XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Better Way to Be Rid of Old Cables

A Better Way to Be Rid of Old Cables

Are you drowning in old computer cables? Do they sit in a drawer and take up space? Chances are that you’ll have quite a lot of old cables that are sitting around collecting dust due to your organization picking up new devices that come with even more new cables. Sure, you might think you still need that old 25-pin serial cable for that legacy scanner from 1997, but it’s probably time to let go. While there is some merit to keeping old cables around just in case, the proper alternative to throwing out unneeded cables is to recycle them.

Take an Inventory
First, you need to see what cables you have on-hand. This includes cables, wires, and adapters. Basically, keep an eye out for anything that might be of value to your organization. This doesn’t mean to hoard them--rather, keep an eye out for anything that could potentially be useful, but not obsolete in the near future. For example, smartphone chargers with USB Type-A and Type-C cables might come in handy for travel or to keep as spares for staff.

Recycle (Don’t Discard) Your Unwanted Cables
If there are any cables remaining, you should always, always recycle them rather than throwing them in the trash. Modern computer and video cables are typically made out of valuable materials, such as copper and gold. On their own, they might not be worth much, but if everyone recycled their old cables instead of throwing them out in the trash, it would have a pretty large impact.

You can reach out to XFER for assistance with getting rid of your unneeded and unwanted hardware. This goes for more than just cables--if you have anything at all that you simply don’t need, we’ll take it off your hands. If you just want a place to drop off your unneeded hardware, just call 1-800-RECYCLING or visit the National Center for Electronics Recycling website.

For help with recycling your unused technology, give us a call at 734-927-6666 / 800-Get-XFER.

Tip of the Week: Why You Shouldn’t Just Kill Power...
5 Useful Cloud Apps for Small Businesses
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Data Small Business Hosted Solutions Hardware Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network IT Support Efficiency Innovation Social Media IT Services Business Management Miscellaneous Business Continuity Server Smartphones Upgrade Virtualization Business Communication Windows Disaster Recovery Computer Managed IT Services Microsoft Office Communications User Tips Users Data Backup Mobile Device Management Passwords Browser Android Save Money Smartphone Marketing WiFi Holiday Data Recovery Ransomware Alert Outsourced IT Mobile Computing Tech Term Vendor Management Operating System Windows 10 Remote Monitoring Internet of Things Cybercrime Information Technology BDR Avoiding Downtime Bring Your Own Device Computers Apple BYOD Cloud Computing Big Data Current Events Remote Computing IT Solutions Telephone Systems VPN Best Practice History The Internet of Things Artificial Intelligence Firewall Chrome Router Going Green Automation Social Engineering Health Employer-Employee Relationship Trending Phone System Wireless Technology Application Printer Cybersecurity Facebook Collaboration IT Consultant Hacking Spam Office Excel Budget App Managed IT Services Lithium-ion Battery Money Bandwidth Proactive IT Business Intelligence Networking Unified Threat Management Fax Server Windows 10 Maintenance Windows 8 Two-factor Authentication iPhone Mobility Mouse Applications Content Filtering Recovery How To Business Managament Managed IT Antivirus Virus Productivity PowerPoint Gmail Data Security Phishing Analytics Private Cloud Redundancy Customer Relationship Management Hard Drives Law Enforcement Training Office 365 Sports Value User Error Humor Outlook Data Protection Apps Tutorials Website Word Saving Time Compliance Flexibility Identity Theft Entertainment Downtime Settings Information Retail File Sharing Memory Analysis IT Support Data Management Tech Support Conferencing IT Management Vulnerability Inbound Marketing Scam Network Congestion Encryption Search Tablet Connectivity Twitter Administration Document Management Save Time Mobile Device Streaming Media Risk Management Google Drive Digital Payment Social Networking Office Tips Blockchain Computer Repair Programming Skype eWaste Access Control Webinar Spam Blocking Comparison Internet Exlporer Windows 7 Piracy Augmented Reality Intranet Smart Tech IBM PDF Running Cable Safety Administrator Wi-Fi Wearable Technology HaaS End of Support Leadership Machine Learning Government Instant Messaging YouTube Meetings Computer Accessories Environment OneNote Credit Cards Human Resources Best Available Bluetooth DDoS Biometrics People Paperless Office IT service Servers Data Storage Managed Service Solid State Drive Social Fraud Black Market Keyboard Hacker CES Samsung Work/Life Balance Data Breach IT Plan Wireless Physical Security Touchscreen Online Currency Cleaning Password Recycling Virtual Assistant Workers Content Management Public Cloud Point of Sale Education USB Infrastructure SaaS Robot Unsupported Software Statistics Data loss Data storage Video Surveillance Telephone System Update Touchpad NIST Hiring/Firing Knowledge Password Manager IaaS Computing Infrastructure Thought Leadership E-Commerce Windows Media Player Virtual Desktop Software Tips FENG Remote Work Law Firm IT Electronic Health Records Telephony Unified Communications Relocation Company Culture Line of Business Patch Management Cost Management Webcam Legal Wire Screen Mirroring Online Shopping Monitor Upgrades 360 Analyitcs Emails Google Docs Staff Cryptocurrency Help Desk Botnet Business Mangement LinkedIn Content Filter Camera Electronic Medical Records Customer Service Business Owner Consultant Start Menu Theft PC Care Net Neutrality Authentication MSP Data Warehousing Windows 10s Specifications Smart Office Charger Regulations Cast Evernote Reputation 3D Windows 8.1 Update Insurance Voice over Internet Protocol Digital Signature Scheduling Cameras Hiring/Firing HBO eBay Display Safe Mode HIPAA Travel Criminal Internet exploMicrosoft Storage NarrowBand Debate HVAC Licensing Mobile Cortana Alerts Nanotechnology Remote Worker Millennials WIndows 7 Computer Care Wireless Charging Customers Practices Hosted Solution Virtual Reality Multi-Factor Security Strategy Uninterrupted Power Supply Macro Printer Server Shortcut Frequently Asked Questions Text Messaging Accountants Business Technology Advertising Addiction Virtual Private Network Chromecast Gaming Console Enterprise Content Management User Professional Services Google Apps Distributed Denial of Service Files Work Station Wiring Co-managed IT Worker Commute Audit Workforce Students Managing Stress Domains Flash Fiber-Optic Hosted Computing Proactive Bloatware Netflix Lifestyle Tip of the week Root Cause Analysis Amazon Science Software as a Service Notifications Cache Project Management Laptop IT Security Password Management Supercomputer Tools Colocation Devices GDPR Computer Fan Telecommuting Print Server Healthcare Sync Cables SharePoint Inventory Remote Monitoring and Maintenance Entrepreneur Shadow IT Wireless Internet Warranty Windows Server 2008 Amazon Web Services Remote Support IoT Tablets Hybrid Cloud nternet Crowdfunding Audiobook Assessment Rootkit Regulation Politics Thank You Television Transportation Troubleshooting Webinar Battery Printers Video Games Congratulations Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Scalability Smart Technology Loyalty Books Experience How to Content Two Factor Authentication Emergency Techology Worker Music

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name *
      • Number of Participants *
      • First Name *
      • Last Name *
      • Phone *
      • Yes, subscribe me to: