Pulse Technology Solutions Blog

View the blog entries posted by James Ritter. IT blogs covering cloud, security, best practices, how-tos, and more.

The Right Place at the Right Time: the Story of IBM

The Right Place at the Right Time: the Story of IBM

IBM is perhaps one of the best known technology companies out there, but do you know all of the details about Big Blue’s legacy? IBM has built itself a reputation for pursuing advances in innovation and revolutionizing the way that businesses utilize computing, all the way back to its inception 100 years ago.

In 1911, Charles Runlet Flint began by merging three companies: International Time Recording Company, Computing Scale Company of America, and the Tabulating Machine Company. The company formed would be known as the Computing-Tablet-Recording Company, or CTR for short.

CTR’s machines could perform a number of functions, such as sorting, analyzing, and running calculations based on simple punch cards inserted into the machine. These machines were built with business uses in mind, but the value of the devices started to skyrocket around the time that Thomas Watson was brought on board as the company president, a risky move that some saw as creating a monopoly and violating the Sherman Antitrust Act.

Watson understood that his target audience--businesses--would want these tabulating machines, but he also knew that CTR’s services could be very valuable to users through the use of a service offering, more so than an actual product. This approach proved to be successful for both CTR and its customers, as the sales team was able to properly communicate what the end users wanted to see implemented next.

1924 was the year that CTR changed their name to International Business Machines, and 1925 saw the rise of Watson as both the chief executive officer and chief operating officer of the organization. IBM would then continue in the face of adversity, especially during the Great Depression when federal agencies’ needed computing hardware to comply with President Roosevelt’s New Deal mandates.

Future demand for these machines only increased during wartime, and Watson’s son, Thomas Watson Jr., was eventually named his father’s successor in 1952. By this time, computers had grown in popularity and were more commonplace in the office environment. Organizations that had previously purchased IBM tabulators made a simple transition to IBM computers.

In 1949, IBM introduced itself to the global market, offering sales worldwide to a total of 58 different countries. During this time, IBM World Trade Corporation’s control over the global market soared everywhere but Japan and the United Kingdom, achieving only a modest 33 percent in these countries.

In 1952, history repeated itself and IBM was hit with another antitrust lawsuit from the United States government, and another from a specialized computer organization called Control Data Corporations. IBM endured these allegations and changes in leadership until the 1980s, at which point it began to falter under the duress from other competitors. This resulted in a change in their management strategy, which allowed IBM to muscle their way through many more years of business. Around 2004, their success rate stabilized once again.

There are lessons to be learned from the tumultuous history of computing’s most innovative organization. Creating the right partnerships and providing a service that’s in high demand can go a long way toward keeping your business in… business. IBM also showcases how it’s possible to overcome challenges like changes in the market, and how having strong leadership is important. Your business can use this knowledge to its advantage and perhaps become the IBM of your industry, one day.

Software Patches Take on New Importance After the ...
The Cloud Revolution: We’ve Seen This Before


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 24 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Business Computing Best Practices Malware Privacy Network Security Hackers Productivity Backup Software IT Services Managed IT Services Microsoft Ransomware Business User Tips Outsourced IT IT Support Email Internet Business Continuity Mobile Devices Windows 10 Computer Remote Monitoring Managed IT Efficiency Productivity Google Android Smartphone Social Media Data Management Hosted Solutions Data Recovery Hardware Disaster Recovery IT Support Recovery Data Backup Workplace Tips Unified Threat Management Office 365 Apps Innovation Cybersecurity Communication Training Cloud Computing Tip of the week App Save Money Data Work/Life Balance Managed IT Services SaaS Managed Service Provider Collaboration Telephone Systems Password IT Service Hosted Solution Smartphones Internet of Things Paperless Office Phishing Word Robot Content Filtering File Sharing Small Business Windows Browser Big Data Facebook Firewall How To Risk Management Mobile Device Vendor Management Websites Alert Physical Security Antivirus BDR Botnet Samsung Virtual Private Network Politics Artificial Intelligence Going Green Uninterrupted Power Supply Education Computer Care Hacker Windows 10 Health VoIP Mobility BYOD Automobile Mobile Device Management Files Twitter Virtual Reality Encryption Data Storage Money IT Management Taxes Virtualization Wireless Maintenance VoIP Bluetooth IBM Networking Tracking Update Personal Information VPN Access Control Tablet Travel Cabling Holiday Avoiding Downtime Corporate Profile Data Security Document Management Chromebook Virus Network How To SharePoint Downtime Apple Motion Sickness Infrastructure IT Solutions Time Management Wi-Fi Hacking Information Technology WannaCry Techology Error Mail Merge Analytics Sync Customer Service Meetings Disaster Computers Upgrades Network Management Computer Repair Trending Cleaning Monitors Private Cloud Identity Theft Crowdsourcing Address Office Chrome Mobile Device Managment Google Maps Webcam Telephony USB Bandwidth Touchscreen Upgrade Data loss Public Cloud Government Redundancy Firefox Point of Sale Project Management Automation Help Desk Search Staffing Communications Notifications Emoji Customer Relationship Management Web Server Solid State Drive Electronic Medical Records Microsoft Office YouTube Supercomputer Computing Assessment Heating/Cooling Unsupported Software Cameras Hard Disk Drive Business Technology Black Market Sports Social Outlook Settings Office Tips IT Budget Licensing Wireless Technology Consultation G Suite Servers CCTV Lenovo Shortcut Digital Unified Threat Management Digital Payment Software Tips Law Enforcement Server Management Superfish Tech Support WiFi Remote Computing Patch Management Spyware User Error Administrator Cortana Gadget Quick Tips Statistics Mobile Data IT Consultant Scam Budget GPS Processors Vulnerability Employer-Employee Relationship Printer Business Management Server History Business Growth Legal Google Drive Cybercrime Cost Management CrashOverride Downloads Thank You Disaster Resistance Two-factor Authentication Congratulations Proactive IT Multi-Factor Security IT Consulting Emergency Data Breach Technology Laws Hacks

Newsletter Sign Up