Feeds

eBay bids for PC recycling glory

Assembles PC coalition

  • alert
  • submit to reddit

Intelligent flash storage arrays

CES 2005 eBay is to tackle "e-waste": obsolete PCs that poison the environment when dumped in landfills.

At CES yesterday the online auction giant announced the Rethink Initiative, to promote re-use and recycling. The centrepiece is a website that helps consumers and businesses learn about product disposal options, such as recycling and refurbishing.

Working computers can be sold or donated through the Rethink Initiative site. Tools to aid selling on eBay include a safe data destruction utility, listing helpers that automatically identify system components, and information on how to purchase protective shipping kits. The Rethink Initiative also provides access to a directory of third-party sellers who can pick up one or more PCs and sell them on behalf of the owners.

With Intel as its main ally, eBay's Rethink Initiative co-ordinates efforts by companies such as Apple, Gateway, HP, IBM and Ingram Micro, along with the US Environmental Protection Agency, the Silicon Valley Toxics Coalition, UPS and the US Postal Service. Plans for similar European initiatives have yet to be announced.

In the US alone some 133,000 PCs per day are retired and replaced by their original owners, Gartner, the IT analyst firm, estimates, Only about 10 per cent of unwanted PCs in the US are recycled, the Grass Roots Recycling Network says.

The problem is expected to become worse: In the next three years, individuals and organisations worldwide will replace more than 400 million computers. The average mobile phone in the US is replaced after just 18 months. More than 75 per cent of all computers ever sold remain stockpiled in closets, garages, office storage rooms and warehouses. ®

Related stories

Wales to host new £1m CRT recycling plant
Sita flogs WEEE ops to Oz recycling giant
Dell jumps on UK recycling bandwagon
VIA offers hard disk data scrub code
Old PCs are goldmine for data thieves
UK gov to moot electronic tagging of dustbins
Brace your IT budget for green impact
Dell and HP have a green moment
Working up an appetite for destruction
Toxic PCs destroy life as we know it
PC disposal: recycle or build for durability?

Internet Security Threat Report 2014

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
Microsoft EU warns: If you have ties to the US, Feds can get your data
European corps can't afford to get complacent while American Big Biz battles Uncle Sam
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.