Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Data Backup Smartphone Managed Service Android Upgrade AI Business Management VoIP Smartphones Data Recovery Mobile Devices communications Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Internet of Things Tech Term Information Automation Artificial Intelligence Facebook Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Bandwidth Virtualization Wi-Fi Blockchain Vendor Apps Data Security Mobile Office Two-factor Authentication Mobile Device Management Chrome Gmail Tip of the week Budget Apple Networking Employer-Employee Relationship App Managed Services Voice over Internet Protocol BYOD Office 365 HIPAA Access Control Applications WiFi How To Conferencing BDR Hacker Computing Avoiding Downtime Information Technology Marketing 2FA Health Analytics Office Tips Router Augmented Reality Storage Retail Password Bring Your Own Device Help Desk Big Data Managed IT Services Computers Operating System Healthcare Risk Management Website Virtual Private Network Paperless Office Infrastructure Microsoft 365 Firewall Excel Solutions Document Management The Internet of Things Monitoring Social Scam Data loss Going Green Telephone Customer Service Patch Management Save Money Remote Workers Remote Monitoring End of Support Vulnerability Cybercrime Vendor Management Cooperation Physical Security Free Resource Display Project Management Windows 11 Windows 7 Printer Mobility Multi-Factor Authentication Supply Chain Outlook Money Humor User Tip Machine Learning Modem Safety Mobile Security Employees Processor Integration Sports Mouse Maintenance Smart Technology Antivirus Holidays Administration Data Storage Saving Time Data Privacy Video Conferencing Customer Relationship Management Managed IT Service Managed Services Provider Virtual Machines Professional Services Downloads Robot Settings Wireless Licensing Hacking Printing Content Filtering Presentation Entertainment YouTube iPhone IT Management Wireless Technology VPN Cryptocurrency Meetings Vulnerabilities Telephone System Cost Management Virtual Desktop Computer Repair Images 101 Word Data storage LiFi Assessment Monitors Permissions Organization Windows 8 Directions Displays Laptop Drones Smart Devices Refrigeration Digital Security Cameras Specifications Remote Working Outsourcing Websites Memory Public Speaking Halloween Internet Exlporer Lithium-ion battery Google Play Fraud Microchip Data Breach Electronic Health Records Username Workplace Electronic Medical Records Entrepreneur SharePoint Videos Black Friday Hiring/Firing Wasting Time Scary Stories Database Paperless Writing Security Cameras Lenovo Hacks Trend Micro Software as a Service Co-managed IT Virtual Reality Fun IT Technicians Undo Cyber Monday Server Management Deep Learning Proxy Server Technology Care Private Cloud Managing Costs Cookies Tactics Business Communications SSID Hotspot Superfish Identity Theft eCommerce Surveillance Education Scams Twitter Virtual Assistant Mirgation Hybrid Work Error Virtual Machine Nanotechnology Addiction Human Resources Social Engineering Medical IT Language Application Reviews Mobile Computing Development Management Cables Remote Computing Transportation Search Chatbots Distributed Denial of Service Best Practice Hypervisor Screen Reader IBM Optimization Buisness Service Level Agreement Google Apps PowerPoint Computing Infrastructure Shopping Tablet Legal IT solutions IT Maintenance Alert Employer/Employee Relationships Identity Navigation Managed IT PCI DSS Business Growth Bookmark Business Intelligence File Sharing Smart Tech Dark Data Download Shortcuts How To Alerts Gig Economy Internet Service Provider Ransmoware Notifications Teamwork Cortana Competition Evernote Break Fix Regulations Compliance Alt Codes Browsers Vendors Travel Connectivity Google Maps Memes Downtime Upload Be Proactive Techology Net Neutrality Hosted Solution Social Network Workforce SQL Server Multi-Factor Security Dark Web User Financial Data Typing Threats Unified Threat Management History IoT IT Trends Workplace Strategies Unified Threat Management Smartwatch Google Drive Procurement Customer Resource management Meta Azure Knowledge Regulations Google Calendar Network Congestion IP Address Tech Microsoft Excel Telework Data Analysis Amazon Cyber security Star Wars Communitications Gamification 5G Staff User Error CES Google Docs Supply Chain Management Unified Communications Outsource IT Experience Social Networking Legislation Media Term Recovery FinTech Bitcoin Fileless Malware Environment Point of Sale Running Cable IT Assessment Content Wearable Technology Hard Drives Google Wallet Network Management Flexibility Health IT Small Businesses Tech Support Value Motherboard Domains Comparison

Blog Archive