(707) 268-8850    Get SUPPORT

Network Management Services Blog

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them--rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to Network Management Services for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables--if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at (707) 268-8850.

Tip of the Week: Why You Shouldn’t Just Kill Power...
5 Useful Cloud Apps for Small Businesses


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Mobile Devices VoIP Hosted Solutions Google Email Data Data Recovery Outsourced IT Tech Term IT Support Internet of Things Software Cloud Computing IT Services Saving Money Internet Microsoft BDR Business Continuity Efficiency Hardware Communications Communication Small Business Cybercrime Smartphones Business Cybersecurity Ransomware Android Disaster Recovery Artificial Intelligence User Tips Server Managed IT Services Smartphone Gadgets Windows Browser Avoiding Downtime Save Money How To Managed IT Network Computers Alert Collaboration Passwords Money Productivity Vulnerability Router BYOD Chrome Phishing Firewall Law Enforcement Social Engineering Applications Miscellaneous Social Media Workplace Tips Mobile Device Management Business Intelligence Mobility Two-factor Authentication Computer Business Management Data Security Data Protection Windows 10 VPN Redundancy Document Management Compliance Managed Service Provider Budget Private Cloud Facebook Identity Theft Blockchain Office 365 Word Upgrade Productivity Remote Monitoring Bandwidth Flexibility Operating System Spam Virtualization Telephone Systems Proactive IT Connectivity IT Support Unified Threat Management Information Technology Managed Service Data loss Work/Life Balance CES Automation Comparison Apps Physical Security OneNote Government IT Management Encryption Content Management Paperless Office Training Workers Windows 7 Access Control Microsoft Office Smart Tech Virtual Assistant Google Drive Big Data IT Plan Settings Update Quick Tips Website Data Breach Public Cloud Office Tips Employer-Employee Relationship Credit Cards Content Filtering Unsupported Software Mobile Device Analysis Data Storage Data storage Servers App Infrastructure Windows 10 Mobile Computing Value Solid State Drive Networking Holiday Spam Blocking Information Password Sports Bring Your Own Device Wi-Fi Business Owner File Sharing Hacking Devices Augmented Reality Supercomputer Remote Worker Data Warehousing Voice over Internet Protocol Digital Signature Machine Learning Enterprise Content Management Windows 10s Cables Office Smart Office Cortana Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Wireless Technology Emergency Business Mangement Addiction IBM Leadership HBO IoT Safety SaaS Business Technology Advertising Professional Services Unified Communications Thought Leadership The Internet of Things Wiring Multi-Factor Security Legal Risk Management YouTube Marketing Hacker Cleaning Netflix Password Management User Error Sync Education Relocation Screen Mirroring Software as a Service Colocation Recovery Online Shopping Patch Management Tools Save Time Gmail Cache Hiring/Firing Health Outlook Specifications CrashOverride Theft Streaming Media Current Events Camera Trending Strategy Computer Care NIST Audit Telephony Humor Cast HaaS Students Computing Infrastructure Regulations Evernote Authentication Scam Downtime Recycling Wireless Internet webinar Files Frequently Asked Questions Millennials Insurance Telephone System Google Apps Content Filter Knowledge Apple Lifestyle HIPAA Samsung Cryptocurrency Reputation Computer Fan Internet Exlporer Skype Entertainment Human Resources Healthcare Charger Emails Wireless Charging Nanotechnology Root Cause Analysis Hybrid Cloud Botnet eWaste Wire Conferencing Excel Workforce USB Fraud Practices Storage Electronic Medical Records Network Congestion Hard Drives iPhone Software Tips Accountants Safe Mode Customer FENG End of Support Start Menu MSP Google Docs Staff Electronic Health Records HVAC Monitor History Flash PDF Black Market Fiber-Optic Meetings Travel Data Management Criminal Tip of the week Telecommuting Amazon Hosted Computing Password Manager IT Consultant Keyboard Internet exploMicrosoft Mobile Smart Technology IT solutions Battery Techology Tech Support Rootkit How to 5G Employer Employee Relationship Remote Computing Experience Proactive Content Customer Relationship Management Computer Accessories Scalability Music Competition Two Factor Authentication Best Practice Politics Company Culture IP Address Remote Monitoring and Maintenance Fun Audiobook Users Vendor Management Shadow IT Customer Service Bluetooth Wearable Technology Assessment Printers Managing Stress Mobile Office Virtual Reality Line of Business WiFi Administration Domains Transportation Automobile Books Wireless Television Regulation Worker Commute Public Speaking Benefits Search Webinar Worker Instant Messaging Troubleshooting Presentation Public Computer Twitter Video Games Lithium-ion battery Loyalty