Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Workplace Tips Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Users Backup Small Business Ransomware Mobile Device Productivity Microsoft Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone AI Disaster Recovery Data Recovery Android Upgrade VoIP Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Holiday Automation Artificial Intelligence Information Facebook Miscellaneous Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Business Continuity Data Management Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Vendor Data Security Managed Services Employer-Employee Relationship Voice over Internet Protocol BYOD Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Conferencing Computing Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications How To BDR Operating System Healthcare Physical Security Computers Risk Management Virtual Private Network Health Website Analytics Office Tips Augmented Reality Router Retail Storage Password Bring Your Own Device Managed IT Services 2FA Help Desk Big Data Going Green Patch Management Save Money Remote Monitoring Remote Workers End of Support Vulnerability Vendor Management Telephone Cybercrime Customer Service Display Printer Cooperation Free Resource Project Management Paperless Office Windows 7 Infrastructure Microsoft 365 Document Management Solutions Firewall Scam Data loss Windows 11 The Internet of Things Monitoring Social Excel Saving Time Virtual Machines Robot Professional Services Settings Wireless Managed IT Service Customer Relationship Management Printing Content Filtering Downloads IT Management YouTube Meetings iPhone VPN Hacking Licensing Presentation Cryptocurrency Entertainment Vulnerabilities Computer Repair Data Privacy Wireless Technology Images 101 Virtual Desktop Data storage LiFi Multi-Factor Authentication Mobility Telephone System Cost Management Outlook Machine Learning Word Money Humor Employees Integration Maintenance Sports Modem Antivirus User Tip Safety Mouse Processor Mobile Security Holidays Administration Data Storage Smart Technology Supply Chain Video Conferencing Managed Services Provider Gig Economy Travel Screen Reader Distributed Denial of Service Workplace IBM Techology Google Maps Service Level Agreement Internet Service Provider Cortana Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Alt Codes Regulations Compliance Bookmark Downtime Unified Threat Management Smart Tech Memes Co-managed IT Unified Threat Management Hosted Solution Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Competition Typing Financial Data Browsers Smartwatch Connectivity IT Network Congestion Break Fix Scams Google Drive User Error Upload Procurement Knowledge Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Social Network Telework CES User Point of Sale IoT Communitications 5G Dark Web Cables Google Docs Unified Communications Trends Supply Chain Management Experience Regulations Google Calendar Term Google Apps Bitcoin Network Management Customer Resource management FinTech Running Cable Tech Support Data Analysis Star Wars IT Assessment Monitors Microsoft Excel IT Maintenance IP Address Google Wallet Gamification Flexibility Staff Value Business Intelligence Social Networking Legislation Shortcuts Windows 8 Organization Laptop Websites Drones Fileless Malware Digital Security Cameras Recovery Smart Devices Ransmoware SharePoint Hard Drives Content Remote Working Electronic Medical Records Wearable Technology Memory Vendors Halloween Motherboard Data Breach Comparison Google Play Be Proactive Domains Health IT Lenovo Directions Videos Assessment Electronic Health Records Writing Permissions Workforce Refrigeration Virtual Reality Wasting Time Threats Scary Stories Private Cloud Trend Micro Specifications Security Cameras Workplace Strategies Public Speaking Hacks Server Management Lithium-ion battery Superfish Microchip Identity Theft Internet Exlporer Software as a Service Fun Fraud Meta Deep Learning Username Entrepreneur Twitter Managing Costs Amazon Error eCommerce Black Friday SSID Education Database Surveillance Social Engineering Virtual Assistant Outsource IT Media Undo Remote Computing IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Mobile Computing Proxy Server Reviews Tablet Tactics Development Search Hotspot Transportation Small Businesses Best Practice Alert Mirgation Hypervisor Displays Shopping Buisness File Sharing Nanotechnology Optimization Dark Data PowerPoint Managed IT Legal Application IT solutions Addiction How To Language Employer/Employee Relationships Outsourcing Chatbots Navigation Business Growth Management PCI DSS Notifications

Blog Archive