100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

4 Ways a Unified Threat Management Solution Covers...
Tip of the Week: 11 Security Best Practices Every ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Managed Service Provider Backup Productivity Workplace Tips Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Quick Tips Gadgets Business Continuity Mobile Devices User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Server VoIP Innovation Social Media Android Smartphone Mobile Device Management Windows 10 Miscellaneous Upgrade Ransomware Windows Unified Threat Management Remote Monitoring Operating System Collaboration Mobile Computing Communication Passwords Holiday Remote Computing Apps Cybersecurity BYOD WiFi Vendor Management Managed IT services The Internet of Things Marketing Facebook Firewall Analytics Users History IT Support Apple Productivity Data Management Data Backup communications Automation Internet of Things Data Recovery Alert Managed IT Services Save Money Phishing Tech Term Outsourced IT Artificial Intelligence App IT Consultant Content Filtering Big data Going Green Spam BDR Mobile Device Bring Your Own Device Office Gmail Bandwidth Health Browser Lithium-ion Battery Best Practice Information Technology Cybercrime Encryption Outlook Windows 8 Hiring/Firing Cost Management Hard Drives Wireless Technology Maintenance Antivirus Printer Search Budget Virus Tech Support Managed IT Recovery Employer-Employee Relationship IBM Money Document Management Hacking Help Desk Office 365 Computers Update Phone System Data storage Cloud Computing Save Time Windows 10 Legal Networking Proactive IT Running Cable Regulations Humor Saving Time Training Administration VPN SaaS Intranet Travel Customer Service Two-factor Authentication Education Hard Drive Law Enforcement It Management Business Technology Government Risk Management Compliance Website Data Loss Social Engineering Current Events Black Market Business Intelligence Flexibility Excel Word Digital Payment Data Breach Laptop Downtime Cortana Business Growth Customer Relationship Management Password Fax Server Comparison Tablet Augmented Reality Project Management PowerPoint Hacker Company Culture Computer Repair Paperless Office Telephone Systems Social Networking Access Control Disaster User Hosted Solution Twitter End of Support Robot Wireless Data Security Securty Avoiding Downtime DDoS iPhone Mobility Patch Management Blockchain Solid State Drive Automobile Net Neutrality Emails Pain Points Bluetooth Scam Chrome User Error Chromebook Co-managed IT Cryptocurrency Computing Infrastructure Hack Retail Redundancy How To eWaste Google Docs Router Computer Accessories Experience Download Value Private Cloud Cleaning Lifestyle Digital Monitors Vulnerabilities Trending Office Tips Telephony Gaming Console Healthcare Websites Processors Start Menu Tech Terms Mouse Taxes Machine Learning Distributed Denial of Service Webcam USB Mobile Technology YouTube Text Messaging Statistics Sports Presentation Software as a Service Programming Unified Communications Settings Applications Uninterrupted Power Supply Network Congestion Computing Public Cloud Virtual Desktop Specifications Safety Identity Theft Social Bitcoin Inbound Marketing Documents Data Protection Streaming Media IT service Heating/Cooling Google Maps Virtual Reality Politics Storage PDF UTM Content Corporate Profile Monitoring Time Management Freedom of Information LiFi IT Plan Enterprise Resource Planning Device Management Motion Sickness Best Available Keyboard Legislation Assessment SharePoint Scalability Work/Life Balance Accountants Google Calendar Business Managemenet Deep Learning Webinar Messenger Tracking Domains email scam Addiction Tip of the week Content Management Multi-factor Authentication VoIP Rental Service Meetings Upselling Public Speaking Management Touchscreen News Visible Light Communication Memory Migration Connected Devices Knowledge online Currency Web Server Shortcut Wireless Headphones Consultation Evernote IT consulting Cabling Video Surveillance Virtual Assistant Wi-Fi Administrator Saving ZTime Entrepreneur Equifax Technology Tips Books Workers Troubleshooting Network Management Environment Device security Audit LinkedIn CIO Supercomputer HIPAA Fake News Advertising Flash Electronic Payment Debate Desktop Finance Staffing Google Wallet Best Practives Microchip Harddrive Competition Nanotechnology Data Warehousing Windows XP Worker Emergency Hard Drive Disposal Archive Society Startup Access Skype Displays Reading Samsung GPS Business Owner Business Cards Service Level Agreement G Suite External Harddrive Computer Care Micrsooft Employer Employee Relationship IP Address Unified Threat Management Backup and Disaster Recovery Microsoft Excel Microserver Licensing Human Resources Gamification Drones Hacks Physical Security Application Screen Reader Google Drive Windows Server 2008 Point of Contact Vulnerability Get More Done Banking Botnet Thin CLient Smart Tech Spyware Mobile Payment Relocation Tablets 3D Ebay Piracy Upload Turn Key Sync Smart Phones HTML Electricity Printing Printer Server File Sharing Fiber-Optic Database Permissions Language Mobile Security Recycling Trojan Notifications CCTV Digital Signature Conferencing Windows 7 Analytic Trends Music Business Metrics Computer Malfunction Teamwork Leadership Multi-Factor Security cache Television Product Reviews switches Writing Organize Reliable Computing Adminstration Entertainment Pirating Information Software License In Internet of Things Devices WannaCry Downloads Upgrades Fraud Tactics Read CrashOverride 3D Printing Capital Productuvuty Managing Stress