Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Email Workplace Tips Privacy Google Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Managed Service Ransomware Mobile Device AI Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Outsourced IT Remote Work Server Managed Service Provider IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Managed Services WiFi Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Managed IT Services How To BDR HIPAA Applications Computing Physical Security Hacker Information Technology Avoiding Downtime Marketing Access Control Conferencing Office 365 Password Bring Your Own Device Big Data Router Operating System Computers 2FA Virtual Private Network Help Desk Risk Management Website Health Office Tips Analytics Healthcare Augmented Reality Retail Storage Windows 7 The Internet of Things Scam Data loss Microsoft 365 Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Windows 11 Monitoring Display Printer Excel Paperless Office Infrastructure Managed IT Service Remote Workers Telephone Firewall Document Management Cooperation Free Resource Project Management Mouse Images 101 Telephone System Multi-Factor Authentication Mobility Administration Cost Management Employees Robot Integration Customer Relationship Management Settings Printing User Tip Modem Wireless Content Filtering Mobile Security Processor Hacking IT Management Presentation VPN YouTube Meetings Holidays Cryptocurrency Data Storage Smart Technology Supply Chain Wireless Technology Video Conferencing Computer Repair Managed Services Provider Professional Services Saving Time Virtual Desktop Virtual Machines Data storage LiFi Word Outlook Machine Learning Downloads iPhone Money Licensing Humor Vulnerabilities Entertainment Maintenance Data Privacy Safety Antivirus Sports Social Engineering Microsoft Excel IT Maintenance Data Analysis Education Star Wars IT Assessment Gamification Flexibility Remote Computing Staff Value Business Intelligence Mobile Computing Organization Social Networking Legislation Shortcuts Search Ransmoware Fileless Malware Digital Security Cameras Tablet Smart Devices Application Best Practice Content Remote Working Alert Wearable Technology Memory Vendors Managed IT Health IT Buisness File Sharing Motherboard Data Breach Dark Data Comparison Google Play Be Proactive How To Permissions Workforce IBM Legal Directions Videos IT solutions Assessment Electronic Health Records Business Growth Notifications Wasting Time Threats Travel Trend Micro Specifications Security Cameras Workplace Strategies Internet Exlporer Software as a Service Cortana Fraud Meta Techology Microchip Google Maps Alt Codes Username Managing Costs Amazon Black Friday SSID Competition Downtime Unified Threat Management eCommerce Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Hosted Solution Typing IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Proxy Server Reviews Cookies Network Congestion Tactics Development Knowledge Hotspot Transportation Small Businesses Google Drive User Error User Mirgation Hypervisor Displays PowerPoint Shopping Point of Sale Nanotechnology Optimization 5G Addiction Experience Language Employer/Employee Relationships Outsourcing IP Address Google Docs Unified Communications Bitcoin Network Management Management PCI DSS Running Cable Tech Support Chatbots Navigation Distributed Denial of Service Workplace Google Wallet Gig Economy Screen Reader Monitors Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Recovery Hard Drives Windows 8 Regulations Compliance Laptop Websites Identity Evernote Paperless Co-managed IT Domains Drones Bookmark Smart Tech Memes Download Net Neutrality Electronic Medical Records Alerts SQL Server Technology Care SharePoint Refrigeration Financial Data Halloween History Business Communications Break Fix Scams Public Speaking Lenovo Browsers Smartwatch Connectivity IT Writing Upload Procurement Virtual Reality Azure Hybrid Work Lithium-ion battery Hacks Server Management Social Network Telework Entrepreneur Scary Stories Private Cloud Cyber security Multi-Factor Security Tech Human Resources Fun Dark Web Cables Superfish CES Identity Theft IoT Communitications Deep Learning Trends Supply Chain Management Twitter Undo Customer Resource management FinTech Error Regulations Google Calendar Term Google Apps

Blog Archive