Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Passwords Quick Tips Backup Productivity Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Smartphones AI VoIP Business Management Mobile Devices Data Recovery communications Windows Disaster Recovery Social Media Browser Microsoft Office Managed IT Services Current Events Network Internet of Things Remote Tech Term Artificial Intelligence Information Automation Facebook Gadgets Covid-19 Cloud Computing Holiday Training Miscellaneous Server Remote Work Managed Service Provider Compliance Outsourced IT Spam IT Support Employee/Employer Relationship Encryption Office Windows 10 Business Continuity Government Data Management Blockchain Bandwidth Windows 10 Business Technology Wi-Fi Virtualization Two-factor Authentication Apps Data Security Vendor Mobile Office Employer-Employee Relationship Networking Chrome Budget BYOD Apple Mobile Device Management App Gmail Tip of the week Managed Services Voice over Internet Protocol Office 365 How To BDR Hacker Avoiding Downtime HIPAA Marketing Applications Access Control Computing WiFi Conferencing Information Technology Office Tips Analytics Managed IT Services Augmented Reality Computers Storage Password Bring Your Own Device Website Router Virtual Private Network 2FA Health Help Desk Operating System Big Data Risk Management Retail Healthcare Scam Data loss Cooperation Free Resource Project Management Windows 7 Customer Service Microsoft 365 Patch Management Save Money Remote Monitoring Solutions Vulnerability End of Support Vendor Management Physical Security Display Going Green Firewall Printer Windows 11 Monitoring Paperless Office Infrastructure Cybercrime Excel The Internet of Things Document Management Remote Workers Social Telephone Maintenance iPhone Virtual Desktop Licensing Antivirus Data storage LiFi Vulnerabilities Entertainment Customer Relationship Management Data Privacy Outlook Money Images 101 Hacking Humor Mobility Telephone System Presentation Multi-Factor Authentication Cost Management Robot Wireless Technology Sports Mouse Employees IT Management Integration Administration VPN Meetings User Tip Modem Word Mobile Security Processor Computer Repair Holidays Settings Data Storage Printing Supply Chain Wireless Smart Technology Content Filtering Video Conferencing Safety Managed Services Provider Professional Services Saving Time YouTube Virtual Machines Machine Learning Cryptocurrency Managed IT Service Downloads Twitter Google Wallet Browsers IBM Connectivity Smartwatch Scams Break Fix IT Hybrid Work Procurement Azure Error Upload Social Engineering Windows 8 Social Network Laptop Telework Human Resources Multi-Factor Security Cyber security Tech Communitications Remote Computing Drones IoT CES Cables Dark Web Trends Supply Chain Management Term Customer Resource management Competition Halloween Regulations FinTech Google Apps Google Calendar Tablet Microsoft Excel IT Assessment Alert Data Analysis Star Wars IT Maintenance Gamification Business Intelligence Staff Flexibility Managed IT Value File Sharing Dark Data How To Hacks Scary Stories Social Networking Organization Shortcuts Legislation Smart Devices Notifications Fileless Malware Digital Security Cameras User Ransmoware Fun Content Vendors Wearable Technology Remote Working Memory Travel Deep Learning Google Play Health IT Motherboard Techology Be Proactive Comparison Data Breach Google Maps Permissions Electronic Health Records Directions IP Address Education Assessment Videos Workforce Threats Wasting Time Unified Threat Management Security Cameras Mobile Computing Unified Threat Management Workplace Strategies Specifications Trend Micro Fraud Software as a Service Microchip Internet Exlporer Recovery Meta Search Username Hard Drives Amazon Managing Costs Network Congestion Best Practice SSID Domains Buisness User Error Black Friday eCommerce Surveillance Virtual Assistant Legal IT solutions Database Outsource IT Refrigeration Environment IT Technicians Media Virtual Machine Point of Sale Business Growth Medical IT Proxy Server Public Speaking Cookies Reviews Cyber Monday Hotspot Development Network Management Transportation Tech Support Lithium-ion battery Tactics Small Businesses Cortana Alt Codes Displays Mirgation Entrepreneur Hypervisor Monitors PowerPoint Downtime Nanotechnology Shopping Optimization Outsourcing Language Employer/Employee Relationships Websites Hosted Solution Addiction Typing Management Undo Chatbots PCI DSS Navigation Electronic Medical Records Screen Reader Gig Economy SharePoint Workplace Distributed Denial of Service Hiring/Firing Knowledge Computing Infrastructure Internet Service Provider Teamwork Google Drive Service Level Agreement Identity Regulations Compliance Lenovo Paperless Evernote Writing Virtual Reality Bookmark Smart Tech Co-managed IT 5G Memes Application Technology Care Experience Alerts Net Neutrality Server Management SQL Server Private Cloud Google Docs Unified Communications Download Bitcoin Running Cable Financial Data Superfish Business Communications History Identity Theft

Blog Archive