Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Backup Quick Tips Saving Money Communication Cybersecurity Productivity Managed Service Smartphone Data Backup Android Upgrade AI VoIP Business Management Smartphones Data Recovery communications Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Tech Term Internet of Things Artificial Intelligence Facebook Automation Information Covid-19 Cloud Computing Miscellaneous Gadgets Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Business Technology Vendor Mobile Office Data Security Apps Two-factor Authentication Chrome Budget Mobile Device Management Networking Gmail Apple App BYOD Managed Services Voice over Internet Protocol Employer-Employee Relationship Tip of the week Avoiding Downtime Applications Marketing How To BDR Conferencing WiFi Computing Information Technology Access Control Hacker Office 365 HIPAA Analytics Office Tips Router Retail Augmented Reality Website Storage Managed IT Services Password Bring Your Own Device Help Desk Big Data Operating System Healthcare Virtual Private Network Risk Management Health 2FA Computers Solutions Scam Data loss Monitoring Firewall Patch Management Save Money Remote Monitoring The Internet of Things End of Support Vulnerability Vendor Management Going Green Telephone Social Physical Security Remote Workers Display Cybercrime Cooperation Printer Windows 11 Paperless Office Infrastructure Free Resource Customer Service Project Management Windows 7 Excel Document Management Microsoft 365 Outlook Maintenance Money Humor Antivirus User Tip Modem Processor Mobile Security Employees Integration Word Sports Data Privacy Mouse Smart Technology Holidays Administration Data Storage Saving Time Safety Robot Video Conferencing Managed IT Service Managed Services Provider Virtual Machines Professional Services Downloads IT Management VPN Settings Meetings Wireless Licensing Printing Content Filtering Entertainment YouTube iPhone Computer Repair Customer Relationship Management Cryptocurrency Vulnerabilities Telephone System Cost Management Hacking Supply Chain Virtual Desktop Presentation Images 101 Data storage LiFi Machine Learning Mobility Multi-Factor Authentication Wireless Technology Specifications Remote Working Server Management Paperless Memory Private Cloud IP Address Google Play Internet Exlporer Fraud Superfish Co-managed IT Data Breach Halloween Identity Theft Microchip Electronic Health Records Twitter Username Videos Technology Care Recovery Black Friday Business Communications Wasting Time Error Security Cameras Social Engineering Database Hard Drives Hacks Scams Trend Micro Scary Stories Hybrid Work Software as a Service Fun Remote Computing Domains IT Technicians Cookies Cyber Monday Deep Learning Human Resources Managing Costs Proxy Server SSID Tactics Refrigeration Hotspot Cables eCommerce Tablet Surveillance Education Virtual Assistant Alert Public Speaking Mirgation Nanotechnology Managed IT Google Apps Virtual Machine File Sharing Lithium-ion battery Dark Data Medical IT How To Addiction Language Entrepreneur Reviews Mobile Computing IT Maintenance Business Intelligence Development Transportation Search Notifications Management Chatbots Screen Reader Distributed Denial of Service Best Practice Shortcuts Hypervisor Travel Optimization Buisness Google Maps PowerPoint Service Level Agreement Undo Computing Infrastructure Shopping Techology Ransmoware Legal Vendors IT solutions Employer/Employee Relationships Identity Navigation Smart Tech PCI DSS Business Growth Be Proactive Unified Threat Management Bookmark Download Alerts Gig Economy Unified Threat Management Workforce Threats Internet Service Provider Teamwork Cortana Evernote Network Congestion Connectivity Application Break Fix Regulations Compliance Alt Codes Workplace Strategies Browsers Memes Downtime Upload User Error Meta Multi-Factor Security Amazon Net Neutrality Hosted Solution SQL Server Social Network IBM IoT Dark Web Financial Data Typing History Point of Sale IT Trends Smartwatch Outsource IT Google Drive Google Calendar Environment Procurement Network Management Media Azure Knowledge Tech Support Customer Resource management Regulations Tech Monitors Star Wars Microsoft Excel Telework Cyber security Data Analysis Communitications 5G Gamification Competition Staff CES Small Businesses Google Docs Legislation Displays Supply Chain Management Unified Communications Experience Websites Social Networking Term FinTech Bitcoin Running Cable Fileless Malware IT Assessment Electronic Medical Records Content Wearable Technology Google Wallet SharePoint Outsourcing User Comparison Flexibility Value Health IT Motherboard Writing Assessment Permissions Organization Windows 8 Lenovo Workplace Laptop Directions Smart Devices Virtual Reality Digital Security Cameras Drones Hiring/Firing

Blog Archive