Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Google Email Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Cybersecurity Communication Data Backup Smartphone Android AI Disaster Recovery Upgrade Data Recovery Smartphones VoIP Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Artificial Intelligence Information Holiday Automation Facebook Gadgets Cloud Computing Covid-19 Training Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Blockchain Bandwidth Business Technology Windows 10 Wi-Fi Virtualization Two-factor Authentication Apps Vendor Mobile Office Data Security Employer-Employee Relationship BYOD Chrome Budget Apple Tip of the week App Mobile Device Management Gmail Managed Services Voice over Internet Protocol Networking WiFi Office 365 HIPAA Applications Hacker Access Control Avoiding Downtime Marketing Conferencing Computing How To Information Technology BDR Analytics Office Tips Augmented Reality Router Virtual Private Network Storage Computers Password Health Bring Your Own Device Website Help Desk Retail Operating System 2FA Managed IT Services Healthcare Risk Management Big Data Free Resource Social Patch Management Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Microsoft 365 Physical Security Customer Service Solutions Display Printer Paperless Office Infrastructure Monitoring Document Management Going Green Firewall Windows 11 Scam Data loss Remote Workers Telephone Cybercrime The Internet of Things Excel Cooperation Virtual Desktop Robot Data storage LiFi Images 101 Telephone System Cost Management Outlook Multi-Factor Authentication Mobility IT Management Customer Relationship Management VPN Meetings Money Humor Data Privacy Hacking Employees Presentation Computer Repair Modem User Tip Integration Sports Processor Mobile Security Mouse Wireless Technology Administration Holidays Smart Technology Machine Learning Data Storage Word Video Conferencing Saving Time Managed Services Provider Maintenance Virtual Machines Professional Services Settings Wireless Antivirus Managed IT Service Printing Content Filtering Downloads YouTube Safety Supply Chain Licensing Cryptocurrency iPhone Entertainment Vulnerabilities Star Wars Microsoft Excel Travel Supply Chain Management Application Google Wallet Data Analysis Paperless FinTech Co-managed IT Gamification Term Techology Staff Google Maps Legislation IBM Technology Care IT Assessment Windows 8 Laptop Social Networking Business Communications Value Unified Threat Management Flexibility Drones Fileless Malware Organization Scams Content Unified Threat Management Wearable Technology Comparison Digital Security Cameras Hybrid Work Smart Devices Health IT Halloween Motherboard Directions Human Resources Memory Assessment Permissions Remote Working Network Congestion Competition Cables Data Breach Google Play User Error Specifications Videos Electronic Health Records Hacks Scary Stories Microchip Google Apps Wasting Time Internet Exlporer Fun Fraud Point of Sale IT Maintenance Trend Micro Deep Learning Username Security Cameras Network Management Black Friday Tech Support Business Intelligence Software as a Service User Shortcuts Managing Costs Education Database Monitors Ransmoware eCommerce SSID IT Technicians Cookies Cyber Monday IP Address Websites Vendors Surveillance Mobile Computing Proxy Server Virtual Assistant Be Proactive Virtual Machine Tactics Search Hotspot Reviews Electronic Medical Records Workforce Best Practice Medical IT SharePoint Mirgation Buisness Nanotechnology Threats Development Recovery Transportation Writing Legal Workplace Strategies Hypervisor IT solutions Addiction Lenovo Language Hard Drives Shopping Domains Virtual Reality Meta Optimization Business Growth Management PowerPoint Chatbots Screen Reader Server Management Distributed Denial of Service Private Cloud Amazon Employer/Employee Relationships Refrigeration Service Level Agreement Navigation Cortana Superfish Computing Infrastructure Identity Theft PCI DSS Gig Economy Public Speaking Twitter Outsource IT Alt Codes Identity Downtime Smart Tech Lithium-ion battery Error Environment Internet Service Provider Bookmark Media Teamwork Social Engineering Entrepreneur Hosted Solution Download Evernote Alerts Regulations Compliance Remote Computing Small Businesses Memes Typing Connectivity Break Fix Displays Net Neutrality Browsers SQL Server Undo Google Drive History Upload Knowledge Tablet Financial Data Multi-Factor Security Smartwatch Alert Outsourcing IT Social Network IoT 5G Managed IT Dark Web File Sharing Procurement Dark Data Azure Telework How To Google Docs Workplace Cyber security Unified Communications Trends Tech Experience Google Calendar CES Notifications Hiring/Firing Communitications Bitcoin Customer Resource management Running Cable Regulations

Blog Archive