Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Tips From the 90s That You’ve Completely Forgot

b2ap3_thumbnail_dial_up_and_other_90s_tech_400.jpgThe 1990s were dominated by all sorts of great technology: VHS, floppy disks, and grossly oversized computer hardware. Learning new technology shortcuts was once all the rage, but when looked at now, these tech tips are rendered obsolete. However, that doesn’t stop them from hitting us right in the nostalgia. Here are some of our favorite tech tips from the 1990s.

Keep the Phone Line Open
Do you remember the good old days of only having one phone line per household? Only one person could use the phone at a given time. This meant that people had to use their imagination to keep the phone available for an important call. For example, one way to do this was to call an automated phone service, like a local movie theater for showtimes, which would repeat itself over and over again. The idea was to wait until the phone would notify you that your call was coming in. If someone were to pick up another phone, they wouldn’t hear the dial tone, keeping your plot a secret.

Use Collect Calls for Quick Messages
In the ‘90s, collect phone calls were popularized with dozens of collect call services, like 1-800-COLLECT. These calls worked by providing a brief moment to relay your name so that the person you were calling could accept the charges. Rather than actually pay for these calls, people would simply record short messages during this brief window and hang up before the charges could be accepted. Think of it like a primitive version of text-messaging. While it may not have been the most ethical practice, it sure was convenient.

Blow On Video Game Cartridges to Make Them Work
Classic gaming consoles that used cartridges, like the Nintendo Entertainment System or the Super Nintendo, were always subject to occasional hiccups. Somehow, blowing on the game’s innards seemed like a good idea to resolve the issue. Oddly enough, most of the time it worked, even though science has proven that doing so can actually corrode the cartridge’s connectors. It’s more likely that the success wasn’t a result of blowing on the cartridge, and instead it was simply from plugging in the game a second time.

Store a Disposable Camera in Your Car’s Glove Compartment
Having a camera phone today is considered commonplace rather than a luxury. The people of the ‘90s weren’t nearly as privileged, and instead had to rely on disposable cameras in their times of need. By keeping one in your car’s glove compartment, you always had a way to record events, particularly in case of a car accident. Well… after you wait several hours for the photos to develop at the drugstore, that is.

Keep Extra AA Batteries for Your Portable CD Player
Pretty much any modern portable music device runs with a rechargeable battery. Before this innovation, however, portable CD players were all the rage, and they required that you lug around your CD collection, just to have some variety in your playlist. If you wanted to go all-in with your music-listening, you had to bring extra batteries with you, just in case your CD player ran out of battery life. How’s that for inconvenience?

