Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

What to Do With Your Old Power Converters, According to Star Wars

From Anakin being the possession of Watto the Toydarian junk dealer in the Phantom Menace--to Luke, Han, Leia, and Chewy being stuck warding off the Dianoga inside a trash compactor in the first Death Star in the original--to Rey picking junk off the crashed Star Destroyer and selling them to the Crolute Unkar Plutt on Jakku in The Force Awakens--Star Wars lore is filled with junk technology. If the back room of your business is starting to look like Watto’s shop, you may need to adjust your disposal strategies.

Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Privacy Malware Data Microsoft Efficiency Communication Internet Tech Term Google Smartphones Hardware Mobile Device Windows 10 Innovation Ransomware IT Support Hackers Email Cybersecurity Android Computer Business Management Passwords Small Business Software Browser Network Communications Cloud Users Mobile Devices Business Managed IT Services Workplace Tips Collaboration IT Services Applications Outsourced IT Smartphone Apps Cloud Computing Bandwidth Employer-Employee Relationship Managed IT services Data Backup VoIp Hosted Solutions Wi-Fi Information Backup Data recovery Internet of Things Saving Money Social Media Wireless Holiday Laptop Managed Service Gmail Business Intelligence Marketing Gadgets Blockchain Save Money Networking Microsoft Office Upgrade Value Company Culture Medical IT Facebook Office 365 Chrome Paperless Office Cortana Artificial Intelligence Healthcare Virtual Assistant Password Cost Management Analytics Telephony Mobility Wireless Charging Voice over Internet Protocol Data Security Net Neutrality Compliance Virtualization VPN Processor G Suite BDR Data Management RAM Managed IT Service Remote Monitoring and Management Computers Tech Terms Patch Management Miscellaneous Remote Computing Access Control Automation Office Connectivity Lead Generation Network Attached Storage Operating System Electronic Health Records Staff Video Dongle Paper Telecommuting Wearables Movies Knowledge Authentication Maintenance Tip of the week Analysis Certification Battery Phishing Error instant Messaging Processors Cables Content Filtering BYOD eCommerce Windows Technology Tips Managing Stress Comparison Troubleshooting Health Customer Service Ink SaaS Twitter Authorization Chrome OS Digital Data loss Router User Tip Data Breach Vulnerabilities Vulnerability Machine Learning Database Plug-In Wireless Internet Online Shopping Updates Streaming Media Workers GDPR Environment Specifications Update OneNote Government PowerPoint Inventory Unified Communications Voice over IP Spam Employees Websites Internet Explorer Training IT Management Downloads Sales Touchscreen Cryptocurrency Spyware Cybercrime Proactive IT Help Desk Backup and Disaster Recovery Millennials Personal Information WannaCry Server Management e-waste Outlook Big Data Windows Server 2008 R2 Sports Data Protection Human Resources Edge Virus Solid State Drive Safety Threat Security Cameras Server Hard Drives Trends Tablet Microsoft Office 365 Windows 7 HP Tactics Business Continuity Settings Display Business Technology Storage E-Commerce HIPAA disposal Bring Your Own Device Conferencing Profitability Taskbar Mobile Security Microsoft Teams Employee-Employer Relationship Antivirus Hard Disk Drive Printing Reporting Word SSD A.I. Excel Time Management Document Management Telecommute IT budget Dark Web Payment Hard Drive Hybrid Cloud Amazon Eliminating Downtime Physical Security National Security Printers Quick Tips Disaster Recovery Regulation Alert Benchmarks