Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Quick Tips Passwords Backup Communication Cybersecurity Saving Money Productivity Smartphone Managed Service Data Backup Android Upgrade Business Management AI VoIP Smartphones Mobile Devices communications Data Recovery Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Remote Tech Term Internet of Things Facebook Automation Artificial Intelligence Information Cloud Computing Miscellaneous Covid-19 Gadgets Holiday Training Remote Work Server Managed Service Provider Compliance Outsourced IT Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Mobile Device Management Networking Chrome Gmail Budget Applications WiFi Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing Office 365 How To BDR HIPAA Router Storage Password Bring Your Own Device Big Data Virtual Private Network Help Desk Health Operating System Computers Risk Management Retail Website Healthcare Office Tips Analytics Managed IT Services 2FA Augmented Reality Patch Management Windows 7 Save Money The Internet of Things Remote Monitoring Vulnerability Microsoft 365 End of Support Vendor Management Social Solutions Physical Security Monitoring Display Going Green Printer Paperless Office Infrastructure Customer Service Cybercrime Telephone Document Management Cooperation Remote Workers Scam Data loss Windows 11 Firewall Free Resource Project Management Excel Images 101 Robot Safety Sports Multi-Factor Authentication Mobility Mouse User Tip Modem Mobile Security Processor IT Management Administration VPN Meetings Employees Integration Smart Technology Computer Repair Data Privacy Customer Relationship Management Settings Saving Time Printing Wireless Content Filtering Holidays Hacking Managed IT Service Presentation YouTube Data Storage Machine Learning Downloads Cryptocurrency Video Conferencing Managed Services Provider Licensing Wireless Technology Virtual Machines Professional Services Entertainment Virtual Desktop Maintenance Antivirus Data storage LiFi Word Telephone System iPhone Outlook Cost Management Money Supply Chain Vulnerabilities Humor IT Assessment Travel Workplace Specifications Deep Learning Undo Techology Microchip Flexibility Google Maps Internet Exlporer Hiring/Firing Value Fraud Username Paperless Education Organization Digital Security Cameras Smart Devices Unified Threat Management Co-managed IT Black Friday Mobile Computing Unified Threat Management Remote Working Database Technology Care Memory Data Breach IT Technicians Business Communications Google Play Search Application Videos Proxy Server Electronic Health Records Cookies Scams Network Congestion Cyber Monday Best Practice Hotspot Buisness User Error Tactics Hybrid Work Wasting Time Trend Micro Mirgation Human Resources Security Cameras Legal IBM IT solutions Business Growth Software as a Service Point of Sale Nanotechnology Cables Language Addiction Managing Costs Cortana Network Management Management eCommerce Tech Support Chatbots Google Apps SSID Alt Codes Surveillance Screen Reader IT Maintenance Virtual Assistant Monitors Distributed Denial of Service Business Intelligence Virtual Machine Computing Infrastructure Competition Downtime Service Level Agreement Reviews Websites Identity Shortcuts Medical IT Hosted Solution Typing Bookmark Development Smart Tech Ransmoware Transportation Vendors Hypervisor Electronic Medical Records Alerts SharePoint Download Shopping Knowledge Optimization Be Proactive PowerPoint Google Drive User Lenovo Browsers Connectivity Workforce Employer/Employee Relationships Writing Break Fix Threats Virtual Reality Navigation PCI DSS 5G Upload Gig Economy Experience Server Management Social Network Private Cloud Workplace Strategies Google Docs Multi-Factor Security IP Address Unified Communications Bitcoin Running Cable Superfish Internet Service Provider Identity Theft IoT Meta Teamwork Dark Web Amazon Twitter Evernote Google Wallet Regulations Compliance Trends Recovery Customer Resource management Memes Error Regulations Google Calendar Windows 8 Hard Drives Laptop Data Analysis Net Neutrality Star Wars Outsource IT SQL Server Social Engineering Microsoft Excel Environment History Remote Computing Staff Media Drones Domains Financial Data Gamification Smartwatch IT Social Networking Legislation Refrigeration Halloween Fileless Malware Procurement Tablet Small Businesses Azure Displays Cyber security Alert Wearable Technology Tech Public Speaking Telework Content CES Managed IT Health IT Communitications File Sharing Motherboard Dark Data Comparison Lithium-ion battery Hacks Scary Stories Directions Entrepreneur Supply Chain Management Assessment Outsourcing How To Permissions Notifications Term FinTech Fun

Blog Archive