XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them--rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to XFER for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables--if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at 734-927-6666 / 800-438-9337.

Tip of the Week: Why You Shouldn’t Just Kill Power...
5 Useful Cloud Apps for Small Businesses


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Network Security Gadgets Email Quick Tips Efficiency Network IT Support Innovation Business Management IT Services Business Social Media Business Continuity Smartphones Miscellaneous Server Upgrade Virtualization User Tips Communication Disaster Recovery Communications Windows Data Backup Computer Microsoft Office Managed IT Services Smartphone Data Recovery Users Passwords Browser Mobile Device Management Holiday Android Save Money Internet of Things WiFi Marketing Tech Term Alert Outsourced IT Ransomware Cybercrime Artificial Intelligence Mobile Computing Cloud Computing BDR Vendor Management Remote Monitoring Router Windows 10 Operating System Productivity Chrome Automation Bring Your Own Device Apple BYOD Cybersecurity Information Technology Computers Avoiding Downtime The Internet of Things Current Events Health Managed IT Services Best Practice History Spam Going Green Big Data Remote Computing Firewall Telephone Systems VPN IT Solutions Collaboration Hacking Phone System Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Proactive IT Printer Facebook Application Trending Bandwidth IT Support Lithium-ion Battery Money Mobile Device Office Excel Budget App Mobility Windows 10 iPhone Business Managament Training Office 365 Applications Encryption Mouse Fax Server Content Filtering Networking Maintenance Windows 8 Two-factor Authentication How To Business Intelligence Unified Threat Management Recovery Private Cloud Phishing Tutorials Law Enforcement Customer Relationship Management Data Security Save Time Hard Drives Virus Website Sports Value Gmail Access Control Google Drive Apps Settings Managed IT Antivirus Information Data Protection PowerPoint Blockchain User Error Word Analytics Humor File Sharing Redundancy Outlook Identity Theft Conferencing Social Voice over Internet Protocol Office Tips Inbound Marketing Vulnerability Compliance Search IT Management Tablet Servers Twitter Flexibility Document Management Entertainment Administration Tech Support Streaming Media Risk Management Retail Social Networking Digital Payment Human Resources Computer Repair Software as a Service Machine Learning Scam Analysis Saving Time Network Congestion Hacker Wi-Fi Administrator Managed Service Downtime Memory Data Management Connectivity Botnet DDoS Display Robot Best Available USB Bluetooth Virtual Assistant Solid State Drive Black Market People OneNote Webinar Healthcare Credit Cards Samsung Data Storage Wireless Physical Security Help Desk Telephone System Cleaning Password Keyboard Online Currency Public Cloud Touchscreen Work/Life Balance Data Breach CES Recycling SaaS Fraud Point of Sale Education Instant Messaging IT Plan Smart Tech Data storage Statistics Environment Workers Content Management Video Surveillance Infrastructure eWaste Programming Biometrics Unsupported Software Internet Exlporer Skype Data loss PDF IT service Safety Running Cable IBM Update Augmented Reality HaaS Intranet End of Support Piracy Leadership Paperless Office Wearable Technology Government Spam Blocking YouTube Telephony Meetings Comparison Business Technology Net Neutrality Google Docs Computer Accessories Windows 7 Business Owner Business Mangement Students Bing eBay Windows 10s Hosted Computing Proactive NarrowBand Alerts Charger Cast Start Menu Theft Cache Project Management Customers Debate Entrepreneur Data Warehousing Specifications Uninterrupted Power Supply Evernote Devices GDPR Tablets HIPAA Digital Signature Password Management File Versioning Advertising Hiring/Firing Regulations Travel Criminal Smartwatch Distributed Denial of Service Shortcuts Windows Media Player Files Virtual Desktop Text Messaging HBO Inventory Remote Monitoring and Maintenance Hiring/Firing Chromecast Work Station Computer Care Mobile Cortana Wireless Internet Warranty Cost Management Gaming Console Hosted Solution Millennials IoT Wireless Charging Thought Leadership E-Commerce Upgrades Analyitcs Multi-Factor Security Strategy NIST Multiple Versions Notifications Electronic Health Records Employee eCommerce Colocation Customer Service Audit Frequently Asked Questions Line of Business Laptop Professional Services Google Apps Wire SharePoint Microchip IT Security Netflix Workforce Shadow IT Consultant Root Cause Analysis Flash Fiber-Optic Content Filter Camera Print Server Lifestyle Cryptocurrency Restore Data Hybrid Cloud Supercomputer Remote Support Digital Signage IaaS Vendor Cameras Computing Infrastructure Computer Fan Tip of the week Amazon Authentication MSP nternet Touchpad Crowdfunding Tools Macro Smart Office Relocation Telecommuting Insurance Licensing Legal Sync Co-managed IT Cables Storage Law Firm IT Monitor Virtual Reality Webcam Safe Mode Backup and Disaster Recovery Company Culture WIndows 7 Knowledge HVAC Google Search Security Cameras Printer Server Shortcut FENG Windows Server 2008 Amazon Web Services Nanotechnology Remote Worker Password Manager Search Engine Worker Commute Patch Management Software Tips Remote Work Practices LinkedIn User PC Care Screen Mirroring Unified Communications Addiction Virtual Private Network Reputation Bloatware 360 Emails Accountants Managing Stress Domains Wiring Science Scheduling Staff Enterprise Content Management ISP Employee/Employer Relationship Windows 8.1 Update Internet exploMicrosoft 3D Electronic Medical Records Online Shopping Television Transportation Video Games Troubleshooting Webinar Automobile Public Computer Benefits Scalability IT solutions Thank You Employer Employee Relationship CrashOverride Smart Technology How to Loyalty Books Regulation Techology Experience Congratulations Content Two Factor Authentication Utility Computing Emergency Worker Printers Music Audiobook Assessment Rootkit Cryptomining Battery Politics

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *