Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Tips From the 90s That You’ve Completely Forgot

b2ap3_thumbnail_dial_up_and_other_90s_tech_400.jpgThe 1990s were dominated by all sorts of great technology: VHS, floppy disks, and grossly oversized computer hardware. Learning new technology shortcuts was once all the rage, but when looked at now, these tech tips are rendered obsolete. However, that doesn’t stop them from hitting us right in the nostalgia. Here are some of our favorite tech tips from the 1990s.

Keep the Phone Line Open
Do you remember the good old days of only having one phone line per household? Only one person could use the phone at a given time. This meant that people had to use their imagination to keep the phone available for an important call. For example, one way to do this was to call an automated phone service, like a local movie theater for showtimes, which would repeat itself over and over again. The idea was to wait until the phone would notify you that your call was coming in. If someone were to pick up another phone, they wouldn’t hear the dial tone, keeping your plot a secret.

Use Collect Calls for Quick Messages
In the ‘90s, collect phone calls were popularized with dozens of collect call services, like 1-800-COLLECT. These calls worked by providing a brief moment to relay your name so that the person you were calling could accept the charges. Rather than actually pay for these calls, people would simply record short messages during this brief window and hang up before the charges could be accepted. Think of it like a primitive version of text-messaging. While it may not have been the most ethical practice, it sure was convenient.

Blow On Video Game Cartridges to Make Them Work
Classic gaming consoles that used cartridges, like the Nintendo Entertainment System or the Super Nintendo, were always subject to occasional hiccups. Somehow, blowing on the game’s innards seemed like a good idea to resolve the issue. Oddly enough, most of the time it worked, even though science has proven that doing so can actually corrode the cartridge’s connectors. It’s more likely that the success wasn’t a result of blowing on the cartridge, and instead it was simply from plugging in the game a second time.

Store a Disposable Camera in Your Car’s Glove Compartment
Having a camera phone today is considered commonplace rather than a luxury. The people of the ‘90s weren’t nearly as privileged, and instead had to rely on disposable cameras in their times of need. By keeping one in your car’s glove compartment, you always had a way to record events, particularly in case of a car accident. Well… after you wait several hours for the photos to develop at the drugstore, that is.

Keep Extra AA Batteries for Your Portable CD Player
Pretty much any modern portable music device runs with a rechargeable battery. Before this innovation, however, portable CD players were all the rage, and they required that you lug around your CD collection, just to have some variety in your playlist. If you wanted to go all-in with your music-listening, you had to bring extra batteries with you, just in case your CD player ran out of battery life. How’s that for inconvenience?

