Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Workplace Strategy Users Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Upgrade Disaster Recovery Data Recovery AI Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Facebook Miscellaneous Information Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Business Technology Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Tip of the week Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing How To BDR HIPAA Computing Hacker Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services Big Data 2FA Operating System Computers Router Display Printer Paperless Office Infrastructure Monitoring Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Windows 11 Social Cooperation Free Resource Project Management Windows 7 Excel Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Customer Service Cybercrime Physical Security Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Data Privacy Processor Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Word Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Managed IT Service Safety Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Administration Vulnerabilities Entertainment Supply Chain Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Customer Relationship Management Settings Wireless Printing Content Filtering Hacking IT Management Presentation Employees VPN YouTube Meetings Integration Human Resources Username Managing Costs 5G Black Friday SSID Cables Point of Sale eCommerce Surveillance Unified Communications Database Experience Virtual Assistant IP Address Google Docs Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Monitors Cyber Monday Medical IT IT Maintenance Reviews Google Wallet Proxy Server Cookies Recovery Development Tactics Hotspot Transportation Business Intelligence Shortcuts Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Optimization Nanotechnology PowerPoint Ransmoware Domains Shopping Drones SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Vendors Navigation Be Proactive Refrigeration PCI DSS Management Halloween Chatbots Screen Reader Writing Distributed Denial of Service Workforce Public Speaking Gig Economy Lenovo Lithium-ion battery Internet Service Provider Service Level Agreement Virtual Reality Computing Infrastructure Teamwork Threats Evernote Workplace Strategies Regulations Compliance Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Memes Identity Theft Smart Tech Fun Meta Superfish Bookmark Net Neutrality Deep Learning Download Twitter Alerts SQL Server Amazon Undo Financial Data Error History IT Education Connectivity Social Engineering Break Fix Outsource IT Smartwatch Browsers Procurement Upload Remote Computing Azure Environment Media Multi-Factor Security Tech Telework Mobile Computing Social Network Cyber security Communitications Tablet IoT Search Dark Web Small Businesses CES Application Supply Chain Management Best Practice Trends Alert Displays Dark Data Google Calendar Term FinTech Managed IT Customer Resource management Buisness File Sharing Regulations IT Assessment IT solutions Star Wars How To Microsoft Excel Outsourcing IBM Legal Data Analysis Flexibility Business Growth Gamification Notifications Staff Value Legislation Workplace Organization Travel Social Networking Smart Devices Google Maps Cortana Hiring/Firing Digital Security Cameras Techology Fileless Malware Paperless Remote Working Alt Codes Content Wearable Technology Memory Comparison Google Play Co-managed IT Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Electronic Health Records Hosted Solution Assessment Permissions Technology Care Videos Unified Threat Management Directions Business Communications Typing Wasting Time Network Congestion Specifications Security Cameras Scams Trend Micro User Software as a Service Internet Exlporer Knowledge Fraud Hybrid Work Google Drive User Error Microchip

Blog Archive