Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support Privacy IT Services Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Android Disaster Recovery Data Recovery Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Artificial Intelligence Facebook Information Miscellaneous Holiday Automation Covid-19 Cloud Computing Gadgets Training Server Managed Service Provider Compliance Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Mobile Device Management Apple Networking Gmail App WiFi BYOD Managed Services Employer-Employee Relationship Voice over Internet Protocol Tip of the week Conferencing Avoiding Downtime Marketing How To BDR HIPAA Computing Applications Information Technology Access Control Office 365 Hacker Augmented Reality Retail Storage Website Password Bring Your Own Device Managed IT Services Operating System Big Data Router Risk Management Virtual Private Network Health Healthcare Help Desk Analytics 2FA Computers Office Tips Document Management Free Resource Project Management Excel Windows 7 Telephone Microsoft 365 Scam Data loss Solutions Cooperation Firewall Patch Management Going Green Save Money Remote Monitoring The Internet of Things Vulnerability End of Support Vendor Management Cybercrime Social Physical Security Display Printer Remote Workers Paperless Office Infrastructure Monitoring Customer Service Windows 11 Saving Time Money Humor Wireless Technology Images 101 Managed IT Service Maintenance Multi-Factor Authentication Mobility Antivirus Downloads Sports Mouse Licensing Word Administration Entertainment Employees Integration Data Privacy Telephone System Safety Robot Cost Management Holidays Settings Wireless Printing Content Filtering Data Storage IT Management YouTube VPN Video Conferencing Meetings Managed Services Provider Virtual Machines Professional Services Cryptocurrency User Tip Modem Mobile Security Computer Repair Processor Customer Relationship Management Virtual Desktop Data storage LiFi iPhone Hacking Smart Technology Outlook Presentation Machine Learning Vulnerabilities Supply Chain Writing Lenovo Screen Reader Supply Chain Management Distributed Denial of Service Outsourcing Computing Infrastructure Virtual Reality Term Service Level Agreement FinTech Server Management Identity IT Assessment Private Cloud IP Address Hacks Workplace Scary Stories Bookmark Fun Superfish Smart Tech Flexibility Identity Theft Value Hiring/Firing Organization Alerts Twitter Deep Learning Paperless Download Digital Security Cameras Smart Devices Error Co-managed IT Recovery Memory Technology Care Social Engineering Hard Drives Education Browsers Connectivity Remote Working Break Fix Data Breach Remote Computing Domains Google Play Business Communications Upload Social Network Videos Electronic Health Records Multi-Factor Security Mobile Computing Scams Wasting Time Hybrid Work Refrigeration Search IoT Tablet Dark Web Trends Trend Micro Alert Public Speaking Security Cameras Best Practice Human Resources Buisness Customer Resource management Managed IT Regulations Software as a Service File Sharing Google Calendar Lithium-ion battery Cables Dark Data Microsoft Excel Managing Costs Legal How To IT solutions Entrepreneur Data Analysis Star Wars Gamification Staff eCommerce Notifications SSID Business Growth Google Apps Social Networking Surveillance Travel Legislation Virtual Assistant IT Maintenance Virtual Machine Business Intelligence Undo Fileless Malware Cortana Techology Google Maps Content Reviews Wearable Technology Medical IT Alt Codes Shortcuts Downtime Health IT Motherboard Development Unified Threat Management Comparison Transportation Ransmoware Permissions Hypervisor Vendors Hosted Solution Directions Unified Threat Management Assessment Shopping Optimization PowerPoint Typing Be Proactive Application Specifications Employer/Employee Relationships Workforce Network Congestion Fraud Google Drive Threats Navigation Microchip Knowledge User Error Internet Exlporer PCI DSS Username Gig Economy IBM Workplace Strategies 5G Internet Service Provider Point of Sale Black Friday Teamwork Meta Google Docs Amazon Evernote Unified Communications Experience Database Regulations Compliance Network Management IT Technicians Memes Tech Support Bitcoin Running Cable Proxy Server Cookies Net Neutrality Cyber Monday SQL Server Google Wallet Outsource IT Monitors Hotspot History Environment Competition Media Tactics Financial Data Smartwatch Mirgation IT Websites Windows 8 Laptop Nanotechnology Procurement Azure Drones Small Businesses Language Cyber security Displays Electronic Medical Records Tech SharePoint Addiction Telework Management CES Chatbots Communitications User Halloween

Blog Archive