301-571-5040    Get SUPPORT

Washington Works Blog

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

The first thing you’ll want to do is take inventory of all of the cables, wires, and adapters you have to ensure that you aren’t going to toss something that will have value to you. The notion you had when you didn’t throw them out earlier could be the right one. For chargers and other adapters, you may want to keep some around that still have use. Smartphone chargers with USB Type-A and Type-C cords can be of use if you have guests since most smartphone adapters will work to charge other devices in common areas.

Discarding Unwanted Cables
Once you’ve assessed the practical usability of the cords, wires, and adapters you’ve collected, and removed the ones that have some function, contact the people around you to see if they could use them. Some people would love an extra charger to put in their gym or computer bag, or just to have around the house. This could go a long way toward getting rid of a majority of your older cables.

As for those cables, wires, and adapters that no one wants, and have no practical use for you, you should recycle them. At Washington Works, we recycle all types of hardware and connectors. If you can’t make it to us, and would like to know where the closest recycling center to you is, you can call 1-800-Recycling or visit the National Center for Electronics Recycling website.

If you are looking at recycling your technology, give us a call at 301-571-5040 and one of our technicians can help you get your old technology go where it needs to go.

Facebook Makes Two-Factor Authentication Easier
Understanding RPO and RTO


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, April 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Cloud Privacy Malware Hackers Network Security Business Email Software Tech Term Internet Hosted Solutions IT Support Data Backup Data Computer Data Recovery User Tips Google Mobile Devices Efficiency IT Services Ransomware Innovation Backup Managed IT Services Microsoft Cloud Computing Hardware Business Management Small Business Productivity Outsourced IT Workplace Tips Collaboration Android Managed Service Provider Paperless Office Smartphone Encryption Business Continuity Managed IT Services Phishing Windows 10 Office 365 Upgrade Remote Monitoring Social Media Server Communication Browser Smartphones Communications Windows 10 Data Management Save Money Disaster Recovery Holiday Government Employer-Employee Relationship VoIP Passwords Cybersecurity Bandwidth Information Quick Tips Apps Business Technology Healthcare Artificial Intelligence Chrome Unified Threat Management BYOD BDR Document Management Saving Money Infrastructure Tip of the week Internet of Things Work/Life Balance Scam Facebook Antivirus Windows Compliance Vulnerability Automation Wi-Fi IT Management Risk Management App Managed Service VPN Maintenance SaaS Analytics Word Microsoft Office Customer Relationship Management Politics Big Data Hosted Solution Office File Sharing Applications Password Money Chromebook Vendor Management Network Virtual Reality Two-factor Authentication Blockchain Mobile Device How To Health Tech Support IoT Telephone Systems Storage Data Security G Suite Hacker Samsung Server Management Electronic Medical Records Settings Virtual Private Network Firewall Physical Security Professional Services Twitter Private Cloud Computer Care Downtime Computing Access Control HIPAA Taxes Management Mobile Security Robot Website Training Websites Smart Technology Recovery Proactive Social Meetings Remote Computing Tablet Patch Management Wireless Botnet Bring Your Own Device Router Remote Monitoring and Management Mobile Device Management Automobile Employees Data loss Remote Workers Machine Learning Identity Theft Networking Gmail Company Culture Regulations How To Point of Sale Alert Geography Instant Messaging YouTube Permissions Travel Cortana Black Market Network Management PowerPoint Google Calendar Relocation Cleaning IBM Break Fix Cookies Supercomputer Emoji Fleet Tracking Operating System Security Cameras Printer Wearable Technology Managing Stress Crowdsourcing Help Desk Managed IT Black Friday Social Networking GPS Backup and Disaster Recovery Alerts Electronic Health Records Net Neutrality The Internet of Things High-Speed Internet Finance Gadgets Budget Fraud Star Wars Motion Sickness Monitoring IT Support Touchscreen Virtual Assistant Legislation Chatbots Outlook Dark Web Nanotechnology IT Budget Asset Tracking Tech Terms Google Drive Printing Personal Information Enterprise Content Management Bookmarks Corporate Profile Cyber Monday Motherboard Office Tips Tracking Update MSP Human Error Lenovo Licensing Web Server Cyberattacks Solid State Drive Statistics Windows 7 Legal Development Authentication Digital Mail Merge Users Cost Management USB Consulting Cabling Software as a Service Mouse Identity Error WannaCry Shortcut Customer Service Microsoft Excel Screen Reader Digital Payment OneNote Theft VoIP Techology Remote Worker SharePoint IT Consultant Unified Communications Favorites Permission Firefox Superfish Cooperation Cameras Enterprise Resource Planning Notifications Files Hard Disk Drive Bluetooth Staffing Sports Cables Authorization Spyware Address Hotspot Assessment IT Solutions Dongle Managed Services Provider Wasting Time Project Management Monitors Spam Smart Tech Cybercrime Virtualization Employee-Employer Relationship Avoiding Downtime ROI Downloads IT Technicians Computer Repair Distributed Denial of Service Administrator Test Financial Unified Threat Management Staff Law Enforcement CCTV Mobile Read Only Search Wires Language Internet Exlporer Webcam Upgrades Service Level Agreement Processors E-Commerce Disaster Heating/Cooling Database Comparison Vulnerabilities Conferencing Connectivity Time Management Notes Multi-Factor Security Mirgation Education Managed IT Service Modem WPA3 RMM Procurement User Error Gadget WiFi Zero-Day Threat Computing Infrastructure Value Utility Computing Features Uninterrupted Power Supply Servers Voice over Internet Protocol Specifications Augmented Reality Wireless Technology 5G Safety Regulation Marketing Hiring/Firing Competition IP Address Fun Miscellaneous Transportation Mobile Office Domains Hard Drives CrashOverride Public Speaking Presentation Lithium-ion battery Printers Emergency