Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Recycling Technology: Is It the Best Answer?

Recycling Technology: Is It the Best Answer?

Let me ask you a simple question: how many cell phones have you had over the years? For some of us, upgrades are a yearly occurrence. For others possibly bi-yearly. Have you ever wondered where your old cell phone goes after it is out of your hands? 

Recycling is an important, but commonly forgotten topic in today’s digital age. Electrical devices are not something that can be mixed into your local landfill. It is a very toxic, hazardous waste. In various states across the US, it is actually illegal to dispose of electronics in the trash. So why is this?

Take a Look at What Is Inside

Inside of most electrical devices, you’ll find common materials such as aluminum, copper, and sometimes gold. Aluminum is typically used to create the structure of these electrical devices. It is a very common, strong, lightweight material. Copper and gold are excellent conductors and very resistant to corrosion when housed correctly. However, contained within most electrical devices are also toxic elements and materials. Sulfur, mercury, lead, chromium, beryllium oxide, cadmium; some or all of these could be lurking in that computer monitor you’re about to send off to the local landfill. 

Dispose of them Safely

As you might imagine with the ever-growing amount of electrical devices, there isn’t one set in stone procedure for all of this waste. There are also devices which most people do not even consider to be e-waste but should not be thrown away. When devices are sent away, typically they are crushed into as small of a space as possible. In this process, toxic chemicals and materials become exposed. Electrical devices typically need to be disassembled in order to be disposed of safely. E-waste is typically sent to processing plants which specialize in disassembling these products. While this is a safer route -- deconstructing these products is still a dangerous task. Let’s take a look at one example.

Samsung Note 7 -- A Hot Topic 

In the manufacturing industry, recalls are not uncommon. Devices are typically rigorously tested before leaving the plant, but what happens when a fatal flaw appears? This is exactly what happened with the Samsung Note 7. While models were quickly pulled from shelves, the batteries that powered them still are used in a variety of products. These batteries became notorious for short circuiting, which led to them combusting or even exploding. These devices required manual disassembling. 

Workers at the recycling plant were in charge of disassembling these potentially dangerous devices. They were equipped with heavy duty gloves, tongs, and even fire containment bins. What makes these devices different from the AA batteries you change every few months in your TV remote, is the fact that they are lithium ion batteries. These contain thousands of connected cells meaning they have an incredible amount of potential energy. This is why they can be so destructive.

Different battery technologies are enabling consumers to have longer lasting, more powerful devices. Whether it’s your new and improved battery in your smartphone, or your battery powered lawn mowers, hedge trimmers, or even the self-balancing hover board you purchased for Tim’s 12th birthday that just broke; these electrical devices need to be handled responsibly.

So, what do you do? Recycle battery powered devices, or dispose of them?

All devices, whether it’s your outdated cell phone, your undersized computer monitor, or even your in-home appliances -- all should be handled properly if you decide their product life has expired. You don’t know what toxic material is lurking in the underbelly of your device, and when dealing with your environment waste plant workers lives; it’s better to be safe than sorry.

If the time has come and replacing office devices has become imminent, Central Technology Solutions can help. Our professionals have the know-how to make sure you are disposing of your devices safely and in a responsible manner, without risking losing or exposing critical data. Call 1-844-237-4300 to learn more.

Why Managed Services: Proactive Maintenance and Ma...
Tip of the Week: Extend Your IT Budget
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 28 2020

