Follow us: 

YouTube IconGoogle+ IconFacebook IconLinkedIn IconTwitter Icon


Scary Facts About E-Waste (Infographic)

Scary Facts About E-Waste (Infographic)

Halloween may be the only day of the year where people enjoy being scared and spooked. From haunted houses to scary movies, we all love a good fright to go with our bowl-fulls of candy. However, fiction can never quite master the scares delivered by shear reality, and this particular reality is quite terrifying. ThisRead more

ITAD Horror Stories

ITAD Horror Stories

Proper IT asset disposition is imperative for your business. Without a secure chain of custody, millions of people’s sensitive data can be stolen and sold into the wrong hands. When data becomes compromised, it can lead to millions or even billions of dollars in lawsuits and the breach of human privacy. There are numerous companiesRead more

What is the Value of My Old IT Assets?

What is the Value of My Old IT Assets?

For companies considering upgrading or selling their old IT assets, there is always the looming question of whether or not their IT assets are too old to retrieve any reasonable value. This uncertainty can keep you and your company from pulling the trigger on any decisions to proceed with a project. Although it depends onRead more

Data Center Liquidation – The Best Approach

Data Center Liquidation – The Best Approach

There are many things a data center manager has to consider when opening a new data center or redesigning an existing one. From how to properly construct and design the room, to outfitting the room with the best equipment at the best price, to ensuring the data center is as green as possible to reduceRead more

The New (Millennial) Way to Recycle Your Old Technology

The New (Millennial) Way to Recycle Your Old Technology

Cloud computing, the Internet of Things, and interconnectivity are just three of the “23 Technologies of 2022” outlined by the IEEE CS 2022 Report, but they are perhaps the most crucial technologies supporting the future of mobile business.  With cloud computing, data and computing power can be stored offsite. The Internet of Things provides instantRead more

Data Destruction – Security Standards and Certifications Defined (Part 2)

Data Destruction – Security Standards and Certifications Defined (Part 2)

October 2014 marks the 11th year of “Cyber Security Awareness Month” as declared by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and the Multi-State Information Sharing and Analysis Center. To support this initiative to defend the American infrastructure against cyber-attacks, we have decided to continue to educate our customersRead more

Request a Consultation

  • This field is for validation purposes and should be left unchanged.