Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Email Workplace Tips Computer Google Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Backup Small Business Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android AI Disaster Recovery Data Recovery Upgrade Business Management Smartphones VoIP communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Miscellaneous Automation Information Artificial Intelligence Training Gadgets Covid-19 Cloud Computing Remote Work Server Managed Service Provider Compliance Outsourced IT IT Support Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Wi-Fi Virtualization Blockchain Business Technology Bandwidth Windows 10 Two-factor Authentication Vendor Apps Mobile Office Data Security WiFi Employer-Employee Relationship Tip of the week Chrome Budget Apple Networking Managed Services App Voice over Internet Protocol Mobile Device Management Gmail BYOD Computing Information Technology Access Control HIPAA Office 365 Applications Hacker Avoiding Downtime How To Marketing BDR Conferencing Virtual Private Network Risk Management Big Data Health Office Tips Router Analytics Augmented Reality Retail Storage Computers Password 2FA Help Desk Bring Your Own Device Managed IT Services Website Healthcare Operating System Cooperation Free Resource Project Management Physical Security The Internet of Things Windows 7 Display Printer Microsoft 365 Social Paperless Office Infrastructure Solutions Document Management Customer Service Windows 11 Scam Monitoring Data loss Excel Remote Workers Going Green Patch Management Save Money Telephone Firewall Remote Monitoring Vulnerability End of Support Vendor Management Cybercrime VPN YouTube Meetings Safety Data Privacy Images 101 Cryptocurrency Telephone System Multi-Factor Authentication Mobility Computer Repair Cost Management Virtual Desktop Data storage LiFi Employees Outlook Machine Learning Customer Relationship Management Integration Money User Tip Modem Humor Processor Mobile Security Hacking Holidays Presentation Maintenance Antivirus Sports Mouse Data Storage Wireless Technology Smart Technology Supply Chain Video Conferencing Managed Services Provider Administration Saving Time Virtual Machines Professional Services Managed IT Service Word Robot Downloads Settings iPhone Printing Wireless Licensing Content Filtering Entertainment Vulnerabilities IT Management Network Congestion Trends Supply Chain Management Regulations Undo Google Drive User Error Google Calendar Term Google Apps Knowledge Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Point of Sale 5G Gamification Flexibility Staff Value Business Intelligence Organization Social Networking Google Docs Legislation Shortcuts Unified Communications Experience Running Cable Tech Support Fileless Malware Digital Security Cameras Smart Devices Ransmoware Bitcoin Network Management Wearable Technology Memory Vendors Application Google Wallet Monitors Content Remote Working Health IT Motherboard Data Breach Comparison Google Play Be Proactive Windows 8 Laptop Websites Directions Videos Assessment Electronic Health Records IBM Permissions Workforce Wasting Time Threats Drones Electronic Medical Records Trend Micro SharePoint Specifications Security Cameras Workplace Strategies Halloween Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Lenovo Writing Username Virtual Reality eCommerce Competition Black Friday SSID Hacks Server Management Scary Stories Private Cloud Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Superfish Media Identity Theft Fun Twitter Proxy Server Reviews Cookies Cyber Monday Medical IT Deep Learning Error Tactics Development Hotspot Transportation Small Businesses User Mirgation Hypervisor Displays Education Social Engineering Remote Computing Shopping Nanotechnology Optimization PowerPoint Mobile Computing Addiction IP Address Language Employer/Employee Relationships Outsourcing Chatbots Navigation Tablet Search Management PCI DSS Alert Gig Economy Screen Reader Distributed Denial of Service Workplace Best Practice Managed IT Buisness File Sharing Dark Data Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Recovery Identity Hard Drives Legal Evernote Paperless IT solutions How To Regulations Compliance Notifications Bookmark Smart Tech Memes Domains Co-managed IT Business Growth Travel Download Net Neutrality Alerts SQL Server Technology Care History Refrigeration Techology Business Communications Google Maps Cortana Financial Data Browsers Smartwatch Connectivity IT Public Speaking Break Fix Scams Alt Codes Downtime Unified Threat Management Upload Procurement Lithium-ion battery Azure Hybrid Work Cyber security Unified Threat Management Multi-Factor Security Tech Human Resources Entrepreneur Hosted Solution Social Network Telework CES IoT Communitications Dark Web Cables Typing

Blog Archive