Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Microsoft Mobile Device Small Business Productivity Passwords Backup Quick Tips Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade Business Management VoIP Smartphones AI Mobile Devices communications Data Recovery Windows Disaster Recovery Browser Social Media Managed IT Services Microsoft Office Current Events Network Internet of Things Tech Term Remote Facebook Automation Artificial Intelligence Information Miscellaneous Gadgets Covid-19 Cloud Computing Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Windows 10 Office Government Business Continuity Data Management Virtualization Business Technology Wi-Fi Bandwidth Blockchain Windows 10 Vendor Apps Data Security Two-factor Authentication Mobile Office Apple Tip of the week App Employer-Employee Relationship Networking Chrome Mobile Device Management BYOD Budget Gmail Managed Services Voice over Internet Protocol Access Control WiFi Applications Computing Conferencing Information Technology Hacker How To Avoiding Downtime BDR Office 365 Marketing HIPAA Router Health Healthcare Big Data Help Desk Retail Operating System 2FA Computers Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Storage Virtual Private Network Password Bring Your Own Device The Internet of Things Paperless Office Infrastructure Social Document Management Free Resource Going Green Project Management Windows 11 Windows 7 Monitoring Microsoft 365 Cybercrime Customer Service Scam Excel Data loss Solutions Telephone Patch Management Save Money Remote Monitoring Cooperation Vulnerability End of Support Vendor Management Firewall Physical Security Display Printer Remote Workers Administration iPhone Modem User Tip Processor Mobile Security Machine Learning Vulnerabilities Images 101 Settings Customer Relationship Management Wireless Smart Technology Printing Multi-Factor Authentication Mobility Content Filtering Maintenance Supply Chain Antivirus Saving Time YouTube Hacking Presentation Cryptocurrency Managed IT Service Employees Wireless Technology Downloads Integration Virtual Desktop Data storage LiFi Licensing Robot Entertainment Holidays Outlook Word Money Data Privacy Data Storage IT Management Humor VPN Video Conferencing Meetings Telephone System Cost Management Managed Services Provider Virtual Machines Professional Services Sports Computer Repair Mouse Safety Workforce Specifications Net Neutrality SQL Server Monitors Mobile Computing History Microchip Internet Exlporer Threats Search Fraud Financial Data Smartwatch IT Websites Best Practice Username Workplace Strategies Buisness Meta Black Friday Procurement Azure Cyber security Electronic Medical Records Legal Tech IT solutions Database Amazon SharePoint Telework Application CES Communitications Business Growth IT Technicians Cookies Outsource IT IBM Lenovo Cyber Monday Supply Chain Management Writing Proxy Server Virtual Reality Term Tactics Environment Cortana Hotspot Media FinTech Server Management IT Assessment Private Cloud Alt Codes Mirgation Downtime Nanotechnology Small Businesses Superfish Flexibility Identity Theft Value Twitter Hosted Solution Addiction Displays Language Organization Chatbots Digital Security Cameras Competition Smart Devices Error Typing Management Screen Reader Outsourcing Distributed Denial of Service Remote Working Memory Social Engineering Data Breach Remote Computing Google Drive Google Play Service Level Agreement Knowledge Computing Infrastructure Identity Workplace Videos Electronic Health Records Bookmark Smart Tech Hiring/Firing 5G User Tablet Wasting Time Trend Micro Alert Google Docs Security Cameras Unified Communications Download Experience Alerts Paperless Running Cable Co-managed IT Managed IT Software as a Service File Sharing Dark Data Bitcoin Google Wallet Browsers Connectivity Technology Care IP Address Break Fix Managing Costs How To eCommerce Notifications SSID Upload Business Communications Laptop Scams Multi-Factor Security Surveillance Travel Virtual Assistant Windows 8 Social Network Drones IoT Hybrid Work Techology Dark Web Recovery Google Maps Virtual Machine Medical IT Trends Human Resources Reviews Hard Drives Halloween Regulations Cables Domains Google Calendar Development Unified Threat Management Transportation Customer Resource management Data Analysis Star Wars Unified Threat Management Microsoft Excel Hypervisor Optimization PowerPoint Gamification Staff Google Apps Shopping Refrigeration Scary Stories Social Networking IT Maintenance Public Speaking Legislation Employer/Employee Relationships Network Congestion Hacks Fileless Malware Navigation Business Intelligence Lithium-ion battery User Error Fun PCI DSS Entrepreneur Deep Learning Content Wearable Technology Shortcuts Gig Economy Motherboard Ransmoware Comparison Internet Service Provider Point of Sale Teamwork Health IT Directions Evernote Education Assessment Vendors Permissions Regulations Compliance Undo Network Management Memes Tech Support Be Proactive

Blog Archive