Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Recycling Technology: Is It the Best Answer?

Recycling Technology: Is It the Best Answer?

Let me ask you a simple question: how many cell phones have you had over the years? For some of us, upgrades are a yearly occurrence. For others possibly bi-yearly. Have you ever wondered where your old cell phone goes after it is out of your hands? 

Recycling is an important, but commonly forgotten topic in today’s digital age. Electrical devices are not something that can be mixed into your local landfill. It is a very toxic, hazardous waste. In various states across the US, it is actually illegal to dispose of electronics in the trash. So why is this?

Take a Look at What Is Inside

Inside of most electrical devices, you’ll find common materials such as aluminum, copper, and sometimes gold. Aluminum is typically used to create the structure of these electrical devices. It is a very common, strong, lightweight material. Copper and gold are excellent conductors and very resistant to corrosion when housed correctly. However, contained within most electrical devices are also toxic elements and materials. Sulfur, mercury, lead, chromium, beryllium oxide, cadmium; some or all of these could be lurking in that computer monitor you’re about to send off to the local landfill. 

Dispose of them Safely

As you might imagine with the ever-growing amount of electrical devices, there isn’t one set in stone procedure for all of this waste. There are also devices which most people do not even consider to be e-waste but should not be thrown away. When devices are sent away, typically they are crushed into as small of a space as possible. In this process, toxic chemicals and materials become exposed. Electrical devices typically need to be disassembled in order to be disposed of safely. E-waste is typically sent to processing plants which specialize in disassembling these products. While this is a safer route -- deconstructing these products is still a dangerous task. Let’s take a look at one example.

Samsung Note 7 -- A Hot Topic 

In the manufacturing industry, recalls are not uncommon. Devices are typically rigorously tested before leaving the plant, but what happens when a fatal flaw appears? This is exactly what happened with the Samsung Note 7. While models were quickly pulled from shelves, the batteries that powered them still are used in a variety of products. These batteries became notorious for short circuiting, which led to them combusting or even exploding. These devices required manual disassembling. 

Workers at the recycling plant were in charge of disassembling these potentially dangerous devices. They were equipped with heavy duty gloves, tongs, and even fire containment bins. What makes these devices different from the AA batteries you change every few months in your TV remote, is the fact that they are lithium ion batteries. These contain thousands of connected cells meaning they have an incredible amount of potential energy. This is why they can be so destructive.

Different battery technologies are enabling consumers to have longer lasting, more powerful devices. Whether it’s your new and improved battery in your smartphone, or your battery powered lawn mowers, hedge trimmers, or even the self-balancing hover board you purchased for Tim’s 12th birthday that just broke; these electrical devices need to be handled responsibly.

So, what do you do? Recycle battery powered devices, or dispose of them?

All devices, whether it’s your outdated cell phone, your undersized computer monitor, or even your in-home appliances -- all should be handled properly if you decide their product life has expired. You don’t know what toxic material is lurking in the underbelly of your device, and when dealing with your environment waste plant workers lives; it’s better to be safe than sorry.

If the time has come and replacing office devices has become imminent, Central Technology Solutions can help. Our professionals have the know-how to make sure you are disposing of your devices safely and in a responsible manner, without risking losing or exposing critical data. Call 1-844-237-4300 to learn more.

