hamburger-nav-icon
region-flag-icon
Search by Category
Audio
Cameras
Cases & Bags
Computers & Software
Conferencing
Content Management
Control
Displays
Furniture
Home Technology/Automation
Lighting & Studio
Mounts & Rigging
Networking & Cabling
Power
Presentation
Production & Lighting
Security & Safety
Signal Management
Search by Category
Flag
EnglishFrenchGermanItalianPortugueseSpanish
LG Electronics - CBV42-BP

Box Type Zero Client

Model: CBV42-BP

  • HIGH PERFORMANCE VIRTUAL COMPUTING - The CBV42 Series utilizes a Teradici® PCoIP® processor, VMware or Amazon WorkSpaces to deliver a powerful and secure virtual solution that broadens integrated computing beyond design labs, to offices and classrooms.
  • SIX USB 2.0 CONNECTIONS - With zero client devices, connectivity is critical. The CBV42 Series provides multiples ways to connect, including six connections for USB 2.0.
  • LG ZERO CLIENT FLEXIBILITY - Compared to a traditional desktop computing system, the CBV-42 Series allows advanced computing with greater security.
  • LG ZERO CLIENT SECURITY - PCoIP zero clients significantly reduce the risk of virus, spyware, or hacking because all data, storage, and memory are stored at a secure central data center. Data never leaves the data center.
Compare
Project List
Product Info
Tech Specs
Documents

The CBV42-BP is a Box Type Zero Client.

  • HIGH PERFORMANCE VIRTUAL COMPUTING - The CBV42 Series utilizes a Teradici® PCoIP® processor, VMware or Amazon WorkSpaces to deliver a powerful and secure virtual solution that broadens integrated computing beyond design labs, to offices and classrooms.
  • SIX USB 2.0 CONNECTIONS - With zero client devices, connectivity is critical. The CBV42 Series provides multiples ways to connect, including six connections for USB 2.0.
  • LG ZERO CLIENT FLEXIBILITY - Compared to a traditional desktop computing system, the CBV-42 Series allows advanced computing with greater security.
  • LG ZERO CLIENT SECURITY - PCoIP zero clients significantly reduce the risk of virus, spyware, or hacking because all data, storage, and memory are stored at a secure central data center. Data never leaves the data center.
 
 

Suggested Products