Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Users Backup Small Business Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Saving Money Quick Tips Communication AI Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Managed IT Services Microsoft Office Network Current Events Tech Term Internet of Things Remote Automation Artificial Intelligence Information Facebook Holiday Miscellaneous Compliance Covid-19 Cloud Computing Training Gadgets Server Outsourced IT Managed Service Provider Remote Work IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Data Management Government Business Technology Blockchain Bandwidth Windows 10 Virtualization Wi-Fi Two-factor Authentication Apps Mobile Office Vendor Data Security Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Mobile Device Management App Gmail BYOD WiFi Managed Services Voice over Internet Protocol Access Control Office 365 Hacker Avoiding Downtime Marketing HIPAA How To Applications BDR Computing Conferencing Information Technology Health Analytics Office Tips Augmented Reality Computers Retail Storage Password Website Bring Your Own Device Router Managed IT Services 2FA Help Desk Operating System Physical Security Big Data Virtual Private Network Risk Management Healthcare Paperless Office Infrastructure Customer Service Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Solutions Scam Data loss Firewall Windows 11 Going Green Patch Management Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management The Internet of Things Excel Cybercrime Social Managed IT Service Remote Workers Display Printer Telephone iPhone Virtual Desktop LiFi Customer Relationship Management Licensing Data storage Vulnerabilities Entertainment Data Privacy Outlook Hacking Machine Learning Presentation Money Images 101 Humor Mobility Telephone System Multi-Factor Authentication Cost Management Wireless Technology Maintenance Antivirus Sports Mouse Employees Integration Word Administration User Tip Modem Mobile Security Processor Robot Holidays Settings Data Storage Safety Smart Technology Supply Chain Printing Wireless Content Filtering Video Conferencing IT Management Managed Services Provider Virtual Machines Professional Services VPN YouTube Meetings Saving Time Cryptocurrency Computer Repair Downloads Monitors Connectivity IT Break Fix Scams Google Wallet Browsers Smartwatch Upload Procurement Azure Hybrid Work Multi-Factor Security Tech Human Resources Windows 8 Laptop Websites Social Network Telework Cyber security IoT Communitications Competition Dark Web Cables Drones CES Electronic Medical Records Trends Supply Chain Management SharePoint Google Calendar Term Google Apps Halloween Customer Resource management FinTech Regulations Writing Star Wars IT Assessment Microsoft Excel IT Maintenance Lenovo Data Analysis Virtual Reality Gamification Flexibility Staff Value Business Intelligence User Legislation Shortcuts Hacks Server Management Scary Stories Private Cloud Organization Social Networking Fun Smart Devices Ransmoware Superfish Identity Theft Fileless Malware Digital Security Cameras Deep Learning Twitter Content Remote Working IP Address Wearable Technology Memory Vendors Comparison Google Play Be Proactive Error Health IT Motherboard Data Breach Social Engineering Assessment Electronic Health Records Permissions Workforce Education Directions Videos Remote Computing Wasting Time Threats Recovery Hard Drives Specifications Security Cameras Workplace Strategies Mobile Computing Trend Micro Search Internet Exlporer Software as a Service Domains Fraud Meta Tablet Microchip Best Practice Alert Username Managing Costs Amazon Refrigeration Black Friday SSID Managed IT Buisness File Sharing Dark Data eCommerce How To Database Surveillance Public Speaking Virtual Assistant Outsource IT Legal IT solutions Business Growth Notifications Lithium-ion battery IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT Entrepreneur Travel Proxy Server Reviews Cookies Cortana Tactics Development Hotspot Transportation Small Businesses Techology Google Maps Alt Codes Mirgation Hypervisor Displays Nanotechnology Optimization Undo PowerPoint Downtime Unified Threat Management Shopping Addiction Language Employer/Employee Relationships Outsourcing Unified Threat Management Hosted Solution Navigation Typing Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Gig Economy Network Congestion Knowledge Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Google Drive User Error Application Evernote Paperless Regulations Compliance Identity Smart Tech Memes Co-managed IT Point of Sale Bookmark 5G Unified Communications Experience Download Net Neutrality IBM Alerts SQL Server Technology Care Google Docs Business Communications Bitcoin Network Management Running Cable Tech Support Financial Data History

Blog Archive