800 797 5478

free quote

BROOKLYN, N.Y., Feb. 28, 2017 – On February 7th 2017, Liquid Technology, an e-Stewards certified IT asset disposition (ITAD) company, passed an unannounced inspection in their Brooklyn facility. The surprise inspection is part of e-Stewards’ Performance Verification program. e-Stewards piloted the program in July of 2015. The Basel Action Network (BAN) established e-Stewards in 2003. The Performance Verification program ensures that e-Stewards certified companies are abiding by specific guidelines. Now the program is being used to audit companies across the country. Stephen Sidwell, Liquid Technology’s SVP of Technology & Compliance, […]


Liquid Technology was recently featured in an article on VICE.com. In the article was a short video that highlighted our team and Brooklyn facility. The video gives a sneak peek into our work, and how we properly handle CRT monitors. Read the full article at VICE.com.


Last year, Microsoft released Windows Server 2016. The latest Windows Server has a ton of new features and capabilities. Below is a list of some of the new features that stand out: 1)    More Memory Windows Server 2016 can support 24 terabytes of physical memory per machine. For VMs, Windows Server 2016 can allocate 16TB. Microsoft upgraded the Dynamic Memory feature as well. Now you can increase the minimum and maximum limits while the VM is running. The new capabilities of the Dynamic Memory guarantee more efficiency. 2)    Containers Containers […]


Each year, hackers attack an enormous amount of companies. These data breaches can be extremely costly for businesses. A report sponsored by IBM claimed data breaches on average cost a company $4 million. Last year companies faced some of the largest hacks and data breaches on record. Here is a review of the top data breaches of 2016: 1)  Panama Papers Early last year, the Panama Papers caused a big stir. The Mossack Fonseca hack exposed many high profile people. Iceland’s former Prime Minister, Sigmund Davio Gunnlaugsson was deeply affected […]


In 2016, we saw a few trends that got us a step closer to the world we once only experienced in sci-fi movies or television shows. This year, we expect to see more digital advances. Many of these advances will change the way we interact with the world as we know it. We believe there are a few digital trends that will take center stage in 2017; below are our top four predictions: 1.The Reality of AR/VR Pokemon Go became a phenomenon in 2016. The augmented reality game was a […]


Hacking is no longer a naughty word. Google, Facebook, and Microsoft are employing hackers to help them test products and services. Even the government employed hackers to test their cyber security. Could employing a hacker help your company? Below are five examples of how organizations are using friendly hacking to improve their business: Facebook Bug Bounty In 2013, Facebook had a rude awakening. A computer science student exploited the social network’s vulnerability and posted a letter to Mark Zuckerberg’s page. The student Khalil Shreateh tried to notify the team prior […]


In 2009, President Obama hired the first Chief Information Officer of the United States, Vivek Kunda. Hiring Kunda was not the only change the Obama administration made regarding technology. Here is a list of five things that changed about the U.S. government’s technology during Obama’s presidency: 1.New Tech Titles The Obama administration hired tech professionals to implement the government’s tech initiatives. Obama hired a former eBayer and Microsoft cybersecurity expert, Howard Schmidt, to be the first CTO. Mikey Dickerson, a former Googler, became the administrator of the U.S. Digital Service. […]


Do you have a cybersecurity framework in place? Or are you looking to build a better plan for securing your organization’s data for 2017? Well, consider utilizing the NIST (National Institute of Standards of Technology) Baldrige Cybersecurity Excellence Builder. NIST created the Baldridge Cybersecurity Excellence Builder to help enterprises evaluate the impact and effectiveness of their cybersecurity risk management initiatives. NIST’s Cybersecurity Framework and the Baldrige Performance Excellence Program served as the model for the self-assessment tool. The NIST program provides a framework to improve organizations performance and get sustainable […]


The United States is one of the only countries still exporting e-Waste to developing countries. The U.S. signed the Basel Convention but has yet to ratify it. The Basel Convention is an international treaty created to prevent the trade of hazardous waste between nations. BAN (Basel Action Network) is petitioning President Obama to change the U.S. e-Waste policies. BAN Startling e-Waste Discovery BAN started the e-Trash Transparency Project to collect data on the e-Waste recycling process. BAN’s project uncovered some startling results. 40% of America’s e-waste is shipped overseas. Not […]


Pokemon Go was a huge phenomenon this summer. In July, the US reported there were 15 million downloads of the app. The popularity of the augmented reality app has made it a target for cyber criminals. Pokemon Go is a Security Risk When Pokemon Go first launched users automatically granted the app full access to their Google accounts. The sign-up process made users’ Google accounts vulnerable. Giving an app full permission can pose major security issues for a company. If a business account is connected, the app would have access […]