Voyage Technology Blog

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Will the Surface Book Be Microsoft’s “MacBook Killer?” [Video]

b2ap3_thumbnail_the_surface_book_400.jpgOne of the most storied competitions in the technology industry comes from Apple vs Microsoft. For the past 35 years, they went back and forth by offering consumers their own twist on similar technologies. The latest chapter in this story comes from Microsoft’s new Surface Book, which aims to compete directly with Apple’s MacBook Pro.

Continue reading
0 Comments

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Quick Tips Passwords Saving Money Communication Cybersecurity Smartphone Managed Service Data Backup Android Upgrade AI Business Management VoIP Smartphones Data Recovery Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Artificial Intelligence Information Facebook Miscellaneous Automation Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Government Data Management Business Continuity Blockchain Windows 10 Bandwidth Virtualization Business Technology Wi-Fi Vendor Apps Two-factor Authentication Mobile Office Data Security Chrome Gmail Budget BYOD Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management HIPAA WiFi Applications Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime Marketing How To Office 365 BDR Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network Big Data Health 2FA Help Desk Operating System Computers Retail Healthcare Risk Management Website Managed IT Services Analytics Office Tips Firewall Patch Management Microsoft 365 Save Money Remote Monitoring End of Support Vulnerability Solutions Vendor Management The Internet of Things Physical Security Display Social Printer Windows 11 Paperless Office Infrastructure Monitoring Going Green Excel Document Management Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Mobility Robot Telephone System Multi-Factor Authentication Money Cost Management Humor Safety IT Management Sports Employees VPN Meetings Mouse Integration Administration User Tip Modem Mobile Security Computer Repair Processor Holidays Data Storage Smart Technology Supply Chain Customer Relationship Management Video Conferencing Settings Wireless Managed Services Provider Machine Learning Printing Professional Services Content Filtering Saving Time Virtual Machines Hacking Presentation YouTube Managed IT Service Maintenance Cryptocurrency Antivirus Wireless Technology Downloads iPhone Licensing Virtual Desktop Data storage Vulnerabilities LiFi Entertainment Data Privacy Word Outlook Images 101 Legislation Shortcuts Organization Social Networking Travel Public Speaking Smart Devices Google Maps Lithium-ion battery Ransmoware Fileless Malware Digital Security Cameras Techology Content Remote Working Wearable Technology Memory Vendors Hacks Entrepreneur Scary Stories Comparison Google Play Be Proactive Fun Health IT Motherboard Data Breach Unified Threat Management Assessment Electronic Health Records Permissions Workforce Deep Learning Directions Videos Unified Threat Management Wasting Time Threats Undo Specifications Security Cameras Workplace Strategies Network Congestion Education Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip User Error Username Managing Costs Amazon Mobile Computing Black Friday SSID Search eCommerce Point of Sale Database Surveillance Virtual Assistant Outsource IT Application Best Practice Network Management IT Technicians Virtual Machine Environment Tech Support Media Buisness Cyber Monday Medical IT Monitors IT solutions Proxy Server Reviews Cookies IBM Legal Tactics Development Hotspot Transportation Small Businesses Business Growth Mirgation Hypervisor Displays Websites PowerPoint Cortana Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Electronic Medical Records Alt Codes SharePoint Management PCI DSS Chatbots Competition Navigation Downtime Distributed Denial of Service Workplace Writing Hosted Solution Gig Economy Lenovo Screen Reader Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Virtual Reality Typing Regulations Compliance Server Management Identity Private Cloud Evernote Paperless Co-managed IT User Knowledge Bookmark Superfish Smart Tech Memes Identity Theft Google Drive Download Net Neutrality Alerts SQL Server Technology Care Twitter 5G Financial Data History Error Business Communications Google Docs Break Fix Scams Social Engineering Unified Communications Experience Browsers Smartwatch Connectivity IT IP Address Upload Procurement Azure Hybrid Work Remote Computing Bitcoin Running Cable Social Network Telework Cyber security Google Wallet Tech Human Resources Multi-Factor Security IoT Communitications Tablet Dark Web Cables Recovery CES Trends Supply Chain Management Alert Hard Drives Windows 8 Laptop Google Calendar Term Google Apps Dark Data Customer Resource management FinTech Managed IT Regulations File Sharing Domains Drones Star Wars IT Assessment Microsoft Excel IT Maintenance How To Data Analysis Gamification Flexibility Staff Value Business Intelligence Notifications Refrigeration Halloween

Blog Archive