(707) 268-8850    Get SUPPORT

Network Management Services Blog

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them--rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to Network Management Services for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables--if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at (707) 268-8850.

Tip of the Week: Why You Shouldn’t Just Kill Power...
5 Useful Cloud Apps for Small Businesses
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup VoIP Mobile Devices Email Google Tech Term Data Recovery Data Outsourced IT IT Support Internet of Things Saving Money IT Services Cloud Computing Internet Microsoft Software BDR Hardware Business Continuity Efficiency Communications Business Smartphones Communication Cybercrime Small Business Cybersecurity Ransomware Disaster Recovery Android User Tips Artificial Intelligence Server Computers Browser Alert Managed IT Services Smartphone Windows Avoiding Downtime Save Money How To Managed IT Network Gadgets Business Intelligence Mobility Money Windows 10 Business Management Data Security Data Protection Collaboration Miscellaneous Social Media Vulnerability Router Chrome Law Enforcement BYOD Mobile Device Management Social Engineering Firewall Phishing Applications Two-factor Authentication Computer Passwords Workplace Tips Productivity Connectivity Proactive IT VPN IT Support Office 365 Redundancy Upgrade Managed Service Provider Document Management Private Cloud Spam Compliance Identity Theft Facebook Remote Monitoring Blockchain Word Operating System Productivity Virtualization Bandwidth Flexibility Budget Telephone Systems Spam Blocking Networking Holiday Hacking Big Data Bring Your Own Device Information Password Sports File Sharing Business Owner Website Physical Security Information Technology Automation Unified Threat Management Government Managed Service Data loss Work/Life Balance CES OneNote Comparison Google Drive IT Management Encryption Windows 7 Windows 10 Access Control Content Management Paperless Office Training Workers Smart Tech Virtual Assistant Quick Tips Settings Public Cloud Employer-Employee Relationship IT Plan Wi-Fi Data Breach Update Credit Cards Content Filtering Office Tips Data storage Unsupported Software Mobile Device Analysis Servers Data Storage Apps App Value Solid State Drive Infrastructure Mobile Computing Microsoft Office Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic MSP Google Docs Staff Electronic Health Records Amazon Hosted Computing Meetings Travel Data Management Criminal Tip of the week Telecommuting Office Mobile Password Manager IT Consultant Cortana Keyboard Advertising Enterprise Content Management Windows 10s Cables Devices Supercomputer Remote Worker Data Warehousing Voice over Internet Protocol Digital Signature Machine Learning Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Emergency Smart Office User Error IoT SaaS Relocation Business Technology Professional Services Business Mangement Addiction Leadership Colocation HBO Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Wiring Multi-Factor Security Legal Risk Management YouTube Cleaning Netflix Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Humor CrashOverride Tools Save Time Gmail Cache Computing Infrastructure Outlook Specifications Computer Care NIST Audit Telephony Theft Streaming Media Current Events Files Camera Trending Strategy Regulations Evernote Authentication Scam Apple Cast HaaS Students Reputation Internet Exlporer Augmented Reality Insurance Telephone System Downtime Recycling Wireless Internet webinar Frequently Asked Questions Millennials Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Content Filter Knowledge Lifestyle Wireless Technology HIPAA IBM Wireless Charging Nanotechnology Hard Drives iPhone Entertainment Safety Human Resources Healthcare Charger Emails Customer End of Support The Internet of Things USB Fraud Practices Root Cause Analysis Botnet Marketing Hacker eWaste Wire Conferencing Monitor History Excel Workforce Safe Mode FENG Start Menu Storage Electronic Medical Records Network Congestion Software Tips Accountants Customer Relationship Management Benefits Competition Webinar Instant Messaging Troubleshooting Public Computer IP Address Worker Loyalty Users Twitter Video Games Battery Customer Service Smart Technology IT solutions How to Techology Mobile Office Rootkit Employer Employee Relationship Remote Computing Domains Experience Wireless Proactive Content Fun Computer Accessories Scalability Public Speaking Music Two Factor Authentication Best Practice Presentation Politics Company Culture Shadow IT Remote Monitoring and Maintenance Audiobook Lithium-ion battery Vendor Management Assessment Bluetooth Administration Wearable Technology Virtual Reality Tech Support Printers 5G Managing Stress Transportation Line of Business WiFi Books Television Search Regulation Automobile Worker Commute