Let us be your IT department!
Call us Today! (703) 821-8200


Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Software Productivity Business Computing Backup Hackers Data Saving Money Hardware Business Malware IT Support Email IT Services Hosted Solutions Efficiency Google Quick Tips Smartphones Gadgets Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery User Tips Virtualization Computer Server Network Microsoft Office Network Security Miscellaneous Windows 10 Upgrade VoIP Social Media Windows Unified Threat Management Mobile Device Management Operating System Smartphone Innovation Remote Computing Passwords Ransomware BYOD Communication Android WiFi Vendor Management Mobile Computing Marketing Apps The Internet of Things Firewall Managed IT services Remote Monitoring Facebook Users History Holiday Apple Collaboration Data Management Analytics IT Consultant Alert Save Money Outsourced IT Managed IT Services Automation Content Filtering Big data Bring Your Own Device Health Office Outlook Lithium-ion Battery Hard Drives Virus Phishing App Hiring/Firing Productivity Windows 8 Best Practice BDR Spam Going Green Tech Support Wireless Technology Search IT Support Managed IT Help Desk Antivirus Phone System Gmail Internet of Things Browser Recovery Employer-Employee Relationship Information Technology IBM Printer Encryption Budget Data Backup Education Data storage Maintenance Administration Save Time Proactive IT Money Computers Running Cable Artificial Intelligence SaaS Bandwidth Humor communications Saving Time Customer Service Wireless Update Website Travel It Management Securty Hard Drive Digital Payment Solid State Drive Flexibility Hacking PowerPoint Windows 10 Office 365 Social Networking Legal User VPN Twitter Hosted Solution DDoS Data Recovery Government iPhone Fax Server Business Intelligence Word Risk Management Black Market Password Mobile Device Document Management Hacker Computer Repair Networking Avoiding Downtime Tablet Telephone Systems Training Intranet Current Events Two-factor Authentication Disaster Documents Excel Programming Streaming Media User Error End of Support Inbound Marketing Public Cloud Heating/Cooling Law Enforcement Cybersecurity Chrome Politics Gaming Console Retail Mobility Experience Webcam Router Computer Accessories Automobile Comparison Customer Relationship Management Augmented Reality Laptop How To Text Messaging Office Tips Start Menu Taxes Safety Paperless Office Sports Social Co-managed IT Computing Uninterrupted Power Supply Network Congestion Robot Net Neutrality IT service Cybercrime Lifestyle Compliance Cortana Cloud Computing Cost Management Trending Hack Business Growth Processors Downtime Telephony Monitors USB Presentation Statistics Company Culture YouTube Virtual Desktop Pain Points Settings Google Drive Drones Employer Employee Relationship Banking File Sharing Webinar Licensing Upselling Teamwork Botnet Storage Language Leadership Electricity Permissions PDF Business Metrics Best Available Device Management Business Technology Writing switches Keyboard Computer Malfunction Domains Product Reviews WannaCry Time Management eWaste Read Chromebook Best Practives Value online Currency Messenger Scam Shortcut Motion Sickness Troubleshooting Microserver Work/Life Balance Cryptocurrency Touchscreen Google Docs Tracking Staffing Environment Download Books Mouse Knowledge IT consulting Competition Web Server Business Owner Turn Key Digital Cleaning Microchip Trojan Websites GPS Workers CIO Reading Organize Tech Terms Regulations Windows XP Application Society Specifications Access Hacks Ebay Software as a Service Micrsooft 3D Samsung Digital Signature Relocation Recycling G Suite Physical Security Entertainment Identity Theft Spyware Notifications Pirating Information Adminstration Tablets Reliable Computing Data Protection Sync Music CCTV Analytic Virtual Reality cache Social Engineering Patch Management Upgrades Google Maps Harddrive Content Management Bluetooth Corporate Profile LiFi In Internet of Things Public Speaking Emails External Harddrive Computing Infrastructure Assessment Rental Service Video Surveillance Redundancy Deep Learning Scalability Entrepreneur HIPAA LinkedIn Business Managemenet Memory Saving ZTime VoIP Visible Light Communication Meetings Electronic Payment Smart Phones Wi-Fi Get More Done Consultation Printer Server Debate Project Management Cabling Private Cloud Archive Flash Advertising Administrator IP Address Google Wallet Supercomputer Human Resources Point of Contact Emergency Displays Worker Machine Learning Skype Thin CLient Unified Communications Distributed Denial of Service Vulnerability CrashOverride 3D Printing Capital Productuvuty

hp supplies medallionLarge2017