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Privacy Data Network Security IT Services Email Data Backup Malware Internet Hackers Software Outsourced IT Microsoft IT Support Business Innovation Computer Productivity Data Recovery Managed IT Services Efficiency Mobile Devices Upgrade IT Support Hardware Google Cloud Computing Backup Ransomware Phishing Small Business Business Continuity User Tips Tech Term Windows 10 Communication Collaboration Cybersecurity Managed Service Provider Managed IT Services Internet of Things Workplace Tips Smartphone Smartphones Android Business Management VoIP Paperless Office Disaster Recovery Remote Monitoring Data Management Managed IT communications Facebook Social Media Windows Office 365 Artificial Intelligence Save Money Encryption Server Managed Service Windows 10 Virtualization Network Browser Quick Tips Mobile Device Miscellaneous BDR Passwords Holiday Help Desk Wi-Fi BYOD Saving Money Risk Management Password Automation Mobile Device Management App Government Healthcare Document Management Compliance Business Technology Apps Vendor Management Windows 7 Gmail Recovery Analytics Applications Laptops Firewall Avoiding Downtime Big Data Unified Threat Management Chrome Employer-Employee Relationship Robot Bandwidth Bring Your Own Device Going Green Training Microsoft Office File Sharing Processor Content Filtering IT Management Redundancy Tip of the week Apple Scam Antivirus Users Project Management Infrastructure Money SaaS Hosted Solution Data storage Telephone Systems Data loss Vulnerability Website Information Blockchain Computers Wireless Storage Tablet Remote Computing RMM Files Settings Gadgets Customer Service Software as a Service Two-factor Authentication Politics Router Unified Communications Social Maintenance Work/Life Balance VPN Virtual Reality Customer Relationship Management Downtime Computing Data Security Regulations IoT Office IT Service Access Control Information Technology Printing OneDrive Machine Learning Mobility Operating System Outlook Monitoring Uninterrupted Power Supply Mouse Employees Consultation Professional Services Company Culture Meetings Recycling Sports Google Drive How To Samsung Utility Computing Consulting Word Search Flexibility Augmented Reality Business Growth Chromebook Dark Web Private Cloud Proactive Mobile Computing Managed Services Provider Tech Support The Internet of Things Hacker Employee-Employer Relationship Management Smart Technology Spam Digital Payment Solid State Drive Remote Monitoring and Management Upgrades Current Events Patch Management Social Network WiFi Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality YouTube Licensing Remote Workers File Management Virtual Private Network Display Hard Drive End of Support Health Administration Network Management Internet Exlporer Payment Cards HIPAA Education Budget Assessment LiFi Cooperation How To Monitors Bitcoin Server Management Electronic Health Records Electronic Medical Records Co-Managed IT IT solutions Alert Mobile Security Star Wars Telephone Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering USB Video Conferencing Permissions Nanotechnology Mobile Data Managed Services SharePoint Staff Conferencing Address Wireless Internet Business Telephone Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Unified Threat Management Hotspot Crowdsourcing Cyberattacks Digital Obstacle Manufacturing Optimization Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras User Management Dark Data Personal Information Transportation Mobile VoIP Marketing Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Bluetooth Virtual Assistant Vendor Downloads Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships IT Assessment Buisness Motherboard Google Maps OneNote User Error Language eWaste Read Only Spyware Course Hard Disk Drives Virtual Machines Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker Batteries Humor Shortcut Cyber security Migration Cables Backup and Disaster Recovery Black Market Projects Smart Tech Cabling Wasting Time Smart Devices Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Digitize Data Warehousing Backups ROI Remote Work Computing Infrastructure Point of Sale Deep Learning Network Congestion Solid State Drives Credit Cards Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting Cybercrime Cost Management E-Commerce WannaCry Computer Repair Teamwork Technology Tips Chatbots Wires Human Error Time Management Return on Investment Hacking Physical Security Database Sensors Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Shadow IT Microsoft Excel Modem Sync Connectivity Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Options Holidays Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Travel Features Shared resources Windows Server 2008 Comparison Identity Botnet Permission Processors Active Directory Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization GDPR Outsourcing Cookies Mobile Device Managment Software Tips Hacks Unsupported Software Virus PowerPoint Value of Managed Services Virtual Desktop Gadget Best Practice Mobile Favorites Mail Merge Update 5G IT Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Cache VoIP Sponsor Specifications Test Touchscreen Techology Windows Server CCTV Administrator Relocation Webcam Hard Disk Drive Students IT Consultant Printers Error Emergency Web Server CrashOverride Cameras Motion Sickness Regulation