Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Android Business Management Smartphones VoIP Upgrade Managed Service communications Mobile Devices Disaster Recovery Data Recovery Browser Managed IT Services Social Media Microsoft Office Windows Network Remote Tech Term Internet of Things Current Events Automation Facebook Artificial Intelligence Productivity Covid-19 Gadgets Cloud Computing AI Managed Service Provider Remote Work Miscellaneous Server Information Outsourced IT Holiday Encryption Employee/Employer Relationship Spam Windows 10 Compliance Office Data Management Government Business Continuity Training Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Blockchain Mobile Office Two-factor Authentication Data Security Apps App Mobile Device Management Vendor Gmail Networking Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome BYOD Budget Apple Marketing Tip of the week Applications Computing Information Technology WiFi How To BDR Office 365 Conferencing IT Support Hacker Avoiding Downtime Access Control Website HIPAA Router Operating System Retail Risk Management Managed IT Services Help Desk Big Data Analytics Office Tips Augmented Reality Healthcare Storage Password Computers Bring Your Own Device Virtual Private Network Health Solutions Going Green Document Management Firewall Cybercrime Windows 11 Scam Data loss The Internet of Things Monitoring 2FA Excel Social Patch Management Remote Workers Save Money Remote Monitoring Telephone Vulnerability End of Support Vendor Management Customer Service Physical Security Cooperation Free Resource Project Management Display Windows 7 Printer Paperless Office Infrastructure Microsoft 365 Word Machine Learning Employees Settings Wireless Integration Printing Content Filtering User Tip Modem YouTube Maintenance Mobile Security Processor Antivirus Holidays Safety Cryptocurrency Data Storage Supply Chain Smart Technology Virtual Desktop Video Conferencing Managed Services Provider Data storage LiFi Virtual Machines Saving Time Professional Services Outlook Robot Managed IT Service Money Customer Relationship Management Humor Downloads iPhone IT Management Licensing VPN Meetings Entertainment Vulnerabilities Hacking Sports Data Privacy Presentation Mouse Images 101 Computer Repair Administration Wireless Technology Multi-Factor Authentication Telephone System Mobility Cost Management Content IT solutions Wearable Technology Websites Remote Working Memory Vendors Legal Data Breach Health IT Google Play Be Proactive Recovery Business Growth Motherboard Comparison Permissions Videos Electronic Medical Records Electronic Health Records Directions Workforce Hard Drives SharePoint Assessment Cortana Wasting Time Threats Domains Writing Trend Micro Security Cameras Workplace Strategies Alt Codes Lenovo Specifications Downtime Fraud Virtual Reality Software as a Service Microchip Meta Refrigeration Internet Exlporer Managing Costs Amazon Public Speaking Username Hosted Solution Server Management Private Cloud eCommerce Lithium-ion battery SSID Typing Superfish Identity Theft Black Friday Entrepreneur Twitter Surveillance Virtual Assistant Outsource IT Database Virtual Machine Environment Google Drive Media IT Technicians Knowledge Error Reviews Social Engineering Proxy Server Medical IT Cookies Cyber Monday Hotspot 5G Remote Computing Development Transportation Small Businesses Undo Tactics Hypervisor Displays Google Docs Unified Communications Mirgation Experience Shopping Optimization PowerPoint Bitcoin Nanotechnology Running Cable Tablet Language Alert Employer/Employee Relationships Outsourcing Google Wallet Addiction Management Navigation Managed IT Chatbots File Sharing PCI DSS Dark Data Gig Economy How To Workplace Application Windows 8 Screen Reader Laptop Distributed Denial of Service Service Level Agreement Computing Infrastructure Notifications Internet Service Provider Teamwork Hiring/Firing Drones IBM Evernote Paperless Identity Travel Regulations Compliance Memes Bookmark Co-managed IT Techology Smart Tech Halloween Google Maps Download Alerts Net Neutrality SQL Server Technology Care History Business Communications Unified Threat Management Financial Data Break Fix Smartwatch IT Browsers Scams Hacks Unified Threat Management Connectivity Scary Stories Upload Fun Procurement Azure Hybrid Work Competition Cyber security Social Network Tech Human Resources Deep Learning Multi-Factor Security Telework Network Congestion Dark Web CES Communitications Cables User Error IoT Trends Education Supply Chain Management Customer Resource management Term Google Apps User Regulations Point of Sale Google Calendar FinTech Microsoft Excel IT Assessment Data Analysis IT Maintenance Mobile Computing Star Wars Gamification Network Management Staff Search Tech Support Flexibility Value Business Intelligence Monitors IP Address Shortcuts Best Practice Social Networking Legislation Organization Digital Security Cameras Smart Devices Fileless Malware Ransmoware Buisness

Blog Archive