Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones communications Data Recovery Mobile Devices Windows Disaster Recovery Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Automation Artificial Intelligence Information Facebook Covid-19 Miscellaneous Cloud Computing Gadgets Holiday Training Server Remote Work Managed Service Provider Compliance Outsourced IT Employee/Employer Relationship IT Support Encryption Spam Windows 10 Office Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Two-factor Authentication Mobile Office Data Security Vendor Apps Tip of the week Mobile Device Management Chrome Networking Gmail Budget Managed Services Voice over Internet Protocol Apple BYOD App Employer-Employee Relationship Access Control Computing Conferencing Hacker Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA WiFi Applications Operating System 2FA Health Computers Risk Management Website Retail Analytics Office Tips Augmented Reality Managed IT Services Storage Password Router Bring Your Own Device Healthcare Big Data Help Desk Virtual Private Network Paperless Office Customer Service Cybercrime Infrastructure Microsoft 365 Excel Solutions Telephone Document Management Cooperation Scam Data loss Firewall The Internet of Things Patch Management Remote Workers Save Money Remote Monitoring End of Support Vulnerability Social Vendor Management Physical Security Going Green Monitoring Free Resource Project Management Display Printer Windows 7 Windows 11 Saving Time Multi-Factor Authentication Mobility Content Filtering Hacking Supply Chain YouTube Presentation Managed IT Service Cryptocurrency Downloads Wireless Technology Machine Learning Employees Integration Licensing Virtual Desktop Entertainment Data storage LiFi Maintenance Antivirus Word Holidays Outlook Telephone System Data Privacy Money Data Storage Cost Management Humor Video Conferencing Managed Services Provider Safety Virtual Machines Professional Services Sports Robot Mouse User Tip Modem Administration Processor iPhone Mobile Security IT Management Meetings VPN Vulnerabilities Smart Technology Customer Relationship Management Settings Images 101 Computer Repair Printing Wireless Organization Displays Screen Reader Monitors Distributed Denial of Service Hosted Solution Digital Security Cameras Smart Devices Service Level Agreement Computing Infrastructure Typing Memory Outsourcing Identity Remote Working Websites User Bookmark Data Breach Smart Tech Google Drive Google Play Knowledge SharePoint Videos Electronic Health Records Download Electronic Medical Records Workplace Alerts Wasting Time Hiring/Firing 5G Browsers Trend Micro Connectivity Writing Google Docs Security Cameras Paperless Break Fix Unified Communications IP Address Experience Lenovo Running Cable Software as a Service Upload Virtual Reality Co-managed IT Bitcoin Managing Costs Technology Care Google Wallet Multi-Factor Security Server Management Social Network Private Cloud Recovery Identity Theft eCommerce IoT SSID Business Communications Dark Web Superfish Laptop Hard Drives Surveillance Trends Twitter Virtual Assistant Scams Windows 8 Virtual Machine Hybrid Work Regulations Drones Google Calendar Domains Customer Resource management Error Reviews Data Analysis Star Wars Social Engineering Medical IT Human Resources Microsoft Excel Halloween Refrigeration Development Gamification Remote Computing Transportation Cables Staff Hypervisor Social Networking Legislation Public Speaking Shopping Fileless Malware Tablet Optimization PowerPoint Google Apps Lithium-ion battery Wearable Technology Hacks Scary Stories Entrepreneur Content Alert Employer/Employee Relationships IT Maintenance Health IT File Sharing Business Intelligence Motherboard Dark Data Navigation Comparison Fun Managed IT PCI DSS Gig Economy Directions Assessment How To Shortcuts Permissions Deep Learning Ransmoware Undo Internet Service Provider Notifications Teamwork Travel Vendors Evernote Specifications Education Regulations Compliance Techology Microchip Google Maps Memes Internet Exlporer Be Proactive Fraud Workforce Mobile Computing Net Neutrality Username SQL Server Unified Threat Management History Threats Black Friday Search Financial Data Unified Threat Management Smartwatch Application IT Database Workplace Strategies Best Practice Meta IT Technicians Buisness Procurement Azure Proxy Server Cyber security Amazon Cookies Network Congestion Legal Tech Cyber Monday IT solutions IBM Telework User Error CES Communitications Tactics Hotspot Business Growth Outsource IT Mirgation Supply Chain Management Point of Sale Environment Nanotechnology Term Media Cortana FinTech IT Assessment Addiction Language Alt Codes Small Businesses Chatbots Downtime Competition Network Management Flexibility Management Tech Support Value

Blog Archive