Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Email Workplace Tips Phishing Privacy Google Computer Workplace Strategy Small Business Collaboration Hosted Solutions Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft AI Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Facebook Holiday Automation Artificial Intelligence Gadgets Covid-19 Cloud Computing Training Compliance Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Encryption Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Apps Data Security Vendor Mobile Office Two-factor Authentication Managed Services WiFi Apple Networking Employer-Employee Relationship App BYOD Mobile Device Management Voice over Internet Protocol Tip of the week Chrome Gmail Budget Password Managed IT Services How To BDR HIPAA Applications Hacker Computing Physical Security Avoiding Downtime Information Technology Marketing Access Control Conferencing Office 365 Storage Bring Your Own Device Big Data Router Computers Operating System 2FA Risk Management Virtual Private Network Help Desk Website Health Analytics Office Tips Healthcare Augmented Reality Retail The Internet of Things Cooperation Free Resource Project Management Windows 7 Scam Data loss Social Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring Customer Service End of Support Vulnerability Vendor Management Cybercrime Windows 11 Monitoring Display Printer Excel Paperless Office Infrastructure Managed IT Service Remote Workers Firewall Telephone Document Management Maintenance Data Privacy Antivirus Sports Mouse Images 101 Mobility Telephone System Multi-Factor Authentication Administration Cost Management Customer Relationship Management Robot Employees Integration Settings Modem Hacking Wireless Printing User Tip Processor Presentation Content Filtering Mobile Security IT Management Holidays VPN YouTube Meetings Wireless Technology Cryptocurrency Data Storage Smart Technology Supply Chain Video Conferencing Computer Repair Managed Services Provider Virtual Desktop Virtual Machines Professional Services Saving Time Data storage LiFi Word Outlook Downloads Machine Learning iPhone Money Humor Licensing Safety Vulnerabilities Entertainment Deep Learning Trends Supply Chain Management Twitter Google Calendar Term Google Apps Customer Resource management FinTech Error Regulations Education Star Wars IT Assessment Social Engineering Microsoft Excel IT Maintenance Data Analysis Gamification Flexibility Remote Computing Staff Value Business Intelligence Application Legislation Shortcuts Mobile Computing Organization Social Networking Tablet Smart Devices Search Ransmoware Fileless Malware Digital Security Cameras Best Practice Content Remote Working IBM Alert Wearable Technology Memory Vendors Dark Data Comparison Google Play Be Proactive Managed IT Health IT Buisness File Sharing Motherboard Data Breach IT solutions Assessment Electronic Health Records How To Permissions Workforce Legal Directions Videos Business Growth Notifications Wasting Time Threats Specifications Security Cameras Workplace Strategies Travel Trend Micro Microchip Google Maps Internet Exlporer Software as a Service Competition Cortana Fraud Meta Techology Alt Codes Username Managing Costs Amazon eCommerce Black Friday SSID Downtime Unified Threat Management Hosted Solution Database Surveillance Virtual Assistant Outsource IT Unified Threat Management Media Typing IT Technicians Virtual Machine Environment User Cookies Network Congestion Cyber Monday Medical IT Proxy Server Reviews Google Drive User Error Tactics Development Knowledge Hotspot Transportation Small Businesses IP Address Mirgation Hypervisor Displays Point of Sale Nanotechnology Optimization 5G PowerPoint Shopping Google Docs Unified Communications Addiction Experience Language Employer/Employee Relationships Outsourcing Recovery Navigation Bitcoin Network Management Management PCI DSS Running Cable Tech Support Chatbots Screen Reader Hard Drives Monitors Distributed Denial of Service Workplace Google Wallet Gig Economy Service Level Agreement Internet Service Provider Domains Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Windows 8 Regulations Compliance Laptop Websites Identity Smart Tech Memes Refrigeration Co-managed IT Drones Bookmark SharePoint Download Net Neutrality Public Speaking Electronic Medical Records Alerts SQL Server Technology Care Business Communications Financial Data Lithium-ion battery Halloween History Connectivity IT Writing Break Fix Scams Entrepreneur Lenovo Browsers Smartwatch Upload Procurement Virtual Reality Azure Hybrid Work Multi-Factor Security Tech Human Resources Hacks Server Management Social Network Telework Scary Stories Private Cloud Cyber security Identity Theft IoT Communitications Undo Fun Dark Web Cables Superfish CES

Blog Archive