Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade AI VoIP Business Management Smartphones communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Information Automation Facebook Artificial Intelligence Holiday Training Covid-19 Miscellaneous Gadgets Cloud Computing Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship Spam IT Support Windows 10 Office Business Continuity Data Management Government Blockchain Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Data Security Apps Apple Mobile Device Management Tip of the week App Gmail Networking Managed Services Employer-Employee Relationship Voice over Internet Protocol Chrome BYOD Budget Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Computing Information Technology How To Conferencing BDR Office 365 Hacker Storage Virtual Private Network Password Website Bring Your Own Device Health Router Retail Operating System Help Desk Big Data Risk Management Managed IT Services 2FA Healthcare Analytics Office Tips Computers Augmented Reality Windows 7 Display Printer Microsoft 365 Paperless Office Infrastructure Solutions Firewall Going Green Document Management The Internet of Things Cybercrime Monitoring Scam Data loss Social Windows 11 Remote Workers Patch Management Telephone Save Money Customer Service Remote Monitoring Vulnerability Excel End of Support Vendor Management Free Resource Cooperation Project Management Physical Security Images 101 Sports Multi-Factor Authentication Telephone System Mobility Mouse Computer Repair Cost Management Word Administration Data Privacy Employees Machine Learning Integration User Tip Modem Safety Mobile Security Settings Processor Wireless Printing Content Filtering Holidays Maintenance Antivirus Data Storage YouTube Smart Technology Cryptocurrency Video Conferencing Managed Services Provider Virtual Machines Saving Time Professional Services Virtual Desktop Managed IT Service LiFi Data storage Customer Relationship Management Robot Supply Chain Downloads iPhone Outlook Licensing Hacking Money Presentation Entertainment Vulnerabilities Humor IT Management VPN Meetings Wireless Technology IP Address Microsoft Excel Deep Learning IT Assessment Data Analysis Technology Care Star Wars Value Gamification Business Communications Staff Point of Sale Flexibility Organization Scams Social Networking Legislation Education Tech Support Recovery Digital Security Cameras Smart Devices Fileless Malware Hybrid Work Network Management Memory Content Human Resources Wearable Technology Mobile Computing Hard Drives Monitors Remote Working Search Data Breach Health IT Google Play Cables Motherboard Domains Comparison Permissions Best Practice Websites Videos Electronic Health Records Directions Assessment Wasting Time Google Apps Refrigeration Buisness Trend Micro SharePoint Security Cameras IT Maintenance Legal Public Speaking Specifications IT solutions Electronic Medical Records Lithium-ion battery Fraud Business Growth Software as a Service Microchip Business Intelligence Internet Exlporer Managing Costs Username Lenovo Shortcuts Writing Entrepreneur Virtual Reality Cortana eCommerce SSID Ransmoware Black Friday Server Management Alt Codes Private Cloud Surveillance Virtual Assistant Vendors Database Virtual Machine Superfish Be Proactive IT Technicians Identity Theft Undo Downtime Hosted Solution Twitter Reviews Proxy Server Medical IT Workforce Cookies Cyber Monday Hotspot Typing Error Development Transportation Threats Tactics Hypervisor Workplace Strategies Mirgation Social Engineering Remote Computing Shopping Knowledge Optimization PowerPoint Meta Nanotechnology Google Drive Employer/Employee Relationships Amazon Addiction Language Application PCI DSS 5G Management Navigation Chatbots Tablet Distributed Denial of Service Unified Communications Alert Gig Economy Experience Outsource IT Screen Reader Google Docs IBM Teamwork Environment Service Level Agreement Managed IT Media Computing Infrastructure Bitcoin File Sharing Running Cable Dark Data Internet Service Provider Regulations Compliance Evernote Identity Google Wallet How To Notifications Memes Bookmark Small Businesses Smart Tech SQL Server Displays Download Alerts Windows 8 Travel Laptop Net Neutrality Financial Data History Techology Drones Google Maps Competition Break Fix Smartwatch IT Browsers Outsourcing Connectivity Azure Upload Unified Threat Management Halloween Procurement Telework Cyber security Social Network Unified Threat Management Tech Workplace Multi-Factor Security Dark Web User CES Communitications Hiring/Firing IoT Trends Paperless Hacks Scary Stories Network Congestion Supply Chain Management FinTech Fun Customer Resource management User Error Term Co-managed IT Regulations Google Calendar

Blog Archive