Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Email Computer Phishing Google Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Facebook Miscellaneous Artificial Intelligence Holiday Compliance Gadgets Cloud Computing Covid-19 Training Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Data Management Government Business Continuity Business Technology Windows 10 Blockchain Wi-Fi Virtualization Bandwidth Mobile Office Managed Services Data Security Vendor Two-factor Authentication Apps Apple Tip of the week App Mobile Device Management Gmail Voice over Internet Protocol Networking WiFi Employer-Employee Relationship BYOD Chrome Budget Avoiding Downtime Marketing Computing Managed IT Services How To Information Technology HIPAA BDR Applications Office 365 Physical Security Hacker Conferencing Access Control Website Retail Operating System Healthcare Risk Management Router Big Data 2FA Analytics Office Tips Augmented Reality Help Desk Virtual Private Network Storage Computers Password Health Bring Your Own Device Telephone Document Management Going Green Cooperation Firewall Scam Cybercrime Remote Workers Data loss The Internet of Things Windows 11 Patch Management Free Resource Social Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Microsoft 365 Excel Monitoring Solutions Customer Service Display Printer Paperless Office Managed IT Service Infrastructure Administration Downloads Data Privacy Holidays Machine Learning Licensing Data Storage Entertainment Word Video Conferencing Managed Services Provider Professional Services Settings Virtual Machines Maintenance Printing Antivirus Wireless Telephone System Content Filtering Cost Management YouTube Safety iPhone Cryptocurrency Vulnerabilities Virtual Desktop Robot Data storage LiFi User Tip Modem Mobile Security Images 101 Processor Supply Chain Outlook Multi-Factor Authentication Mobility IT Management Customer Relationship Management Money VPN Meetings Smart Technology Humor Hacking Computer Repair Employees Presentation Saving Time Integration Sports Mouse Wireless Technology Human Resources Virtual Assistant Download Websites Alerts IP Address Surveillance Mobile Computing Cables Virtual Machine Search Connectivity Electronic Medical Records Break Fix Reviews SharePoint Best Practice Browsers Medical IT Google Apps Recovery Transportation Buisness Upload Development Multi-Factor Security Legal IT Maintenance Hard Drives Lenovo Hypervisor IT solutions Social Network Writing IoT Virtual Reality Dark Web Shopping Business Intelligence Domains Optimization Business Growth PowerPoint Shortcuts Server Management Employer/Employee Relationships Trends Private Cloud Google Calendar PCI DSS Ransmoware Refrigeration Superfish Customer Resource management Identity Theft Navigation Cortana Regulations Star Wars Twitter Microsoft Excel Gig Economy Vendors Public Speaking Alt Codes Data Analysis Internet Service Provider Be Proactive Teamwork Downtime Gamification Error Staff Lithium-ion battery Legislation Regulations Compliance Workforce Hosted Solution Entrepreneur Evernote Social Networking Social Engineering Remote Computing Threats Memes Typing Fileless Malware Net Neutrality Workplace Strategies SQL Server Content Wearable Technology Comparison Financial Data Google Drive Meta Undo History Health IT Tablet Knowledge Motherboard Assessment Alert Permissions Smartwatch Amazon IT Directions Procurement Managed IT Azure File Sharing 5G Dark Data Specifications Telework Google Docs Outsource IT Cyber security Unified Communications Tech Experience How To Running Cable Internet Exlporer Notifications Fraud CES Environment Communitications Bitcoin Microchip Media Supply Chain Management Google Wallet Application Username Travel Black Friday FinTech Small Businesses Techology Google Maps Term Laptop Database Displays IBM IT Assessment Windows 8 Flexibility Drones Value Unified Threat Management IT Technicians Cyber Monday Organization Outsourcing Unified Threat Management Proxy Server Cookies Halloween Tactics Hotspot Digital Security Cameras Smart Devices Remote Working Workplace Memory Mirgation Network Congestion Hiring/Firing Competition User Error Data Breach Google Play Nanotechnology Scary Stories Addiction Language Videos Electronic Health Records Hacks Paperless Co-managed IT Wasting Time Management Point of Sale Fun Chatbots Distributed Denial of Service Technology Care Trend Micro Deep Learning Security Cameras Screen Reader Business Communications User Network Management Service Level Agreement Tech Support Computing Infrastructure Software as a Service Scams Managing Costs Education Identity Monitors Hybrid Work eCommerce Bookmark SSID Smart Tech

Blog Archive