hamburger-nav-icon
region-flag-icon
Search by Category
Audio
AV Produktion
Beleuchtung & Atelier
Computers & Software
Content Management
Displays
Halterungen & Befestigungen
Kameras
Konferenztechnik
Möbel
Präsentation
Schutz & Sicherheit
Signal-Management
Steuerung
Stromversorgung
Transportbehälter
Vernetzung & Kabel
Search by Category
EnglishFrenchGermanItalianPortugueseSpanish
LG Electronics - CBV42-BP

Box Type Zero Client

Model: CBV42-BP

  • HIGH PERFORMANCE VIRTUAL COMPUTING - The CBV42 Series utilizes a Teradici® PCoIP® processor, VMware or Amazon WorkSpaces to deliver a powerful and secure virtual solution that broadens integrated computing beyond design labs, to offices and classrooms.
  • SIX USB 2.0 CONNECTIONS - With zero client devices, connectivity is critical. The CBV42 Series provides multiples ways to connect, including six connections for USB 2.0.
  • LG ZERO CLIENT FLEXIBILITY - Compared to a traditional desktop computing system, the CBV-42 Series allows advanced computing with greater security.
  • LG ZERO CLIENT SECURITY - PCoIP zero clients significantly reduce the risk of virus, spyware, or hacking because all data, storage, and memory are stored at a secure central data center. Data never leaves the data center.
Vergleichen
Projektliste
Produktinformation
Spezifikationen
Dokumente

The CBV42-BP is a Box Type Zero Client.

  • HIGH PERFORMANCE VIRTUAL COMPUTING - The CBV42 Series utilizes a Teradici® PCoIP® processor, VMware or Amazon WorkSpaces to deliver a powerful and secure virtual solution that broadens integrated computing beyond design labs, to offices and classrooms.
  • SIX USB 2.0 CONNECTIONS - With zero client devices, connectivity is critical. The CBV42 Series provides multiples ways to connect, including six connections for USB 2.0.
  • LG ZERO CLIENT FLEXIBILITY - Compared to a traditional desktop computing system, the CBV-42 Series allows advanced computing with greater security.
  • LG ZERO CLIENT SECURITY - PCoIP zero clients significantly reduce the risk of virus, spyware, or hacking because all data, storage, and memory are stored at a secure central data center. Data never leaves the data center.
 
 

Suggested Products