ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Browser Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Remote Work Data Management Internet of Things Government Saving Money Operating System Networking Windows Gadgets Artificial Intelligence Workplace Strategy Managed IT services Bandwidth Encryption Business Technology WiFi Blockchain Mobile Device Management App Virtualization Server Spam Information Remote Budget Gmail Office Apple Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship History Cybercrime Wi-Fi Analytics Big Data Conferencing Access Control Data Security Health BDR Compliance Voice over Internet Protocol Remote Computing IT Management Training Help Desk Hacking Cost Management Patch Management Document Management Employer-Employee Relationship Hacker Vendor Save Money Remote Monitoring Hiring/Firing Augmented Reality Outlook Mobile Office Word Password BYOD IBM Managed Services Website Computing Vendor Management Data loss Hard Drive Search... Legal Best Practice Data storage Applications Money Retail Alert Customer Service Project Management Vulnerabilities Unified Threat Management Firewall User Healthcare Black Market Websites Remote Workers iPhone Cleaning Meetings Education Cortana Mobility Robot Windows 7 Content Filtering Free Resource Chrome Google Maps Scam Router How To The Internet of Things VPN Mobile Computing YouTube Twitter Update Marketing Law Enforcement Laptop End of Support Running Cable Printer Data Breach Storage Paperless Office Antivirus Maintenance Sports Travel Social Windows 11 SaaS DDoS Virtual Reality Monitoring Social Engineering Cryptocurrency Computer Care Downloads Disaster Vulnerability Saving Time Politics Software as a Service Managed Services Provider Bitcoin Machine Learning Settings Lithium-ion battery Data Protection Computers Virtual Private Network Telephone Solid State Drive Current Events Processors PowerPoint Excel Solutions Drones Administration Chromebook Presentation Integration Automobile Tech Terms Images 101 Specifications Display Managed IT IT Consultant Virtual Assistant How To Digital Wireless Technology Microchip Flexibility Employees eWaste Customer Relationship Management Taxes Avoiding Downtime Co-Managed IT Entertainment Downtime Holidays Hack Safety Identity Theft Processor Notifications Unified Communications Cooperation Physical Security Virtual Desktop Video Conferencing Google Docs Experience Bluetooth Virtual Machines Distributed Denial of Service Computer Repair Office Tips Multi-factor Authentication Private Cloud Memory Start Menu HIPAA Professional Services Computing Infrastructure Azure Botnet Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Micrsooft Management Regulations Compliance Samsung Device security Managed IT Service Rental Service Flash Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Business Mangement Going Green Net Neutrality Business Owner Business Cards Telephone Systems Tech Human Resources Business Growth Recovery Competition Error Financial Data Tablets Scams Bookmark Risk Management IT Entrepreneur Google Wallet Download Supercomputer Piracy LiFi Banking Google Calendar Term Google Apps Documents Messenger Application Deep Learning Virus Telework HTML Motion Sickness Microsoft 365 Cables Browsers Smartwatch Business Intelligence Nanotechnology Communitications Hosted Solution Google Drive Upload Procurement Inbound Marketing Software License Business Metrics Comparison Google Play Securty Books Social Network FinTech Point of Sale Domains Language Knowledge Data Analysis CES Society Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Television Security Cameras Reading Monitors Customer Resource management Organization Electronic Payment Visible Light Communication Cabling Devices Cyber security Shortcuts G Suite Tip of the week Fileless Malware Windows 8 Tablet Smart Devices VoIP Gamification Remote Working Tracking Company Culture Mouse Relocation Public Speaking Displays Telephone System AI Advertising Regulations Trend Micro Phone System Be Proactive Web Server Transportation Streaming Media Work/Life Balance Directions Digital Security Cameras Tech Support Backup and Disaster Recovery Electronic Health Records Keyboard Content Digital Payment Desktop Wasting Time SharePoint Hard Drives Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies In Internet of Things Videos intranet Access Database Surveillance Shortcut Network Congestion Time Management Public Cloud Managing Costs Computer Accessories Wireless Hacks Reliable Computing Heating/Cooling Writing Health IT Environment Equifax SSID Hard Drive Disposal Employer/Employee Relationships Windows XP Audit Media Social Networking Spyware Tactics Development Username File Sharing Virtual Machine Scalability Redundancy Reviews Startup Optimization Freedom of Information Smart Technology email scam Teamwork Administrator Text Messaging Navigation 2FA Proactive IT Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor Bring Your Own Device User Tip Shopping Legislation News Medical IT Troubleshooting CCTV SQL Server Printing Evernote Paperless Music Network Management Touchscreen PCI DSS Licensing Staffing IP Address Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?