Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Services IT Support Workplace Tips Privacy Email Computer Phishing Google Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Mobile Device Managed Service Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Data Backup AI Disaster Recovery Data Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Network Current Events Tech Term Remote Internet of Things Holiday Facebook Miscellaneous Information Automation Artificial Intelligence Training Covid-19 Gadgets Cloud Computing Remote Work Server Managed Service Provider Compliance IT Support Outsourced IT Spam Employee/Employer Relationship Encryption Windows 10 Office Business Continuity Government Data Management Blockchain Virtualization Business Technology Bandwidth Windows 10 Wi-Fi Two-factor Authentication Vendor Apps Data Security Mobile Office WiFi Tip of the week Employer-Employee Relationship Chrome Budget Apple Networking Managed Services App Voice over Internet Protocol Mobile Device Management BYOD Gmail Information Technology Access Control HIPAA Office 365 Applications Hacker Avoiding Downtime How To Conferencing BDR Marketing Computing Virtual Private Network Risk Management Big Data Health Office Tips Router Analytics Augmented Reality Retail Storage Password Computers 2FA Help Desk Bring Your Own Device Managed IT Services Website Healthcare Operating System Physical Security Windows 7 Display The Internet of Things Printer Microsoft 365 Paperless Office Infrastructure Solutions Social Document Management Customer Service Windows 11 Monitoring Scam Data loss Excel Remote Workers Going Green Patch Management Telephone Save Money Remote Monitoring Vulnerability End of Support Firewall Vendor Management Cybercrime Cooperation Free Resource Project Management Images 101 Safety Cryptocurrency Telephone System Multi-Factor Authentication Mobility Computer Repair Cost Management Virtual Desktop Data storage LiFi Employees Outlook Integration Machine Learning Money User Tip Customer Relationship Management Humor Modem Mobile Security Processor Holidays Maintenance Hacking Antivirus Sports Data Storage Presentation Mouse Smart Technology Supply Chain Video Conferencing Wireless Technology Managed Services Provider Administration Saving Time Virtual Machines Professional Services Managed IT Service Robot Word Downloads Settings iPhone Printing Licensing Wireless Content Filtering Vulnerabilities Entertainment IT Management VPN Data Privacy YouTube Meetings Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Gamification Flexibility Undo Staff Value Business Intelligence Point of Sale 5G Organization Google Docs Social Networking Unified Communications Legislation Shortcuts Experience Ransmoware Running Cable Tech Support Fileless Malware Digital Security Cameras Smart Devices Bitcoin Network Management Content Remote Working Google Wallet Wearable Technology Memory Vendors Monitors Health IT Motherboard Data Breach Comparison Google Play Be Proactive Windows 8 Permissions Workforce Laptop Websites Directions Videos Assessment Electronic Health Records Application Drones Wasting Time Threats Electronic Medical Records IBM SharePoint Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Halloween Microchip Internet Exlporer Software as a Service Username Lenovo Managing Costs Amazon Writing Virtual Reality eCommerce Black Friday SSID Hacks Server Management Virtual Assistant Outsource IT Scary Stories Private Cloud Database Surveillance Competition Superfish IT Technicians Virtual Machine Environment Identity Theft Media Fun Twitter Proxy Server Reviews Cookies Deep Learning Cyber Monday Medical IT Hotspot Transportation Small Businesses Error Tactics Development Mirgation Hypervisor Displays Education Social Engineering Remote Computing Shopping Nanotechnology Optimization User PowerPoint Mobile Computing Language Employer/Employee Relationships Outsourcing Addiction Management PCI DSS Chatbots Tablet Navigation Search Alert Gig Economy IP Address Screen Reader Best Practice Distributed Denial of Service Workplace Managed IT Computing Infrastructure Teamwork Hiring/Firing Buisness File Sharing Dark Data Service Level Agreement Internet Service Provider Regulations Compliance Legal Identity IT solutions Evernote Paperless How To Notifications Bookmark Smart Tech Memes Recovery Business Growth Co-managed IT Hard Drives Alerts SQL Server Technology Care Travel Download Net Neutrality Financial Data Domains Techology History Google Maps Business Communications Cortana Browsers Smartwatch Connectivity IT Alt Codes Break Fix Scams Upload Procurement Refrigeration Azure Hybrid Work Downtime Unified Threat Management Social Network Telework Public Speaking Unified Threat Management Cyber security Hosted Solution Multi-Factor Security Tech Human Resources Dark Web Cables CES Lithium-ion battery IoT Communitications Typing Trends Supply Chain Management Entrepreneur Network Congestion Customer Resource management FinTech Google Drive User Error Regulations Google Calendar Term Google Apps Knowledge

Blog Archive