301-571-5040    Get SUPPORT

Washington Works Blog

How To Get Rid of Those Pesky Extra Cables

How To Get Rid of Those Pesky Extra Cables

Do you have cords, wires, and adapters just sitting in a cupboard or drawer, with no purpose other than taking up space? Of course you do. The average person will replace old or broken devices, and find the new devices aren’t compatible with the old cables, leaving them stuffed in a junk drawer or in a random box that they’ve kept “just in case.” Every home or business has the same scenario going on: lots of wires and cables left over from all the e-waste they have discarded over the years. If you want to get rid of your unwanted cables, here are a couple of tips on how to do so properly.

Inventory
The first thing you’ll want to do is take inventory of all of the cables, wires, and adapters you have to ensure that you aren’t going to toss something that will have value to you. The notion you had when you didn’t throw them out earlier could be the right one. For chargers and other adapters, you may want to keep some around that still have use. Smartphone chargers with USB Type-A and Type-C cords can be of use if you have guests since most smartphone adapters will work to charge other devices in common areas.

Discarding Unwanted Cables
Once you’ve assessed the practical usability of the cords, wires, and adapters you’ve collected, and removed the ones that have some function, contact the people around you to see if they could use them. Some people would love an extra charger to put in their gym or computer bag, or just to have around the house. This could go a long way toward getting rid of a majority of your older cables.

As for those cables, wires, and adapters that no one wants, and have no practical use for you, you should recycle them. At Washington Works, we recycle all types of hardware and connectors. If you can’t make it to us, and would like to know where the closest recycling center to you is, you can call 1-800-Recycling or visit the National Center for Electronics Recycling website.

If you are looking at recycling your technology, give us a call at 301-571-5040 and one of our technicians can help you get your old technology go where it needs to go.

Facebook Makes Two-Factor Authentication Easier
Understanding RPO and RTO
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, January 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Business Computing Privacy Malware Hackers Productivity Business Network Security Software Email Tech Term Hosted Solutions Internet Data Backup Mobile Devices Computer Data Ransomware Backup Managed IT Services IT Support Data Recovery Google User Tips Microsoft Productivity Innovation Hardware Efficiency Outsourced IT IT Services Smartphone Cloud Computing Managed Service Provider Small Business Business Management Android Paperless Office Business Continuity Social Media Workplace Tips Encryption Save Money Browser Managed IT Services Remote Monitoring Office 365 Collaboration Smartphones Windows 10 Windows 10 Communication Data Management Government Holiday Server Disaster Recovery Bandwidth Internet of Things Scam Antivirus App Employer-Employee Relationship Cybersecurity BYOD Vulnerability IT Management Work/Life Balance Facebook Artificial Intelligence Unified Threat Management Phishing VoIP Healthcare Wi-Fi Communications BDR Passwords Infrastructure Tip of the week Windows Apps Network Mobile Device Hosted Solution Compliance Office Blockchain Customer Relationship Management Password Big Data Money Quick Tips Upgrade Maintenance Saving Money Chromebook Managed Service Word Politics Virtual Reality Information Risk Management File Sharing How To Chrome Document Management Two-factor Authentication Applications SaaS Patch Management Automobile Computing Vendor Management Router Hacker Machine Learning Microsoft Office Identity Theft Robot Point of Sale Data loss Social Telephone Systems Remote Monitoring and Management Gmail Recovery Website Regulations Remote Computing Employees G Suite How To IoT Remote Workers VPN Storage Data Security Firewall Private Cloud Computer Care Company Culture Downtime Server Management Taxes Business Technology Automation Virtual Private Network Wireless Access Control HIPAA Mobile Device Management Training Alert Websites Mobile Security Health Meetings Smart Technology Samsung Botnet Physical Security Twitter Tech Support Electronic Medical Records Unified Communications Favorites Avoiding Downtime IBM Smart Tech Webcam Personal Information OneNote Theft Monitors Downloads IT Technicians Distributed Denial of Service The Internet of Things Proactive Permission Unified Threat Management Staff Education Update Enterprise Resource Planning Files Comparison Cables Authorization Disaster Heating/Cooling Gadgets Language Budget Internet Exlporer Gadget Legal Dongle Managed Services Provider Printing WiFi Bring Your Own Device Project Management Time Management Connectivity Employee-Employer Relationship Multi-Factor Security Mirgation Networking Managed IT Service Modem Travel Notifications Test User Error Relocation Cleaning Mobile Read Only Specifications IT Solutions Supercomputer Wires Uninterrupted Power Supply Servers Users Computing Infrastructure Value Sports Service Level Agreement E-Commerce Remote Worker Virtualization GPS Vulnerabilities Conferencing Network Management Permissions Customer Service Computer Repair YouTube Google Calendar Break Fix Cookies Motion Sickness WPA3 RMM Managed IT Printer Wearable Technology ROI Black Friday Social Networking Upgrades IT Budget Processors Zero-Day Threat Alerts Search Utility Computing Features Analytics Office Tips Tracking Geography Instant Messaging IT Support Touchscreen Fraud Spam Star Wars Web Server Settings Financial Legislation Chatbots Managing Stress Help Desk Google Drive Dark Web Nanotechnology Fleet Tracking Operating System Corporate Profile Outlook Error Cyber Monday Motherboard Digital Payment Backup and Disaster Recovery Solid State Drive Statistics Licensing IT Consultant Electronic Health Records Lenovo Identity Cortana Black Market High-Speed Internet Finance Cabling Cost Management Cameras Professional Services Monitoring Digital Mail Merge Procurement Mouse Enterprise Content Management Bookmarks VoIP Techology Microsoft Excel Screen Reader Crowdsourcing Asset Tracking Tech Terms WannaCry Shortcut SharePoint Staffing Emoji Superfish Augmented Reality Cybercrime MSP Human Error Hard Disk Drive Bluetooth Cooperation Management Cyberattacks Firefox Tablet Administrator Development Authentication Hotspot Assessment Law Enforcement CCTV USB Consulting Spyware Address Security Cameras Safety Hiring/Firing Marketing Fun CrashOverride Competition IP Address Emergency Miscellaneous Printers Mobile Office Hard Drives Domains Public Speaking Regulation Presentation Lithium-ion battery Wireless Technology 5G