Trending Products
Recently Viewed
Apple 240 W USB-C cable 24 pin USB-C to 24 pin USB-C (2m)
Apple 240 W USB-C cable 24 pin USB-C to 24 pin USB-C (2m)
This 2-meter charge cable is made with a woven design – with USB-C connectors on both ends – and is ideal for charging, syncing, and transferring data between USB-C devices. It supports charging of up to 240 watts and transfers data at USB 2 rates. Pair the USB-C charge cable with a compatible USB-C power adapter to conveniently charge your devices from a wall outlet and take advantage of fast-charging capabilities. USB-C power adapters sold separately.
Your Recently Viewed Products
Startech Multiport Adapter – USB-C – HDMI and VGA
Startech Multiport Adapter – USB-C – HDMI and VGA
Turn your USB-C™ equipped laptop into a mobile workstation. This sleek, compact USB-C multiport adapter makes it easy to connect your MacBook Pro or Windows laptop to an HDMI or VGA monitor. Power through your workday, with three USB 3.0 (Type-A) ports with Fast-Charge support, SD™ and microSD™ card slots, and a Gigabit Ethernet port.
Google Meet Compute System Large Room Kit – New Version 2022
Google Meet Compute System Large Room Kit – New Version 2022
ASUS – Google Meet kit is the latest smart video-conferencing solution. Enabling stunning HD visuals, the kit features the compact ASUS – Google Meet Compute System powered by an Intel® Core™ i7 processor and offering a revolutionary magnetic chassis design for easy setup. The newly designed ASUS – Google Meet Compute System is built and tested to provide a product that exceeds industry standards and ensures reliability for users. Additionally, the firmware in the touchscreen control panel, 4K UHD camera and speaker mic receives automatic updates, allowing users to stay focused on business.
XG 85 rev.3 Security Appliance (EU/UK/US power cord)
Sophos XG Firewall provides comprehensive next-generation firewall protection that’s easy to setup and manage, blocking unknown threats, automatically responding to security incidents by isolating compromised systems and exposing hidden user, application, and threat risks on the network to prevent potential issues from becoming real problems.