Deprecated: Hook custom_css_loaded is deprecated since version jetpack-13.5! Use WordPress Custom CSS instead. Jetpack no longer supports Custom CSS. Read the WordPress.org documentation to learn how to apply custom styles to your site: https://wordpress.org/documentation/article/styles-overview/#applying-custom-css in /home/lionc/itechnews.net/wp-includes/functions.php on line 6085
Samsung NC190 and NC240 VMware Ready Certified PC-over-IP All-in-One Monitors | iTech News Net

Samsung NC190 and NC240 VMware Ready Certified PC-over-IP All-in-One Monitors

Samsung NC190 VMware Ready Certified PC-over-IP All-in-One Monitor

Samsung announced the NC190 and NC240 LCD monitors that allows secure access to remote servers and data centers. The 19-inch NC190 ad 23.6-inch NC240 zero-client displays are one of the first monitors designed to provide an alternative to desktop PCs, enabling highly secure access to any PC-over-IP (PCoIP)-enabled remote host, which means users can connect to centralized servers, without the need for workstations on their desks.

Samsung NC190 VMware Ready Certified PC-over-IP All-in-One Monitor

Samsung NC190

The Samsung NC190 ($698) and NC240 ($815) are powered by Tera 1100 PCoIP processor and get 64MB XDR and 128MB XDR memory respectively. The former features 1280×1024 resolution, 250cd/m2 brightness while the NC240 offers 1920×1080 Full HD resolution and 300cd/m2 brightness. They both have a contrast ratio of 1000:1 and a response time of 5ms. VGA input, DVI output and 10/100/1000 RJ45 Ethernet port are provided. The NC190 is available for just $466.11 at Amazon.com.

Samsung NC240 VMware Ready Certified PC-over-IP All-in-One Monitor

Samsung NC240

Samsung’s new PC-over-IP monitors offers “exceptional security” as well:

Data is highly secure in the NC190 / NC240 environment. No data leaves the remote host or datacenter, ensuring that individual workstations cannot be hacked or infected with viruses or spyware. All images transmitted to the displays are encrypted, providing a highly secure connection. Additionally, USB authentication ensures that no unauthorized devices can be attached to the system. This makes them ideal for use in environments such as finance, government and military.

[businesswire]

Advertisement