Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Hardware Efficiency Network Security User Tips Internet IT Services Malware Phishing IT Support Google Privacy Email Workplace Tips Computer Workplace Strategy Hosted Solutions Collaboration Backup Small Business Ransomware Users AI Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Artificial Intelligence Holiday Facebook Automation Gadgets Compliance Covid-19 Cloud Computing Training Outsourced IT Server Managed Service Provider Remote Work IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Blockchain Wi-Fi Windows 10 Business Technology Virtualization Apps Data Security Mobile Office Vendor Two-factor Authentication Managed Services Chrome Employer-Employee Relationship Budget Networking Apple App BYOD Mobile Device Management Gmail WiFi Tip of the week Voice over Internet Protocol Conferencing Password Managed IT Services How To Hacker BDR Avoiding Downtime Marketing HIPAA Physical Security Computing Applications Information Technology Access Control Office 365 Augmented Reality Healthcare Retail Storage Bring Your Own Device Computers Website Router Operating System Virtual Private Network Risk Management 2FA Health Help Desk Big Data Office Tips Analytics Managed IT Service Telephone Scam Data loss Customer Service Free Resource Project Management Windows 7 Cooperation Microsoft 365 Patch Management Save Money Going Green Solutions Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Firewall Display Windows 11 Printer Paperless Office Infrastructure The Internet of Things Monitoring Excel Document Management Social Remote Workers Money Humor iPhone Maintenance Customer Relationship Management Downloads Antivirus Vulnerabilities Sports Licensing Mouse Data Privacy Entertainment Hacking Images 101 Presentation Administration Mobility Multi-Factor Authentication Wireless Technology Robot Telephone System Cost Management Settings Employees Word Printing Integration IT Management Wireless Content Filtering Meetings VPN YouTube User Tip Modem Cryptocurrency Processor Computer Repair Mobile Security Holidays Safety Data Storage Supply Chain Video Conferencing Virtual Desktop Smart Technology Data storage Managed Services Provider LiFi Virtual Machines Professional Services Machine Learning Saving Time Outlook Private Cloud Identity IBM Net Neutrality SQL Server Technology Care Server Management Business Communications Superfish Bookmark Identity Theft Smart Tech Financial Data History IT Hacks Scams Scary Stories Download Smartwatch Twitter Alerts Fun Error Procurement Azure Hybrid Work Deep Learning Tech Human Resources Browsers Connectivity Telework Social Engineering Break Fix Cyber security Communitications Cables Upload CES Remote Computing Competition Supply Chain Management Multi-Factor Security Education Social Network Term Google Apps Tablet IoT FinTech Dark Web IT Assessment Mobile Computing IT Maintenance Trends Alert Search File Sharing Regulations Flexibility Dark Data Google Calendar User Value Business Intelligence Managed IT Customer Resource management Best Practice Shortcuts Data Analysis Star Wars Organization How To Microsoft Excel Smart Devices Ransmoware Buisness Gamification Digital Security Cameras Notifications Staff Travel Social Networking IP Address Remote Working Legislation Legal Memory Vendors IT solutions Business Growth Google Play Be Proactive Techology Fileless Malware Google Maps Data Breach Electronic Health Records Workforce Content Videos Wearable Technology Cortana Unified Threat Management Motherboard Comparison Recovery Wasting Time Threats Health IT Alt Codes Security Cameras Workplace Strategies Unified Threat Management Directions Assessment Permissions Hard Drives Trend Micro Software as a Service Meta Downtime Domains Network Congestion Specifications Managing Costs Amazon Hosted Solution Typing SSID User Error Microchip Internet Exlporer Fraud Refrigeration eCommerce Public Speaking Surveillance Virtual Assistant Outsource IT Username Knowledge Point of Sale Lithium-ion battery Black Friday Google Drive Virtual Machine Environment Media Entrepreneur Medical IT Database Reviews Tech Support IT Technicians Development Transportation Small Businesses Network Management 5G Proxy Server Experience Cookies Monitors Cyber Monday Google Docs Hypervisor Displays Unified Communications Optimization Bitcoin PowerPoint Running Cable Tactics Shopping Hotspot Undo Websites Mirgation Google Wallet Employer/Employee Relationships Outsourcing Navigation Nanotechnology PCI DSS Windows 8 Workplace SharePoint Laptop Addiction Gig Economy Electronic Medical Records Language Chatbots Internet Service Provider Drones Teamwork Hiring/Firing Management Evernote Paperless Lenovo Screen Reader Regulations Compliance Writing Distributed Denial of Service Application Memes Co-managed IT Halloween Service Level Agreement Virtual Reality Computing Infrastructure

Blog Archive