Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Passwords Saving Money Communication Cybersecurity Productivity Smartphone Data Backup Managed Service Android Upgrade Business Management AI Smartphones VoIP communications Mobile Devices Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Holiday Miscellaneous Training Covid-19 Gadgets Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam IT Support Employee/Employer Relationship Windows 10 Office Government Data Management Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Data Security Two-factor Authentication Apps Vendor Mobile Office Mobile Device Management App Gmail BYOD Employer-Employee Relationship Tip of the week Chrome Budget Managed Services Networking Voice over Internet Protocol Apple BDR Conferencing Computing WiFi Information Technology Access Control Office 365 Hacker HIPAA Avoiding Downtime Applications Marketing How To Help Desk Operating System Big Data Risk Management Virtual Private Network Health Analytics Office Tips Augmented Reality 2FA Computers Retail Storage Password Router Bring Your Own Device Website Managed IT Services Healthcare Monitoring Firewall Going Green Patch Management Save Money Free Resource Remote Monitoring End of Support Project Management Vulnerability Windows 7 Vendor Management Cybercrime The Internet of Things Microsoft 365 Physical Security Telephone Display Printer Solutions Social Paperless Office Infrastructure Cooperation Customer Service Windows 11 Document Management Excel Scam Data loss Remote Workers iPhone Robot Vulnerabilities Smart Technology Settings Data Privacy Wireless Printing Content Filtering Saving Time Safety Images 101 IT Management Mobility Meetings YouTube Multi-Factor Authentication VPN Managed IT Service Cryptocurrency Downloads Computer Repair Licensing Employees Virtual Desktop LiFi Entertainment Integration Data storage Customer Relationship Management Outlook Machine Learning Holidays Telephone System Money Cost Management Hacking Humor Presentation Data Storage Supply Chain Video Conferencing Maintenance Wireless Technology Sports Managed Services Provider Antivirus Virtual Machines Professional Services Mouse Administration User Tip Modem Mobile Security Processor Word IT solutions IT Proxy Server Scams Cookies How To Legal Cyber Monday Smartwatch Hotspot Business Growth Procurement Azure Hybrid Work Tactics Refrigeration Notifications Public Speaking Tech Human Resources Travel Mirgation Telework Cyber security Communitications Techology Cortana Lithium-ion battery Cables Google Maps Nanotechnology CES Language Entrepreneur Alt Codes Supply Chain Management Addiction Management Term Google Apps Unified Threat Management Chatbots FinTech Downtime Hosted Solution IT Assessment Unified Threat Management IT Maintenance Screen Reader Distributed Denial of Service Computing Infrastructure Typing Flexibility Value Business Intelligence Service Level Agreement Undo Shortcuts Identity Network Congestion Organization Smart Devices User Error Knowledge Bookmark Ransmoware Smart Tech Google Drive Digital Security Cameras Alerts Remote Working Memory Vendors Download 5G Google Play Be Proactive Point of Sale Data Breach Unified Communications Electronic Health Records Experience Browsers Workforce Connectivity Application Google Docs Break Fix Videos Bitcoin Running Cable Wasting Time Threats Network Management Upload Tech Support Social Network IBM Security Cameras Workplace Strategies Monitors Google Wallet Multi-Factor Security Trend Micro Software as a Service Meta IoT Dark Web Websites Windows 8 Laptop Managing Costs Amazon Trends Customer Resource management SSID Regulations Drones Google Calendar eCommerce Surveillance SharePoint Data Analysis Virtual Assistant Outsource IT Star Wars Electronic Medical Records Microsoft Excel Media Staff Halloween Virtual Machine Environment Gamification Competition Lenovo Medical IT Social Networking Writing Legislation Reviews Development Fileless Malware Transportation Small Businesses Virtual Reality Private Cloud Wearable Technology Hacks Scary Stories Hypervisor Displays Server Management Content Optimization Superfish Fun Health IT PowerPoint Identity Theft Motherboard User Comparison Shopping Deep Learning Directions Employer/Employee Relationships Outsourcing Assessment Twitter Permissions Navigation Error PCI DSS IP Address Workplace Social Engineering Specifications Gig Economy Education Fraud Internet Service Provider Microchip Teamwork Hiring/Firing Internet Exlporer Remote Computing Username Evernote Paperless Mobile Computing Regulations Compliance Memes Search Co-managed IT Tablet Recovery Black Friday Best Practice Net Neutrality SQL Server Technology Care Database Hard Drives Alert Domains Business Communications File Sharing IT Technicians Dark Data Financial Data Buisness History Managed IT

Blog Archive