Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Optimizing Images for the Web 101 - Resizing Your Images

Optimizing Images for the Web 101 - Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email or online. The idea was that images with the smallest file sizes were best, as they could be shared and downloaded more rapidly—without a tradeoff in terms of quality. Let’s discuss how this can be accomplished in Photoshop.

Continue reading
0 Comments

Optimizing Images for the Web 101 - Image File Formats

Optimizing Images for the Web 101 - Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a few things about image files and their sizes will help you to use these images more effectively. We’ve put together this guide to make it easier for you to put images to their proper use.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Workplace Strategy Quick Tips Small Business Cybersecurity Backup Microsoft Passwords Communication Saving Money Data Backup Smartphone Managed Service Android VoIP Business Management Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Productivity Windows Microsoft Office Managed IT Services AI Current Events Remote Network Tech Term Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Covid-19 Holiday Gadgets Server Managed Service Provider Information Remote Work Training Miscellaneous Outsourced IT Employee/Employer Relationship Encryption Spam Compliance Windows 10 Office Government Business Continuity Data Management Blockchain IT Support Bandwidth Windows 10 Business Technology Virtualization Wi-Fi Mobile Office Vendor Apps Two-factor Authentication Data Security Chrome BYOD Mobile Device Management Budget Gmail Apple App Managed Services Voice over Internet Protocol Employer-Employee Relationship Networking Avoiding Downtime Office 365 Marketing HIPAA Applications Access Control WiFi Tip of the week Conferencing Computing Information Technology How To Hacker BDR Analytics Website Office Tips Augmented Reality Router Storage Virtual Private Network Password Bring Your Own Device Health Help Desk Big Data Retail Operating System Healthcare Managed IT Services Risk Management Computers Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Physical Security Firewall Display Windows 11 Printer 2FA Paperless Office Infrastructure Monitoring The Internet of Things Excel Social Going Green Document Management Remote Workers Telephone Cybercrime Scam Data loss Customer Service Cooperation Free Resource Project Management Windows 7 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Outlook Money Humor IT Management Word VPN Employees Meetings Integration User Tip Modem Sports Computer Repair Mobile Security Processor Mouse Safety Holidays Administration Supply Chain Data Storage Smart Technology Video Conferencing Machine Learning Managed Services Provider Professional Services Saving Time Virtual Machines Settings Managed IT Service Wireless Printing Maintenance Content Filtering Antivirus Customer Relationship Management Downloads iPhone YouTube Licensing Cryptocurrency Data Privacy Hacking Vulnerabilities Entertainment Presentation Virtual Desktop Images 101 Data storage LiFi Wireless Technology Organization Windows 8 IP Address Vendors Travel Social Networking Laptop Legislation Google Maps Smart Devices Be Proactive Techology Fileless Malware Digital Security Cameras Drones Content Remote Working Workforce Wearable Technology Memory Comparison Google Play Health IT Threats Unified Threat Management Motherboard Data Breach Halloween Recovery Assessment Electronic Health Records Hard Drives Workplace Strategies Permissions Unified Threat Management Directions Videos Domains Meta Wasting Time Network Congestion Specifications Security Cameras Hacks Amazon Trend Micro Scary Stories Internet Exlporer Software as a Service Refrigeration Fraud Fun User Error Microchip Username Deep Learning Public Speaking Outsource IT Managing Costs Media Black Friday SSID Lithium-ion battery Environment Point of Sale eCommerce Database Surveillance Education Virtual Assistant Entrepreneur Network Management Small Businesses Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT Proxy Server Reviews Mobile Computing Displays Cookies Tactics Development Undo Hotspot Transportation Search Best Practice Outsourcing Websites Mirgation Hypervisor PowerPoint Shopping Nanotechnology Optimization Buisness Addiction IT solutions Workplace Electronic Medical Records Language Employer/Employee Relationships SharePoint Legal Management PCI DSS Business Growth Hiring/Firing Chatbots Navigation Paperless Writing Distributed Denial of Service Lenovo Gig Economy Screen Reader Application Service Level Agreement Internet Service Provider Co-managed IT Virtual Reality Computing Infrastructure Teamwork Cortana Server Management Regulations Compliance Alt Codes IBM Technology Care Private Cloud Identity Evernote Business Communications Superfish Bookmark Identity Theft Smart Tech Memes Downtime Download Net Neutrality Hosted Solution Scams Twitter Alerts SQL Server Financial Data Typing Hybrid Work Error History Human Resources Social Engineering Break Fix Browsers Smartwatch Connectivity IT Upload Procurement Competition Cables Remote Computing Azure Knowledge Google Drive Social Network Telework Cyber security Multi-Factor Security Tech Google Apps Dark Web 5G CES Tablet IoT Communitications Google Docs Trends Supply Chain Management Unified Communications IT Maintenance Alert Experience Managed IT Customer Resource management FinTech Bitcoin Business Intelligence File Sharing Regulations Running Cable User Dark Data Google Calendar Term Shortcuts How To Microsoft Excel Data Analysis Google Wallet Star Wars IT Assessment Gamification Flexibility Ransmoware Notifications Staff Value

Blog Archive