Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users AI Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Training Covid-19 Gadgets Cloud Computing Compliance Server IT Support Remote Work Managed Service Provider Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Data Management Government Blockchain Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Two-factor Authentication Vendor Mobile Office Data Security Managed Services Apps Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi Voice over Internet Protocol App Employer-Employee Relationship BYOD Information Technology Hacker Access Control Avoiding Downtime Office 365 HIPAA Marketing Applications Password Managed IT Services How To BDR Conferencing Computing Physical Security Virtual Private Network Risk Management Computers Health Analytics Website Office Tips Router Augmented Reality Retail Storage 2FA Bring Your Own Device Help Desk Big Data Healthcare Operating System Windows 7 Customer Service Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Document Management Windows 11 Firewall Scam Monitoring Data loss Excel The Internet of Things Managed IT Service Remote Workers Social Going Green Patch Management Telephone Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Cooperation Free Resource Project Management Cryptocurrency Images 101 Hacking Mobility Telephone System Presentation Computer Repair Multi-Factor Authentication Cost Management Virtual Desktop Data storage LiFi Wireless Technology Outlook Employees Machine Learning Integration Money Humor User Tip Modem Word Mobile Security Processor Maintenance Holidays Sports Antivirus Mouse Data Storage Smart Technology Supply Chain Video Conferencing Safety Administration Managed Services Provider Professional Services Saving Time Virtual Machines Robot Downloads iPhone Settings Wireless Licensing Printing Content Filtering Vulnerabilities IT Management Entertainment Customer Relationship Management YouTube Meetings Data Privacy VPN Star Wars IT Assessment Microsoft Excel IT Maintenance Data Analysis Point of Sale Gamification Flexibility 5G Staff Value Business Intelligence Legislation Shortcuts Google Docs Unified Communications Organization Experience Social Networking Running Cable Tech Support Smart Devices User Ransmoware Bitcoin Network Management Fileless Malware Digital Security Cameras Google Wallet Content Remote Working Monitors Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Motherboard Data Breach Laptop Websites Assessment Electronic Health Records Permissions Workforce Windows 8 Directions Videos IP Address Drones Wasting Time Threats Specifications Security Cameras Workplace Strategies SharePoint Electronic Medical Records Trend Micro Halloween Internet Exlporer Software as a Service Recovery Fraud Meta Microchip Lenovo Username Hard Drives Writing Managing Costs Amazon Black Friday SSID Domains Virtual Reality eCommerce Scary Stories Private Cloud Database Surveillance Virtual Assistant Outsource IT Hacks Server Management Superfish Identity Theft Refrigeration Fun IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Deep Learning Proxy Server Reviews Public Speaking Twitter Cookies Error Tactics Development Hotspot Transportation Small Businesses Lithium-ion battery Education Social Engineering Mirgation Hypervisor Displays Entrepreneur PowerPoint Shopping Remote Computing Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Mobile Computing Tablet Management PCI DSS Undo Search Chatbots Navigation Distributed Denial of Service Workplace Best Practice Gig Economy Alert Screen Reader Buisness File Sharing Service Level Agreement Internet Service Provider Dark Data Computing Infrastructure Teamwork Hiring/Firing Managed IT Legal IT solutions Regulations Compliance How To Identity Evernote Paperless Co-managed IT Business Growth Bookmark Notifications Smart Tech Memes Travel Download Net Neutrality Application Alerts SQL Server Technology Care Techology Google Maps Financial Data Cortana History Business Communications Break Fix Scams Alt Codes Browsers Smartwatch IBM Connectivity IT Downtime Unified Threat Management Upload Procurement Azure Hybrid Work Unified Threat Management Hosted Solution Social Network Telework Cyber security Multi-Factor Security Tech Human Resources IoT Communitications Dark Web Cables Typing CES Trends Supply Chain Management Network Congestion Google Calendar Term Google Apps Google Drive User Error Customer Resource management FinTech Competition Knowledge Regulations

Blog Archive