Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Backup Small Business Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication AI Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Facebook Miscellaneous Information Holiday Compliance Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Employee/Employer Relationship Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Blockchain Wi-Fi Mobile Office Data Security Apps Vendor Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Avoiding Downtime Office 365 Marketing Conferencing How To BDR HIPAA Computing Physical Security Applications Information Technology Hacker Access Control Healthcare Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services Big Data Operating System Router 2FA Risk Management Virtual Private Network Computers Health Monitoring Document Management Free Resource Managed IT Service Project Management Windows 7 Firewall Telephone Scam Data loss Microsoft 365 Solutions The Internet of Things Cooperation Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Customer Service Excel Display Printer Paperless Office Infrastructure Remote Workers Smart Technology Outlook iPhone Machine Learning Money Saving Time Humor Vulnerabilities Word Data Privacy Maintenance Images 101 Downloads Antivirus Sports Mobility Mouse Multi-Factor Authentication Licensing Safety Administration Entertainment Employees Integration Robot Telephone System Cost Management Settings Wireless Printing Holidays Content Filtering IT Management Customer Relationship Management YouTube Meetings Data Storage VPN Supply Chain Video Conferencing Cryptocurrency Modem Hacking User Tip Managed Services Provider Processor Virtual Machines Professional Services Presentation Computer Repair Mobile Security Virtual Desktop Data storage LiFi Wireless Technology Net Neutrality Windows 8 SQL Server Technology Care IP Address Laptop Websites Mirgation Nanotechnology Business Communications Financial Data Drones History SharePoint IT Addiction Scams Electronic Medical Records Language Smartwatch Procurement Management Azure Hybrid Work Halloween Chatbots Recovery Screen Reader Tech Human Resources Hard Drives Writing Distributed Denial of Service Telework Lenovo Cyber security Communitications Service Level Agreement Cables Domains Virtual Reality Computing Infrastructure CES Supply Chain Management Hacks Server Management Scary Stories Private Cloud Identity Identity Theft Smart Tech Term Google Apps Refrigeration Fun FinTech Superfish Bookmark IT Assessment Deep Learning Download IT Maintenance Public Speaking Twitter Alerts Flexibility Value Business Intelligence Lithium-ion battery Error Education Connectivity Shortcuts Social Engineering Break Fix Entrepreneur Organization Browsers Smart Devices Upload Ransmoware Remote Computing Digital Security Cameras Multi-Factor Security Remote Working Mobile Computing Social Network Memory Vendors Tablet IoT Google Play Be Proactive Undo Search Dark Web Data Breach Electronic Health Records Best Practice Trends Workforce Alert Videos Dark Data Google Calendar Managed IT Customer Resource management Wasting Time Threats Buisness File Sharing Regulations IT solutions Star Wars Security Cameras Workplace Strategies How To Microsoft Excel Legal Data Analysis Trend Micro Software as a Service Business Growth Gamification Meta Notifications Staff Application Legislation Managing Costs Amazon Travel Social Networking eCommerce Google Maps SSID Cortana Techology Fileless Malware Surveillance Alt Codes Content Virtual Assistant Outsource IT IBM Wearable Technology Media Comparison Health IT Virtual Machine Environment Downtime Unified Threat Management Motherboard Unified Threat Management Directions Hosted Solution Assessment Medical IT Permissions Reviews Development Typing Transportation Small Businesses Network Congestion Specifications Hypervisor Displays Google Drive User Error Microchip Optimization Internet Exlporer PowerPoint Competition Knowledge Fraud Shopping Username Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Black Friday PCI DSS Google Docs Unified Communications Database Workplace Experience Gig Economy Internet Service Provider Bitcoin Network Management Teamwork Hiring/Firing Running Cable Tech Support IT Technicians User Cookies Evernote Paperless Monitors Cyber Monday Regulations Compliance Google Wallet Proxy Server Memes Tactics Co-managed IT Hotspot

Blog Archive