Why Managed Services: Proactive Maintenance and Ma...
Tip of the Week: Extend Your IT Budget
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, September 21 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions IT Services Email Privacy Network Security Malware Internet Data Hackers Software Data Backup Outsourced IT Productivity Managed IT Services Computer Innovation Microsoft Business IT Support IT Support Data Recovery Hardware Ransomware Mobile Devices User Tips Efficiency Tech Term Google Backup Cloud Computing Small Business Upgrade Internet of Things Business Continuity Windows 10 Managed Service Provider Managed IT Services Collaboration Business Management Communication Remote Monitoring Phishing Smartphone Paperless Office Android Disaster Recovery VoIP Smartphones Managed IT Encryption Save Money Social Media Artificial Intelligence Data Management Windows 10 Workplace Tips Windows communications Browser Server Cybersecurity Office 365 Facebook Help Desk Saving Money Mobile Device Risk Management BYOD Managed Service Automation Holiday Mobile Device Management Wi-Fi Document Management Quick Tips Passwords BDR App Recovery Network Virtualization Password Laptops Applications Chrome Analytics Government Unified Threat Management Healthcare Bandwidth Firewall Employer-Employee Relationship Compliance Robot Apps Gmail Training Business Technology Bring Your Own Device Going Green Microsoft Office Vendor Management Wireless Big Data IT Management Tip of the week Avoiding Downtime Scam Antivirus Project Management Hosted Solution Website Infrastructure Miscellaneous Telephone Systems SaaS Money Vulnerability Blockchain Information Data storage Content Filtering Processor File Sharing Tablet Operating System Printing RMM Files Users Unified Communications Remote Computing Settings Customer Service Router Two-factor Authentication Politics Downtime Apple Work/Life Balance VPN Virtual Reality Social Customer Relationship Management Data Security Regulations Data loss Office IT Service Computing Access Control Computers Mobility Information Technology Storage Windows 7 Gadgets Professional Services Company Culture How To Samsung Mouse Recycling Outlook Word Dark Web Flexibility Google Drive Redundancy Chromebook Proactive Spam Private Cloud Business Growth The Internet of Things WiFi Software as a Service Tech Support YouTube Remote Monitoring and Management Upgrades Maintenance Management Mobile Computing Smart Technology Digital Payment Networking Hacker Twitter Net Neutrality Administration Patch Management Websites Identity Theft Licensing Education Remote Workers LiFi Wireless Technology Legal Virtual Private Network Display Current Events Network Management Internet Exlporer IT solutions End of Support Health IoT HIPAA Assessment Server Management Cooperation How To Monitors Alert Budget Mobile Security Sports Electronic Medical Records Machine Learning Monitoring Uninterrupted Power Supply Bitcoin Employees Consultation Social Networking Asset Tracking Statistics Mobile Data Managed Services SharePoint Staff Buisness Conferencing Address Wireless Internet Break Fix MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Safety Fraud Screen Reader G Suite History Utility Computing Consulting Search Dark Data Personal Information Windows 8 Save Time Transportation Mirgation Tracking Development Zero-Day Threat Superfish Motherboard Google Maps OneNote Bluetooth Identities Virtual Assistant Vendor Downloads Augmented Reality Taxes Managing Stress Instant Messaging Employer/Employee Relationships Tech Terms Proactive IT Notifications Remote Worker Batteries User Error Language eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Black Market Google Wallet Projects Smart Tech Cabling Managed Services Provider Shortcut Migration Cables Backup and Disaster Recovery Data Warehousing Employee-Employer Relationship Hard Drives Google Docs Wasting Time Smart Devices Operations Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Network Congestion Humor Solid State Drives Technology Assurance Group ’s 18 Time Management Drones Return on Investment Cybercrime Cost Management E-Commerce WannaCry Computer Repair Backups Teamwork Technology Tips Chatbots Wires Human Error Database Management Microsoft Excel Modem Sync Connectivity Hacking Physical Security Solid State Drive Database Sensors Multi-Factor Security Wearable Technology Telephony Vulnerabilities Authentication Retail Deep Learning Cortana Virtual Desktop WPA3 Financial Servers Data Breach 3D Printing Notes File Management Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Options Distributed Denial of Service Annual Convention Public Cloud Permission Alt Codes Processors Active Directory Travel Hard Drive Features Shared resources Comparison Identity Botnet GDPR Cookies Mobile Device Managment Software Tips Disaster Trending Office Tips Cryptocurrency Voice over Internet Protocol Google Calendar Geography Authorization Automobile Computer Care Fleet Tracking Procurement Technology Laws Unsupported Software Virus PowerPoint Value of Managed Services Gadget Mobile Favorites Mail Merge Update 5G Managed IT Service San Diego Test Touchscreen Techology Typing Windows Server Cache Electronic Health Records VoIP Sponsor Hacks OneDrive Specifications Best Practice USB Permissions Nanotechnology Marketing Star Wars Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant Printers Error Emergency Web Server CrashOverride Payment Cards Cameras Regulation Motion Sickness