Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

4 Ways a Unified Threat Management Solution Covers...
Tip of the Week: 11 Security Best Practices Every ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Business Computing Software Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Quick Tips Smartphones Gadgets Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office VoIP Social Media Server Smartphone Android Mobile Device Management Upgrade Windows 10 Innovation Miscellaneous Unified Threat Management Windows Ransomware Remote Monitoring Holiday Operating System Remote Computing Mobile Computing Passwords WiFi Collaboration Vendor Management BYOD Communication Apps Marketing The Internet of Things Facebook Managed IT services Users History Apple Cybersecurity Firewall Analytics Data Management IT Support Alert Productivity communications Phishing Internet of Things Save Money Managed IT Services IT Consultant Outsourced IT Office Health Automation Gmail Big data App Content Filtering BDR Spam Bring Your Own Device Wireless Technology Search Tech Support Data Backup Hiring/Firing Lithium-ion Battery Hard Drives Bandwidth Outlook Browser Maintenance Antivirus Virus Artificial Intelligence Budget Information Technology Best Practice Data Recovery Going Green Mobile Device Windows 8 Managed IT Hacking Printer Update Money Office 365 Recovery Employer-Employee Relationship Help Desk Encryption Cost Management Phone System IBM Data storage Saving Time Cloud Computing Humor Intranet Save Time Legal Running Cable SaaS It Management Hard Drive Government Proactive IT Cybercrime Computers Risk Management VPN Administration Networking Training Two-factor Authentication Customer Service Document Management Travel Website Law Enforcement Education Flexibility Data Breach Laptop Project Management Avoiding Downtime User Current Events Digital Payment Excel DDoS Hosted Solution Robot Comparison Augmented Reality Mobility PowerPoint Word Compliance Social Networking Social Engineering Password Cortana Black Market Twitter Windows 10 Hacker Business Growth Downtime Tablet Company Culture Telephone Systems iPhone Access Control Business Intelligence Wireless Disaster End of Support Data Security Securty Fax Server Data Loss Computer Repair Solid State Drive Experience eWaste Redundancy Statistics Hack Value Cryptocurrency Vulnerabilities Private Cloud Google Docs Mobile Technology Streaming Media Inbound Marketing Cleaning Office Tips Tech Term Distributed Denial of Service Regulations Specifications Chrome Paperless Office Pain Points Bitcoin Safety Public Cloud Social Sports Computing User Error Router Network Congestion Computer Accessories Identity Theft Blockchain Business Technology Customer Relationship Management IT service Mouse Virtual Reality Gaming Console Automobile Scam Text Messaging Bluetooth Webcam Computing Infrastructure How To Digital Websites Processors Start Menu Telephony Monitors USB Tech Terms Taxes Presentation Net Neutrality Software as a Service Uninterrupted Power Supply Virtual Desktop YouTube Settings Unified Communications Co-managed IT Documents Programming Data Protection Heating/Cooling Patch Management Trending Google Maps Politics Lifestyle Retail Emails Scalability Read Chromebook email scam VoIP Messenger Multi-factor Authentication External Harddrive Shortcut Point of Contact Troubleshooting Consultation Wireless Headphones Meetings Work/Life Balance Fake News Staffing Environment Cabling Download Thin CLient Books Device security Administrator Smart Phones Competition IT consulting Get More Done Audit Business Owner Supercomputer Microsoft Excel Printer Server Business Cards Machine Learning CIO Emergency Worker Microchip Leadership Reading Mobile Payment Application Windows XP Computer Care Google Drive Device Management Employer Employee Relationship Society Piracy Micrsooft Vulnerability Licensing Hacks Electricity Relocation HTML Botnet Television Digital Signature Printing Webinar Entertainment online Currency Upselling Software License Notifications WannaCry Reliable Computing Devices Computer Malfunction SharePoint Downloads Analytic Time Management Tip of the week Music IT Plan Upgrades Accountants Motion Sickness GPS Evernote Public Speaking LiFi Best Practives Google Calendar Touchscreen Tracking Virtual Assistant Rental Service Migration Deep Learning Microserver Entrepreneur Knowledge Technology Tips Business Managemenet Ebay Equifax Web Server Memory 3D Data Warehousing Visible Light Communication HIPAA Electronic Payment Recycling Workers Wi-Fi Hard Drive Disposal Desktop Turn Key Access Pirating Information Startup Flash Adminstration Windows Server 2008 IP Address Advertising Trojan Google Wallet Organize Samsung Unified Threat Management Human Resources Applications G Suite Displays Content Management Skype Spyware Smart Tech Physical Security Windows 7 Drones Tablets Banking Fiber-Optic File Sharing Mobile Security Sync Teamwork Storage cache Video Surveillance Multi-Factor Security CCTV Language Freedom of Information Permissions PDF LinkedIn Business Metrics Saving ZTime Fraud Corporate Profile UTM In Internet of Things Writing Keyboard switches Best Available Archive Product Reviews Assessment Debate Legislation Harddrive News Domains Capital 3D Printing Nanotechnology Productuvuty CrashOverride