Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

4 Ways a Unified Threat Management Solution Covers...
Tip of the Week: 11 Security Best Practices Every ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Software Workplace Tips Backup Business Computing Hackers Productivity Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Quick Tips Smartphones Small Business Gadgets Business Continuity Mobile Devices User Tips Mobile Office Disaster Recovery Computer Network Virtualization Network Security Server Microsoft Office VoIP Miscellaneous Upgrade Social Media Windows 10 Mobile Device Management Windows Unified Threat Management Ransomware Smartphone Android Operating System Remote Computing Innovation Passwords BYOD Communication Remote Monitoring WiFi Vendor Management Marketing Mobile Computing Apps The Internet of Things Holiday Collaboration Managed IT services Facebook Users Firewall History Apple Data Management Analytics Outsourced IT IT Support IT Consultant Alert Save Money Managed IT Services Phishing Automation Productivity Content Filtering Health Bring Your Own Device Big data Office Budget Virus Lithium-ion Battery App Hard Drives Managed IT Windows 8 Hiring/Firing Artificial Intelligence Best Practice Tech Support Spam Going Green BDR Browser Wireless Technology Search Outlook communications Encryption Update Maintenance Data Backup Cybersecurity Phone System Help Desk Antivirus Printer Gmail Information Technology IBM Recovery Employer-Employee Relationship Internet of Things Customer Service Administration Travel Education It Management Proactive IT Law Enforcement Computers Save Time Data storage Money Running Cable Humor Legal Government Mobile Device SaaS Document Management Bandwidth Saving Time Tablet Networking Two-factor Authentication Wireless Digital Payment Telephone Systems Training Website Disaster PowerPoint Hard Drive Social Networking Securty Mobility Hacking VPN Solid State Drive Twitter Flexibility Office 365 Windows 10 Fax Server User iPhone Business Intelligence DDoS Avoiding Downtime Data Recovery Hosted Solution Word Risk Management Computer Repair Password Current Events Cost Management Hacker Intranet Black Market Presentation Gaming Console Streaming Media Inbound Marketing Project Management Company Culture Business Growth Virtual Desktop Webcam Telephony Monitors Documents Programming Chrome Heating/Cooling YouTube Router Settings Unified Communications Public Cloud Computer Accessories Comparison Customer Relationship Management Retail Augmented Reality End of Support Experience Co-managed IT Politics Text Messaging Scam Automobile How To Lifestyle Google Docs Laptop Safety Social Start Menu Net Neutrality Taxes Office Tips Software as a Service Network Congestion Paperless Office Access Control Uninterrupted Power Supply Sports Cybercrime Computing Trending Pain Points Robot Cortana Patch Management Google Maps IT service User Error Statistics Excel Compliance Processors Cloud Computing Downtime USB Hack Meetings Rental Service Deep Learning IP Address Consultation Memory Human Resources Visible Light Communication Cabling Private Cloud Best Practives Wi-Fi Leadership Audit Administrator Supercomputer Skype Flash Emergency Advertising Mobile Technology Worker Microserver Machine Learning Device Management Computer Care Google Wallet Teamwork Distributed Denial of Service Storage Employer Employee Relationship Displays Google Drive Mobile Payment PDF Licensing Turn Key online Currency Trojan Banking Printing Drones Keyboard Electricity Best Available Botnet Product Reviews Organize File Sharing Domains Mouse Language Business Technology Permissions eWaste Read Computer Malfunction Business Metrics Downloads Shortcut WannaCry Value GPS Time Management switches Troubleshooting Writing Staffing Environment Motion Sickness Chromebook Google Calendar Competition 3D Touchscreen Business Owner Tracking Messenger Ebay Recycling Work/Life Balance Knowledge Cryptocurrency Harddrive Web Server Download Technology Tips Application Digital Adminstration Websites IT consulting Specifications Workers Books Pirating Information Tech Terms Cleaning External Harddrive Digital Signature Microchip Access CIO Windows XP Entertainment Samsung Content Management Reading Regulations Get More Done Society Smart Phones G Suite Physical Security Printer Server Hacks Micrsooft Spyware Tablets Analytic Relocation Video Surveillance Identity Theft Saving ZTime Data Security Data Protection Sync LinkedIn CCTV Notifications Public Speaking cache Archive Reliable Computing Debate Virtual Reality Data Loss Music Entrepreneur Corporate Profile In Internet of Things HIPAA Upselling Emails Business Managemenet Webinar Point of Contact Social Engineering Upgrades Assessment Bluetooth Redundancy LiFi Electronic Payment Scalability Computing Infrastructure Thin CLient Data Breach VoIP Capital Productuvuty Vulnerability Television CrashOverride 3D Printing

hp supplies medallionLarge2017