While these tips might not seem so special now, for many, they are remembered fondly, and are a cause to celebrate just how far technology has come in recent times. What are some of your favorite technology tips for long-obsolete devices? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Communication Business Continuity IT Support Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Server Data Recovery Save Money Passwords Windows 10 Chrome Virtualization Social Media Tech Term Saving Money Holiday Gadgets Managed Service Automation Managed IT Services Microsoft Office Facebook Computers Cybercrime Operating System Artificial Intelligence Health BYOD Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Information Information Technology Remote Covid-19 Spam Managed Service Provider Alert Office 365 Telephone Systems Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility App History Password Money Encryption Mobile Computing Applications Human Resources Application Law Enforcement Remote Monitoring Data Breach Big Data Office Tips Training Apps How To VPN Remote Computing Data Storage Patch Management Government Mobile Office Private Cloud Blockchain Paperless Office Managed IT Work/Life Balance Wireless Data Security Flexibility Infrastructure Voice over Internet Protocol Gmail Marketing WiFi Settings IT solutions Google Drive Entertainment Website Budget Two-factor Authentication Vulnerability Avoiding Downtime Mouse HaaS Windows 7 Word Servers Bring Your Own Device Data Management Cleaning Connectivity Remote Work The Internet of Things Lithium-ion battery End of Support Physical Security Education Safety Firewall HIPAA Sports Redundancy USB Vendor Keyboard Data Protection Virtual Reality Apple Managed Services Conferencing Display Social Scam User Error Employee/Employer Relationship Meetings RMM Save Time Vendor Management Software as a Service Telephone System Staff Risk Management Machine Learning Hacker Update Compliance Computing Infrastructure Digital Signage Virus OneNote Computer Care Going Green DDoS Current Events Google Docs Telephony Unified Threat Management Computer Accessories Identity Theft Samsung SharePoint Procurement Battery Workplace Strategy Shadow IT Net Neutrality Value Legal Customer Service Help Desk Spam Blocking Electronic Medical Records Internet Exlporer Printing Augmented Reality Environment Printer Fraud Bluetooth Fax Server Hiring/Firing PDF Remote Worker Managed Services Provider SaaS Cryptocurrency Database Proactive IT IT Consultant Best Practice Remote Workers Comparison Network Congestion YouTube eWaste Black Market Processor Business Intelligence Humor CES Audit Worker Hard Drive IT Management Document Management Business Technology Content Management Botnet Access Control Solid State Drive Wireless Technology Wearable Technology Downtime IT Plan How to Retail Computing Virtual Assistant Hard Drives Instant Messaging Authentication Data storage Robot Excel Unsupported Software Automobile Biometrics Charger Virtual Desktop Digital Signature Emails Dark mode Trend Micro Sync Warranty Default App SMS Reputation Procedure User Streaming Media Saving Time PowerPoint HVAC Science Windows Media Player Google Apps Analysis Netflix Content Two Factor Authentication dark theme Tech Support Shopping Google Search Administrator IT Infrastructure Devices Root Cause Analysis Techology Laptop AI Music Distributed Denial of Service Customers FinTech Managing Stress Customer Relationship Management Enterprise Content Management HBO Bing Knowledge Accountants Audiobook Social Network MSP Analyitcs Skype Microchip Programming Investment Cameras Thought Leadership Data loss Credit Cards Touchpad Troubleshooting Employees Employee/Employer Relationships Password Management Outlook Password Manager Leadership Politics Multi-Factor Security Advertising Windows 365 Start Menu ISP Video Conferencing Search Engine ROI Twitter Screen Mirroring Loyalty Antivirus Books Sales Notifications Bitcoin NIST Windows 8 Frequently Asked Questions Shortcuts Business Mangement Cryptomining Smart Tech Windows 10s Trending Point of Sale IT service Personal Mobile Supply Chain Management Printer Server Addiction Cast Amazon Emergency Relocation Monitoring Batteries Tablet Tip of the week Recycling webinar Professional Services Practices Public Cloud Employer Employee Relationship Windows 8.1 Domains Digitize Wiring Windows Server 2008 R2 Cache Amazon Web Services Assessment Video Games Worker Commute IaaS Customer relationships Maintenance Safe Mode Windows Server 2008 Criminal Bloatware Tools Manufacturing Hosted Computing Experience Email Best Practices IT Assessment GDPR Wireless Internet Online Shopping Television Scalability Business Owner Computer Tips Managed IT Service File Sharing Tablets Security Cameras Entrepreneur Biometric Security Inventory Specifications Virtual CIO NarrowBand OneDrive Camera Peripheral Wire Evernote Public Computer Search Travel Transportation iPhone Digital Security Cameras Shortcut Using Data Regulations Cost Management 5G Computer Fan Millennials Rootkit Copiers Consultant Printers Quick Tip Social Networking Analytics Smart Office Wireless Charging Workers Benefits Files Ergonomics Smartwatch OLED FENG Workforce Chromecast Development Best Available Virtual Private Network Running Cable PCI DSS WIndows 7 Virtual Machine Cables IBM Smart Technology Colocation 2FA Uninterrupted Power Supply Fiber Optics Memory Flash Employee Project Management Cabling Nanotechnology Telecommuting Messaging Monitor Policy Hypervisor Software Tips Cortana Supercomputer

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code