Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

4 Ways a Unified Threat Management Solution Covers...
Tip of the Week: 11 Security Best Practices Every ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Managed Service Provider Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Smartphones Small Business Gadgets Quick Tips Network Security User Tips Mobile Devices Business Continuity Mobile Office Disaster Recovery Computer Network Virtualization Microsoft Office Server VoIP Social Media Windows 10 Mobile Device Management Miscellaneous Upgrade Android Windows Unified Threat Management Ransomware Smartphone Passwords Innovation Holiday Operating System Remote Computing Mobile Computing BYOD Communication Remote Monitoring WiFi Vendor Management Collaboration Marketing Apps The Internet of Things Facebook Managed IT services Firewall Users Analytics History Apple Alert IT Support Data Management Save Money IT Consultant Cybersecurity Managed IT Services Phishing Outsourced IT Big data App Content Filtering Bring Your Own Device Productivity Automation Health Gmail Office Lithium-ion Battery Outlook communications Hard Drives Budget Virus Artificial Intelligence Windows 8 Best Practice BDR Spam Going Green Hiring/Firing Tech Support Wireless Technology Search Managed IT Browser Employer-Employee Relationship Cost Management Maintenance Help Desk Data Backup Antivirus Internet of Things Bandwidth Phone System Encryption Information Technology IBM Mobile Device Money Office 365 Printer Recovery Update Data storage Risk Management Legal Administration Proactive IT SaaS Computers Customer Service Travel Education It Management Hard Drive Networking Save Time Document Management Humor Saving Time Running Cable Law Enforcement Government Excel Word Flexibility Password Digital Payment Cortana Hacker Comparison Project Management Tablet PowerPoint Social Networking VPN Two-factor Authentication Hosted Solution Twitter Wireless Robot Website iPhone Black Market Business Intelligence Mobility Fax Server Hacking Business Growth Windows 10 Telephone Systems Computer Repair Training User Disaster End of Support Avoiding Downtime Intranet Securty DDoS Data Recovery Current Events Solid State Drive Bitcoin User Error Cybercrime Google Maps Patch Management Cryptocurrency Chrome Laptop Google Docs Cloud Computing Router Gaming Console Computer Accessories Hack Downtime Webcam Customer Relationship Management Processors Office Tips USB Augmented Reality Mouse Paperless Office Presentation Sports Company Culture Computing Virtual Desktop Text Messaging Distributed Denial of Service Documents Programming IT service Public Cloud Heating/Cooling Compliance Social Engineering Co-managed IT Net Neutrality Retail Computing Infrastructure Experience eWaste Scam Automobile Lifestyle Monitors Telephony How To Trending Digital YouTube Start Menu Settings Unified Communications Specifications Statistics Taxes Safety Social Software as a Service Access Control Uninterrupted Power Supply Network Congestion Streaming Media Pain Points Politics Data Security Inbound Marketing Analytic Leadership cache Chromebook CCTV Webinar Upselling Messenger Device Management Data Loss Corporate Profile Television Work/Life Balance In Internet of Things Public Speaking Assessment Blockchain Download Emails Scalability Entrepreneur IT consulting Redundancy Books Business Managemenet Data Breach VoIP SharePoint Cleaning online Currency HIPAA Electronic Payment CIO Consultation Tip of the week Microchip Best Practives Meetings Cabling Regulations Private Cloud Windows XP Reading Audit Microserver Evernote Administrator IP Address Society Virtual Assistant Hacks Supercomputer Human Resources Micrsooft GPS Worker Machine Learning Emergency Relocation Skype Computer Care Turn Key Data Warehousing Identity Theft Google Drive Hard Drive Disposal Notifications Trojan Employer Employee Relationship Reliable Computing Organize 3D Licensing Teamwork Ebay Vulnerability Recycling Printing Electricity Windows Server 2008 Virtual Reality Botnet Music Storage Upgrades PDF Unified Threat Management Adminstration Bluetooth Keyboard LiFi Best Available Pirating Information Business Technology Product Reviews Downloads WannaCry Windows 7 Computer Malfunction Domains Deep Learning Read Time Management Fiber-Optic Rental Service Memory Shortcut Visible Light Communication Content Management Value Troubleshooting Google Calendar Freedom of Information Wi-Fi Motion Sickness Tracking Staffing Environment Harddrive Touchscreen Fraud Video Surveillance Knowledge Flash Competition Advertising LinkedIn Business Owner Technology Tips External Harddrive Saving ZTime News Web Server Google Wallet Workers Displays Websites email scam Debate Tech Terms Application Archive Smart Phones Access Fake News Banking Get More Done Drones Samsung Point of Contact Vulnerabilities File Sharing Printer Server Mobile Technology Language G Suite Permissions Digital Signature Entertainment Thin CLient Spyware Microsoft Excel Business Metrics Physical Security Tablets Writing switches Business Cards Data Protection Mobile Payment Sync Piracy 3D Printing Software License Capital Productuvuty CrashOverride

hp supplies medallionLarge2017