301-571-5040    Get SUPPORT

Washington Works Blog

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Inventory
The first thing you’ll want to do is take inventory of all of the cables, wires, and adapters you have to ensure that you aren’t going to toss something that will have value to you. The notion you had when you didn’t throw them out earlier could be the right one. For chargers and other adapters, you may want to keep some around that still have use. Smartphone chargers with USB Type-A and Type-C cords can be of use if you have guests since most smartphone adapters will work to charge other devices in common areas.

Discarding Unwanted Cables
Once you’ve assessed the practical usability of the cords, wires, and adapters you’ve collected, and removed the ones that have some function, contact the people around you to see if they could use them. Some people would love an extra charger to put in their gym or computer bag, or just to have around the house. This could go a long way toward getting rid of a majority of your older cables.

As for those cables, wires, and adapters that no one wants, and have no practical use for you, you should recycle them. At Washington Works, we recycle all types of hardware and connectors. If you can’t make it to us, and would like to know where the closest recycling center to you is, you can call 1-800-Recycling or visit the National Center for Electronics Recycling website.

If you are looking at recycling your technology, give us a call at 301-571-5040 and one of our technicians can help you get your old technology go where it needs to go.

Facebook Makes Two-Factor Authentication Easier
Understanding RPO and RTO
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, October 22 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Privacy Business Computing Malware Email Hackers Network Security Software Business Tech Term Productivity Internet Computer Hosted Solutions Backup Mobile Devices Managed IT Services Microsoft Data Ransomware User Tips IT Support Data Recovery Productivity Google Data Backup Efficiency Managed Service Provider IT Services Smartphone Android Innovation Encryption Cloud Computing Workplace Tips Outsourced IT Data Management Communication Small Business Business Management Browser Paperless Office Office 365 Social Media Windows 10 Hardware Business Continuity Disaster Recovery Save Money Government Collaboration Remote Monitoring Bandwidth Cybersecurity App Artificial Intelligence BYOD Windows 10 Smartphones Unified Threat Management Phishing Work/Life Balance Infrastructure Tip of the week Facebook Server Vulnerability Risk Management Windows How To Managed IT Services Network Passwords IT Management Managed Service Mobile Device Apps SaaS Healthcare Word Holiday Customer Relationship Management Big Data Hosted Solution Office Chrome Password Politics Employer-Employee Relationship Applications Saving Money BDR Money File Sharing Chromebook Document Management Internet of Things Virtual Reality Antivirus VoIP Two-factor Authentication Compliance Wi-Fi Remote Workers Data loss Blockchain Gmail Automobile Alert Health Machine Learning Tech Support Regulations How To Information Storage VPN Identity Theft IoT Quick Tips Data Security Point of Sale Maintenance Hacker Samsung Server Management Physical Security Twitter Business Technology Telephone Systems G Suite Computing Virtual Private Network HIPAA Website Computer Care Robot Firewall Taxes Mobile Security Recovery Training Smart Technology Remote Computing Websites Patch Management Router Vendor Management Scam Meetings Botnet Automation Time Management Law Enforcement CCTV Multi-Factor Security Mirgation Vulnerabilities Conferencing Administrator Connectivity Networking Webcam Augmented Reality User Error Company Culture Managed IT Service Modem WPA3 Computing Infrastructure Value Utility Computing Features Uninterrupted Power Supply Servers Education Specifications Cortana Black Market Crowdsourcing Network Management Gadget IBM Google Calendar Emoji Geography Instant Messaging YouTube Permissions The Internet of Things Printer Wearable Technology Managing Stress Help Desk Managed IT WiFi Break Fix Cookies Fleet Tracking Microsoft Office Alerts Electronic Medical Records Electronic Health Records Relocation Cleaning Gadgets Budget Black Friday Social Networking Analytics Travel Personal Information Professional Services Monitoring IT Support Touchscreen Legislation Chatbots High-Speed Internet Settings Supercomputer Fraud Star Wars Google Drive Access Control Update Enterprise Content Management Bookmarks Corporate Profile Outlook GPS Dark Web Nanotechnology Asset Tracking Licensing Legal Management Cyberattacks Solid State Drive Statistics Private Cloud Cyber Monday Motherboard MSP Lenovo Motion Sickness USB Consulting Cabling Mouse Identity Development Digital Mail Merge Downtime IT Budget Cost Management OneNote VoIP Techology Web Server Upgrade SharePoint Unified Communications Favorites WannaCry Shortcut Office Tips Tracking Microsoft Excel Screen Reader Social Notifications Cooperation Sports Enterprise Resource Planning Files Hard Disk Drive Bluetooth Error IT Solutions Proactive Firefox Superfish Computer Repair Dongle Managed Services Provider IT Consultant Spam Tablet Virtualization Cables Spyware Address Digital Payment Wireless Hotspot Assessment Employee-Employer Relationship Avoiding Downtime Cameras Downloads IT Technicians Bring Your Own Device Project Management Monitors Mobile Device Management Smart Tech Unified Threat Management Staff Search Mobile Read Only Communications Staffing Distributed Denial of Service Upgrades Processors Remote Monitoring and Management Language Internet Exlporer Service Level Agreement E-Commerce Disaster Heating/Cooling Comparison Wires Cybercrime Lithium-ion battery Printers Emergency Wireless Technology 5G Safety Marketing Regulation Hiring/Firing Finance Competition IP Address Fun Users Customer Service Miscellaneous Mobile Office Domains Hard Drives Public Speaking CrashOverride Presentation