Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Training Compliance Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Data Management Government Wi-Fi Business Technology Bandwidth Windows 10 Virtualization Blockchain Apps Vendor Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship Tip of the week Chrome Voice over Internet Protocol Mobile Device Management Budget Gmail Networking Apple WiFi App BYOD Physical Security Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Password Managed IT Services How To BDR HIPAA Router Operating System Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Healthcare Storage Bring Your Own Device Big Data Cybercrime Display Printer Customer Service Paperless Office Windows 11 Infrastructure Monitoring Excel Document Management Remote Workers Managed IT Service Telephone Firewall Scam Data loss Cooperation Free Resource Project Management Windows 7 The Internet of Things Patch Management Save Money Microsoft 365 Going Green Social Remote Monitoring End of Support Vulnerability Vendor Management Solutions Meetings Content Filtering VPN Employees Integration Customer Relationship Management YouTube Modem User Tip Processor Computer Repair Mobile Security Cryptocurrency Hacking Holidays Presentation Virtual Desktop Data Storage Data storage Smart Technology Supply Chain LiFi Wireless Technology Video Conferencing Machine Learning Managed Services Provider Saving Time Virtual Machines Outlook Professional Services Money Word Humor Maintenance Downloads Antivirus iPhone Sports Licensing Mouse Entertainment Vulnerabilities Safety Data Privacy Administration Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Printing Wireless IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Hosted Solution User Error Microchip Internet Exlporer Software as a Service Fraud Meta Typing Username Managing Costs Amazon Point of Sale eCommerce Google Drive Black Friday SSID Competition Knowledge Database Surveillance Virtual Assistant Outsource IT Media 5G Network Management Tech Support IT Technicians Virtual Machine Environment Proxy Server Reviews Cookies Google Docs Monitors Cyber Monday Medical IT Unified Communications Experience Running Cable User Tactics Development Hotspot Transportation Small Businesses Bitcoin Websites Mirgation Hypervisor Displays Google Wallet Shopping Nanotechnology Optimization PowerPoint IP Address Laptop SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Windows 8 Chatbots Drones Navigation Management PCI DSS Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Halloween Recovery Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Private Cloud Identity Evernote Paperless Hard Drives Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Co-managed IT Domains Hacks Scary Stories Download Net Neutrality Twitter Alerts SQL Server Technology Care Error History Business Communications Refrigeration Fun Financial Data Browsers Smartwatch Connectivity IT Social Engineering Break Fix Scams Deep Learning Public Speaking Lithium-ion battery Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Education Entrepreneur Social Network Telework CES Tablet IoT Communitications Dark Web Cables Mobile Computing Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Undo Search Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Best Practice Buisness Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legal Legislation Shortcuts IT solutions Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Business Growth Application Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Cortana Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Alt Codes IBM Downtime Wasting Time Threats

Blog Archive