Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Phishing Email Computer Workplace Tips IT Services Collaboration Users Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Small Business Cybersecurity Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Android Business Management VoIP Smartphones Mobile Devices communications Upgrade Disaster Recovery Data Recovery Browser Social Media Managed IT Services Windows Microsoft Office Remote Tech Term Current Events Network Productivity Internet of Things Automation Artificial Intelligence Facebook Covid-19 Cloud Computing Gadgets AI Remote Work Server Managed Service Provider Miscellaneous Outsourced IT Information Holiday Training Employee/Employer Relationship Compliance Encryption Spam Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Virtualization Two-factor Authentication Mobile Office IT Support Data Security Vendor Apps Mobile Device Management Chrome Managed Services Voice over Internet Protocol Networking Gmail Budget Apple BYOD App Employer-Employee Relationship Access Control Computing Hacker Tip of the week Information Technology Avoiding Downtime Conferencing Marketing Office 365 How To BDR WiFi HIPAA Applications Operating System Health Computers Help Desk Risk Management Website Retail Analytics Office Tips Augmented Reality Managed IT Services Healthcare Storage Password Bring Your Own Device Big Data Router Virtual Private Network Solutions Printer Paperless Office Customer Service Infrastructure Cybercrime Monitoring Windows 11 Document Management 2FA Excel Telephone Scam Data loss Firewall Remote Workers Cooperation Patch Management The Internet of Things Save Money Remote Monitoring Free Resource End of Support Project Management Vulnerability Vendor Management Social Windows 7 Physical Security Microsoft 365 Going Green Display Computer Repair Mobile Security Settings Processor Wireless Printing Employees Content Filtering Hacking Integration Presentation YouTube Smart Technology Cryptocurrency Machine Learning Wireless Technology Holidays Saving Time Virtual Desktop Data Storage Data storage Managed IT Service LiFi Supply Chain Maintenance Video Conferencing Word Managed Services Provider Antivirus Downloads Outlook Virtual Machines Professional Services Licensing Money Humor Entertainment Safety iPhone Sports Robot Telephone System Mouse Cost Management Vulnerabilities Data Privacy Administration Images 101 IT Management Multi-Factor Authentication Mobility VPN Meetings User Tip Modem Customer Relationship Management Database Videos Alt Codes Electronic Health Records Workforce Network Management Tech Support IT Technicians Competition Downtime Wasting Time Threats Monitors Cyber Monday Hosted Solution Trend Micro Security Cameras Workplace Strategies Proxy Server Cookies Tactics Hotspot Typing Software as a Service Meta Managing Costs Amazon Websites Mirgation User eCommerce Knowledge SSID Nanotechnology Google Drive Addiction Electronic Medical Records Language Surveillance Virtual Assistant Outsource IT SharePoint Virtual Machine Environment 5G Media Management Chatbots IP Address Google Docs Reviews Writing Distributed Denial of Service Unified Communications Experience Medical IT Lenovo Screen Reader Service Level Agreement Virtual Reality Computing Infrastructure Bitcoin Development Running Cable Transportation Small Businesses Hypervisor Displays Server Management Private Cloud Identity Google Wallet Shopping Recovery Optimization PowerPoint Superfish Bookmark Identity Theft Smart Tech Download Twitter Alerts Hard Drives Windows 8 Laptop Employer/Employee Relationships Outsourcing Navigation Error Domains Drones PCI DSS Connectivity Gig Economy Social Engineering Break Fix Workplace Browsers Upload Remote Computing Refrigeration Internet Service Provider Halloween Teamwork Hiring/Firing Multi-Factor Security Evernote Paperless Social Network Public Speaking Regulations Compliance Tablet IoT Lithium-ion battery Dark Web Memes Co-managed IT Trends Alert Hacks Net Neutrality Entrepreneur Scary Stories SQL Server Technology Care Dark Data Google Calendar History Fun Business Communications Managed IT Customer Resource management File Sharing Regulations Financial Data Star Wars Smartwatch How To Microsoft Excel Deep Learning IT Scams Data Analysis Gamification Notifications Staff Undo Procurement Azure Hybrid Work Legislation Education Cyber security Tech Human Resources Travel Social Networking Telework Google Maps CES Communitications Cables Techology Fileless Malware Content Wearable Technology Mobile Computing Supply Chain Management Comparison Search Term Google Apps Health IT Unified Threat Management Motherboard FinTech Assessment Permissions Application Best Practice IT Assessment IT Maintenance Unified Threat Management Directions Flexibility Buisness Value Business Intelligence Network Congestion Specifications IT solutions Shortcuts IBM Legal Organization Internet Exlporer Digital Security Cameras Fraud Business Growth Smart Devices Ransmoware User Error Microchip Username Remote Working Memory Vendors Black Friday Data Breach Cortana Google Play Be Proactive Point of Sale

Blog Archive