Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade Disaster Recovery VoIP Business Management Data Recovery Smartphones AI communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Information Artificial Intelligence Automation Gadgets Cloud Computing Holiday Covid-19 Training Server Remote Work Managed Service Provider Outsourced IT Compliance Encryption Spam IT Support Employee/Employer Relationship Office Windows 10 Data Management Government Business Continuity Windows 10 Virtualization Wi-Fi Blockchain Bandwidth Business Technology Data Security Apps Two-factor Authentication Vendor Mobile Office Tip of the week Gmail Apple App Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship BYOD Chrome Budget Mobile Device Management Conferencing WiFi How To Computing BDR Information Technology Hacker HIPAA Office 365 Applications Avoiding Downtime Marketing Access Control Bring Your Own Device 2FA Retail Big Data Healthcare Managed IT Services Operating System Risk Management Computers Router Office Tips Analytics Virtual Private Network Augmented Reality Website Health Storage Password Help Desk Windows 11 Firewall Document Management Excel The Internet of Things Telephone Going Green Scam Remote Workers Data loss Social Cooperation Cybercrime Patch Management Free Resource Project Management Save Money Customer Service Windows 7 Remote Monitoring Vulnerability End of Support Vendor Management Microsoft 365 Physical Security Solutions Display Printer Paperless Office Infrastructure Monitoring Mouse Holidays Machine Learning Saving Time Data Storage Supply Chain Administration Video Conferencing Safety Managed Services Provider Managed IT Service Virtual Machines Professional Services Maintenance Antivirus Downloads Licensing Settings Printing Entertainment Wireless iPhone Content Filtering YouTube Customer Relationship Management Vulnerabilities Cryptocurrency Telephone System Data Privacy Robot Cost Management Images 101 Hacking Mobility Virtual Desktop Multi-Factor Authentication Presentation Data storage LiFi IT Management VPN Meetings Wireless Technology Outlook User Tip Modem Money Processor Employees Computer Repair Mobile Security Integration Humor Word Sports Smart Technology Public Speaking Electronic Medical Records Language Medical IT SharePoint Education Reviews Addiction Management Development Lithium-ion battery Chatbots Transportation Small Businesses Entrepreneur Mobile Computing Lenovo Screen Reader Hypervisor Displays Writing Distributed Denial of Service Virtual Reality Computing Infrastructure PowerPoint Shopping Service Level Agreement Search Optimization Server Management Private Cloud Identity Employer/Employee Relationships Outsourcing Best Practice Superfish Bookmark Buisness PCI DSS Identity Theft Smart Tech Undo Navigation Twitter Alerts Workplace Legal IT solutions Gig Economy Download Internet Service Provider Error Teamwork Hiring/Firing Business Growth Evernote Paperless Browsers Regulations Compliance Connectivity Social Engineering Break Fix Memes Remote Computing Co-managed IT Upload Cortana Social Network Net Neutrality SQL Server Technology Care Application Multi-Factor Security Alt Codes Business Communications Downtime Financial Data Tablet IoT History Dark Web IT IBM Alert Scams Hosted Solution Smartwatch Trends Managed IT Customer Resource management Procurement File Sharing Regulations Azure Hybrid Work Dark Data Google Calendar Typing Tech Human Resources Data Analysis Telework Star Wars Cyber security How To Microsoft Excel Communitications Notifications Staff Cables Google Drive CES Gamification Knowledge Supply Chain Management Travel Social Networking Legislation Term Google Apps Techology Fileless Malware FinTech Google Maps 5G Competition Experience IT Assessment Wearable Technology IT Maintenance Google Docs Unified Communications Content Bitcoin Health IT Running Cable Flexibility Unified Threat Management Motherboard Value Business Intelligence Comparison Shortcuts Google Wallet Unified Threat Management Directions Organization Assessment Permissions Smart Devices Ransmoware User Digital Security Cameras Windows 8 Laptop Remote Working Memory Vendors Network Congestion Specifications Google Play Be Proactive Drones User Error Microchip Internet Exlporer Data Breach Fraud Electronic Health Records IP Address Workforce Videos Username Halloween Point of Sale Wasting Time Threats Black Friday Security Cameras Workplace Strategies Database Trend Micro Software as a Service Tech Support IT Technicians Meta Recovery Network Management Hacks Proxy Server Scary Stories Cookies Managing Costs Amazon Hard Drives Monitors Cyber Monday SSID Tactics Fun eCommerce Domains Hotspot Surveillance Websites Mirgation Virtual Assistant Outsource IT Deep Learning Nanotechnology Virtual Machine Environment Refrigeration Media

Blog Archive