Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Saving Money Communication Productivity Cybersecurity Data Backup Smartphone Managed Service Android Upgrade VoIP Business Management Smartphones AI communications Data Recovery Mobile Devices Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Remote Internet of Things Tech Term Information Automation Facebook Artificial Intelligence Holiday Training Miscellaneous Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Data Management Government Blockchain Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Data Security Apps Apple Mobile Device Management Tip of the week App Gmail Managed Services Voice over Internet Protocol Networking Employer-Employee Relationship Chrome BYOD Budget Avoiding Downtime Marketing Access Control HIPAA Applications WiFi Computing Information Technology How To Conferencing BDR Office 365 Hacker Storage Virtual Private Network Password Website Bring Your Own Device Health Router Retail Operating System Healthcare 2FA Help Desk Big Data Risk Management Managed IT Services Analytics Office Tips Computers Augmented Reality Display Printer Paperless Office Infrastructure Firewall Going Green Document Management Remote Workers Windows 11 The Internet of Things Cybercrime Scam Monitoring Data loss Social Excel Free Resource Project Management Windows 7 Patch Management Telephone Save Money Microsoft 365 Customer Service Remote Monitoring Vulnerability End of Support Vendor Management Solutions Cooperation Physical Security Sports Telephone System Mouse Computer Repair Cost Management Holidays Word Administration Data Storage Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services User Tip Modem Processor Safety Mobile Security Settings Wireless Printing Content Filtering Maintenance Antivirus YouTube iPhone Smart Technology Supply Chain Cryptocurrency Vulnerabilities Saving Time Images 101 Virtual Desktop LiFi Managed IT Service Data storage Customer Relationship Management Multi-Factor Authentication Robot Mobility Downloads Outlook Hacking Licensing Money Presentation Entertainment Humor IT Management VPN Employees Meetings Data Privacy Integration Wireless Technology IP Address Star Wars Deep Learning Managing Costs Microsoft Excel IT Maintenance Data Analysis Gamification Point of Sale eCommerce Staff Business Intelligence SSID Virtual Assistant Legislation Shortcuts Surveillance Social Networking Education Tech Support Virtual Machine Recovery Ransmoware Fileless Malware Network Management Reviews Content Mobile Computing Hard Drives Wearable Technology Monitors Vendors Medical IT Transportation Comparison Search Be Proactive Health IT Development Domains Motherboard Assessment Best Practice Websites Hypervisor Permissions Workforce Directions Shopping Optimization Refrigeration Buisness Threats PowerPoint Employer/Employee Relationships Specifications Workplace Strategies SharePoint Legal Public Speaking IT solutions Electronic Medical Records PCI DSS Lithium-ion battery Internet Exlporer Business Growth Fraud Meta Navigation Microchip Lenovo Gig Economy Username Writing Amazon Entrepreneur Virtual Reality Teamwork Black Friday Cortana Internet Service Provider Server Management Regulations Compliance Database Alt Codes Private Cloud Outsource IT Evernote Media Superfish Identity Theft Memes Undo IT Technicians Downtime Environment Cookies Hosted Solution Twitter SQL Server Cyber Monday Proxy Server Net Neutrality Financial Data Tactics Typing Error History Hotspot Small Businesses Smartwatch IT Mirgation Social Engineering Displays Nanotechnology Remote Computing Azure Knowledge Google Drive Procurement Telework Addiction Cyber security Application Language Outsourcing Tech 5G CES Management Tablet Communitications Chatbots Screen Reader Unified Communications Alert Distributed Denial of Service Experience Workplace Google Docs Supply Chain Management IBM Managed IT FinTech Service Level Agreement Bitcoin File Sharing Computing Infrastructure Running Cable Dark Data Hiring/Firing Term Paperless Google Wallet IT Assessment Identity How To Smart Tech Notifications Value Co-managed IT Bookmark Flexibility Organization Download Windows 8 Travel Alerts Laptop Technology Care Business Communications Techology Digital Security Cameras Drones Google Maps Smart Devices Competition Connectivity Memory Break Fix Scams Browsers Remote Working Upload Unified Threat Management Data Breach Halloween Hybrid Work Google Play Multi-Factor Security Human Resources Unified Threat Management Videos Social Network Electronic Health Records IoT Wasting Time User Dark Web Cables Trends Hacks Trend Micro Scary Stories Network Congestion Security Cameras Google Calendar Fun Google Apps User Error Customer Resource management Software as a Service Regulations

Blog Archive