While these tips might not seem so special now, for many, they are remembered fondly, and are a cause to celebrate just how far technology has come in recent times. What are some of your favorite technology tips for long-obsolete devices? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Managed IT Services Windows Upgrade Phishing Outsourced IT Ransomware Data Backup Windows 10 Office Data Recovery Server Cloud Computing Save Money Windows 10 Passwords Social Media Virtualization Gadgets Saving Money Holiday Chrome Tech Term Managed IT Services Managed Service Microsoft Office Automation Computers Cybercrime Artificial Intelligence Operating System Facebook Health Internet of Things BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Covid-19 Alert Spam Office 365 Information Managed Service Provider Telephone Systems Remote Information Technology Router Employer-Employee Relationship Recovery BDR Bandwidth Social Engineering Mobility Data Breach Human Resources Mobile Computing Law Enforcement Application Remote Monitoring Password Money Big Data App History Encryption Applications VPN Government Remote Computing Private Cloud Mobile Office Blockchain Managed IT How To Paperless Office Apps Office Tips Data Storage Patch Management Training Gmail Flexibility Settings Servers Marketing Avoiding Downtime WiFi Two-factor Authentication IT solutions Entertainment Website Budget Data Security Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Wireless Vulnerability Voice over Internet Protocol Windows 7 Word Google Drive Sports HIPAA Redundancy Keyboard Vendor Data Protection Vendor Management Firewall Managed Services Display Virtual Reality Apple USB Social Employee/Employer Relationship Save Time RMM User Error Meetings Telephone System Staff Software as a Service Cleaning Machine Learning Connectivity Remote Work Risk Management Hacker End of Support Conferencing Education Physical Security The Internet of Things Lithium-ion battery Safety Scam PDF IT Management Fraud Unified Threat Management Customer Service Remote Worker Botnet Computer Accessories Proactive IT Environment Managed Services Provider IT Plan Cryptocurrency Best Practice Fax Server Database YouTube Unsupported Software Remote Workers Black Market SaaS Comparison Charger Printer Processor Bluetooth CES Compliance Document Management OneNote Computer Care Solid State Drive Current Events Wireless Technology Network Congestion Hard Drive Business Technology Telephony Content Management How to Downtime eWaste Access Control Samsung IT Consultant Virtual Assistant Computing Data storage Authentication Automobile Value Humor Spam Blocking Electronic Medical Records Wearable Technology Retail Hard Drives Computing Infrastructure Going Green Instant Messaging Robot Excel Digital Signage Update Hiring/Firing Biometrics Virtual Desktop Battery Google Docs Shadow IT Identity Theft Legal Procurement Net Neutrality DDoS Workplace Strategy Internet Exlporer Business Intelligence Help Desk SharePoint Augmented Reality Printing Audit Worker Virus Public Computer PowerPoint Windows Media Player Search Engine Video Conferencing Analyitcs Twitter ROI User Bitcoin Regulations Business Mangement Shortcuts Transportation Sales Programming NIST Point of Sale Personal Smart Tech Cryptomining Computer Fan Trending Relocation Rootkit Supply Chain Management Addiction Managing Stress Amazon Batteries Recycling Video Games Workers Benefits Antivirus Monitoring Windows 8.1 Wiring Digitize Windows 8 Practices Worker Commute FENG Cameras IBM IT service Cache Windows Server 2008 R2 Experience Amazon Web Services Flash Criminal Scalability Smart Technology Customer relationships Safe Mode Email Best Practices GDPR IT Assessment Tablet Hosted Computing Manufacturing Business Owner Supercomputer NarrowBand Domains Wireless Internet Software Tips Online Shopping File Sharing Managed IT Service Sync Security Cameras Search Emails Computer Tips IaaS Virtual CIO Maintenance Camera OneDrive Inventory Biometric Security Specifications iPhone Printer Server Evernote Peripheral Bloatware Wire Using Data Netflix Travel Two Factor Authentication Digital Security Cameras Printers Copiers Tablets 5G Root Cause Analysis Millennials Files Wireless Charging Knowledge Chromecast Music Quick Tip Entrepreneur Smart Office HBO Skype Smartwatch Ergonomics Uninterrupted Power Supply Shortcut Virtual Private Network Development OLED Data loss Workforce Colocation Cables Leadership Troubleshooting PCI DSS Cost Management Virtual Machine Outlook Social Networking Fiber Optics Start Menu Employee Monitor 2FA Project Management Messaging Nanotechnology Cabling Screen Mirroring Telecommuting Loyalty Cortana Books Policy Hypervisor Frequently Asked Questions Trend Micro Mobile Digital Signature Windows 10s Consultant Reputation Running Cable Streaming Media Dark mode Analytics Tech Support Warranty SMS Memory Default App Content Cast Tip of the week Google Apps Techology webinar Laptop Emergency Procedure HVAC Saving Time Shopping Professional Services Analysis Google Search Public Cloud Best Available Customers Employer Employee Relationship dark theme Assessment Administrator AI Devices IT Infrastructure Audiobook WIndows 7 Windows Server 2008 Bing Touchpad FinTech Enterprise Content Management MSP Social Network Tools Science Accountants Television Microchip Thought Leadership Investment Politics Credit Cards Advertising Password Manager Employees Password Management Employee/Employer Relationships Windows 365 Customer Relationship Management ISP Multi-Factor Security Distributed Denial of Service Notifications

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code