Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Phishing Workplace Tips Hosted Solutions IT Services Collaboration Users Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Backup Passwords Communication Data Backup Saving Money Smartphone Android Managed Service Business Management VoIP Smartphones communications Upgrade Mobile Devices Data Recovery Disaster Recovery Social Media Productivity Browser Microsoft Office Windows Managed IT Services Current Events AI Remote Tech Term Network Internet of Things Automation Artificial Intelligence Facebook Holiday Gadgets Cloud Computing Covid-19 Remote Work Training Server Managed Service Provider Miscellaneous Information Outsourced IT Employee/Employer Relationship Compliance Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology IT Support Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps Mobile Device Management Chrome Managed Services Voice over Internet Protocol Gmail Budget Networking Apple App Employer-Employee Relationship BYOD Computing Applications Hacker Information Technology Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing WiFi How To BDR HIPAA Operating System Router Computers Virtual Private Network Risk Management Health Website Help Desk Analytics Office Tips Augmented Reality Retail Healthcare Storage Password Bring Your Own Device Managed IT Services Big Data Customer Service Physical Security Cybercrime Display Printer Paperless Office Windows 11 Infrastructure 2FA Monitoring Excel Document Management Firewall Remote Workers Telephone Scam Data loss The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Patch Management Save Money Microsoft 365 Remote Monitoring Going Green End of Support Vulnerability Vendor Management Solutions Meetings Content Filtering VPN Employees Integration Hacking YouTube Presentation Modem User Tip Processor Cryptocurrency Computer Repair Mobile Security Wireless Technology Holidays Virtual Desktop Data Storage Data storage LiFi Smart Technology Supply Chain Video Conferencing Word Machine Learning Managed Services Provider Outlook Virtual Machines Professional Services Saving Time Money Humor Managed IT Service Maintenance Downloads Antivirus Safety iPhone Licensing Sports Mouse Vulnerabilities Entertainment Data Privacy Administration Images 101 Multi-Factor Authentication Robot Mobility Telephone System Cost Management Customer Relationship Management Settings Wireless IT Management Printing Trend Micro Hosted Solution Network Congestion Specifications Security Cameras Workplace Strategies User Error Microchip Internet Exlporer Software as a Service Typing Fraud Meta Username Managing Costs Amazon Google Drive Point of Sale eCommerce Black Friday SSID User Knowledge Database Surveillance Virtual Assistant Outsource IT Media 5G Network Management Tech Support IT Technicians Virtual Machine Environment Google Docs Cookies IP Address Unified Communications Monitors Cyber Monday Medical IT Experience Proxy Server Reviews Tactics Development Bitcoin Hotspot Transportation Small Businesses Running Cable Google Wallet Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Recovery Shopping SharePoint Addiction Windows 8 Electronic Medical Records Language Employer/Employee Relationships Outsourcing Hard Drives Laptop Domains Navigation Management PCI DSS Drones Chatbots Screen Reader Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Refrigeration Halloween Public Speaking Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Identity Theft Smart Tech Memes Lithium-ion battery Co-managed IT Superfish Bookmark Entrepreneur Download Net Neutrality Hacks Twitter Alerts SQL Server Technology Care Scary Stories Business Communications Fun Financial Data Error History Connectivity IT Deep Learning Social Engineering Break Fix Scams Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Undo Education Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Tablet IoT Communitications Dark Web Cables CES Trends Supply Chain Management Mobile Computing Alert Dark Data Google Calendar Term Google Apps Search Managed IT Customer Resource management FinTech File Sharing Regulations Data Analysis Star Wars IT Assessment Best Practice How To Microsoft Excel IT Maintenance Application Gamification Flexibility Notifications Staff Value Business Intelligence Buisness Travel Social Networking IBM IT solutions Legislation Shortcuts Organization Legal Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Business Growth Ransmoware Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Cortana Health IT Unified Threat Management Directions Videos Assessment Electronic Health Records Alt Codes Permissions Workforce Wasting Time Threats Competition Downtime

Blog Archive