA Router Website Retail Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Operating System Healthcare Risk Management Virtual Private Network Health Computers Analytics Office Tips Augmented Reality Scam Data loss Windows 11 Firewall Monitoring Excel Going Green Patch Management The Internet of Things Save Money Remote Monitoring End of Support Remote Workers Vulnerability Vendor Management Social Telephone Cybercrime Physical Security Display Printer Cooperation Free Resource Project Management Paperless Office Customer Service Windows 7 Infrastructure Microsoft 365 Document Management Solutions Employees Integration Maintenance User Tip Modem Antivirus Sports Word Mobile Security Processor Mouse Holidays Administration Data Storage Smart Technology Supply Chain Safety Video Conferencing Managed Services Provider Robot Saving Time Virtual Machines Professional Services Settings Wireless Printing Managed IT Service Content Filtering IT Management Downloads YouTube Meetings VPN iPhone Licensing Cryptocurrency Entertainment Customer Relationship Management Vulnerabilities Data Privacy Computer Repair Virtual Desktop Images 101 Data storage LiFi Hacking Telephone System Multi-Factor Authentication Presentation Mobility Cost Management Outlook Wireless Technology Machine Learning Money Humor Trend Micro Hacks Server Management Specifications Security Cameras Workplace Strategies Scary Stories Private Cloud Fraud Meta Identity Theft Recovery Fun Microchip Internet Exlporer Software as a Service Superfish Username Managing Costs Amazon Deep Learning Hard Drives Twitter eCommerce Domains Black Friday SSID Error Virtual Assistant Outsource IT Education Social Engineering Database Surveillance IT Technicians Virtual Machine Environment Refrigeration Media Remote Computing Proxy Server Reviews Cookies Mobile Computing Public Speaking Cyber Monday Medical IT Hotspot Transportation Small Businesses Tablet Search Tactics Development Lithium-ion battery Mirgation Hypervisor Displays Best Practice Alert Entrepreneur Dark Data Shopping Nanotechnology Optimization Managed IT PowerPoint Buisness File Sharing Language Employer/Employee Relationships Outsourcing IT solutions How To Addiction Legal Management PCI DSS Chatbots Business Growth Undo Navigation Notifications Gig Economy Screen Reader Distributed Denial of Service Workplace Travel Techology Computing Infrastructure Teamwork Hiring/Firing Google Maps Cortana Service Level Agreement Internet Service Provider Regulations Compliance Identity Alt Codes Evernote Paperless Downtime Unified Threat Management Bookmark Smart Tech Memes Co-managed IT Unified Threat Management Alerts SQL Server Technology Care Hosted Solution Application Download Net Neutrality Financial Data History Typing Business Communications Network Congestion Browsers Smartwatch Connectivity IT IBM Break Fix Scams Google Drive User Error Azure Hybrid Work Knowledge Upload Procurement Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Point of Sale 5G CES IoT Communitications Dark Web Cables Google Docs Unified Communications Experience Trends Supply Chain Management Customer Resource management FinTech Regulations Bitcoin Network Management Competition Google Calendar Term Google Apps Running Cable Tech Support Monitors Data Analysis Star Wars IT Assessment Google Wallet Microsoft Excel IT Maintenance Staff Value Business Intelligence Gamification Flexibility Organization Social Networking Windows 8 Legislation Shortcuts Laptop Websites User Fileless Malware Digital Security Cameras Smart Devices Drones Ransmoware SharePoint Wearable Technology Memory Vendors Electronic Medical Records Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Halloween Writing Directions Videos Assessment Electronic Health Records Lenovo IP Address Permissions Workforce Wasting Time Threats Virtual Reality

Blog Archive