Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Training Compliance Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Managed Services Data Security Apps Tip of the week Chrome Mobile Device Management Budget Voice over Internet Protocol Gmail WiFi Networking Apple App Employer-Employee Relationship BYOD Computing Physical Security Applications Information Technology Hacker Avoiding Downtime Access Control Marketing Office 365 Conferencing Managed IT Services How To BDR HIPAA Router Computers Virtual Private Network Risk Management Health Website 2FA Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Operating System Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Firewall Remote Workers Managed IT Service Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Patch Management Going Green Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cybercrime VPN Employees Meetings YouTube Integration Hacking Cryptocurrency Presentation User Tip Modem Computer Repair Mobile Security Processor Wireless Technology Holidays Virtual Desktop Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Word Saving Time Money Virtual Machines Professional Services Humor Maintenance Antivirus Sports Downloads Mouse Safety iPhone Licensing Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Customer Relationship Management Wireless Content Filtering IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Fraud Meta Knowledge User Error Microchip Google Drive Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce Black Friday SSID 5G User Virtual Assistant Outsource IT Experience Google Docs Database Surveillance Unified Communications Network Management Bitcoin Tech Support IT Technicians Virtual Machine Environment Running Cable Media Proxy Server Reviews Google Wallet Cookies IP Address Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Tactics Development Windows 8 Websites Mirgation Hypervisor Displays Laptop Recovery Shopping Drones Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hard Drives SharePoint Addiction Management PCI DSS Chatbots Halloween Domains Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Refrigeration Service Level Agreement Internet Service Provider Server Management Regulations Compliance Hacks Private Cloud Identity Scary Stories Public Speaking Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Lithium-ion battery Co-managed IT Fun Twitter Alerts SQL Server Technology Care Entrepreneur Download Net Neutrality Deep Learning Financial Data Error History Business Communications Browsers Smartwatch Connectivity IT Education Social Engineering Break Fix Scams Upload Procurement Remote Computing Azure Hybrid Work Undo Social Network Telework Mobile Computing Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Search CES Tablet IoT Communitications Trends Supply Chain Management Best Practice Alert Managed IT Customer Resource management FinTech File Sharing Regulations Buisness Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance Application Data Analysis Legal Star Wars IT Assessment IT solutions Gamification Flexibility Business Growth Notifications Staff Value Business Intelligence Organization Travel Social Networking IBM Legislation Shortcuts Ransmoware Cortana Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Content Remote Working Alt Codes Wearable Technology Memory Vendors Health IT Unified Threat Management Motherboard Data Breach Downtime Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Assessment Electronic Health Records Hosted Solution Typing Wasting Time Threats Competition

Blog Archive