ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

100+ Years Ago, IBM Started Just Like Any Other Business

100+ Years Ago, IBM Started Just Like Any Other Business

Of the many technology companies in the public eye, IBM is one of the oldest and perhaps the most recognizable--but do you know the story behind Big Blue? It’s a history of innovation and revolution in computing that stretches back over 100 years, to when it was created by uniting three existing companies.

In 1911, a man named Charles Runlet Flint merged two of his existing companies, International Time Recording Company and Computing Scale Company of America with a critical third company that he had just acquired: Tabulating Machine Company. This new company was known as the Computing-Tabulating-Recording Company (or CTR).

The machines made by CTR were capable of sorting, analyzing, and eventually running calculations based on punch cards that were input into the machine. While this development had clear business applications in hindsight, it wasn’t until the controversial Thomas Watson was brought in as company president (after deftly avoiding lasting consequences from a conviction of violating the Sherman Antitrust Act--the act that bans monopolies) that the value of the tabulating division was focused upon.

Not only did Watson know his target audience well enough to know that the business-oriented tabulating machines would be in high demand as the United States became increasingly business-oriented itself, but he also understood the value of presenting CTR’s offerings as a service, rather than a product. This arrangement proved to be mutually successful for both CTR and its clients, as the sales team was able to inform the company of what their clients wanted to see from them next, thereby allowing the needs of their clients to be met.

By 1924, CTR had been renamed to International Business Machines to reflect the consolidation of the business and echo the timeless feel of other large brands of the day. 1925 saw Watson take up responsibilities as both the chief executive officer and the chief operating officer. In the following years, IBM would thrive in the face of the Great Depression, only receiving a boost from the federal bureaucracies’ need for computing devices after President Roosevelt’s New Deal mandates. Demand for the tabulation machines continued to increase during wartime, and by the time Thomas Watson, Jr. was brought on as his father’s successor in 1952, computers were slowly becoming more and more common in the office environment. Many companies had a simple transition, as they were simply trading their IBM tabulators for computers.

IBM truly went global in 1949, offering sales worldwide in a total of 58 countries. IBM World Trade Corporation dominated the global market everywhere but Japan and the United Kingdom, achieving a market share of (only) 33 percent in those countries.

However, in 1952, IBM was again hit by an antitrust lawsuit from the US government, and more critically, another from a niche computer pioneer called Control Data Corporation. IBM powered through these challenges, as well as shifts in leadership until the 1980s. At this point, Big Blue began to falter under pressure from other niche competitors. As a result, the company changed their management strategy, and weathered through business fluctuations until 2004, when they again stabilized their success rate.

IBM’s story of one of success, and there are lessons to be learned here for your own business. By forming the right partnerships and providing a product or service that’s in growing demand, your company can grow exponentially. IBM also shows business owners how to overcome challenges, like diversifying what you do in order to weather the inevitable changes in the marketplace, as well the importance of strong leadership. By learning from the successes of companies like IBM, who knows, maybe your SMB can do what it takes to rise to the top!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Facebook Business Continuity Covid-19 Disaster Recovery Passwords Holiday Windows 10 IT Support Browser Apps Managed Service Cloud Computing Outsourced IT Miscellaneous Remote Work Internet of Things Managed Service Provider Data Management Saving Money Operating System Government Workplace Strategy Gadgets Networking Windows Artificial Intelligence Managed IT services Spam Remote Blockchain WiFi Bandwidth Mobile Device Management Business Technology Encryption Information App Server Virtualization Office 365 Employee/Employer Relationship Budget Apple Gmail Information Technology Office History Two-factor Authentication Analytics Wi-Fi BDR Conferencing Cybercrime Big Data Access Control Data Security Health Patch Management Save Money Remote Monitoring Hacker Remote Computing Voice over Internet Protocol IT Management Compliance Training Cost Management Vendor Help Desk Employer-Employee Relationship Hacking Document Management Alert Hiring/Firing Outlook Project Management Money Password Customer Service Data loss Unified Threat Management BYOD Firewall Computing Vendor Management Augmented Reality Word Hard Drive Mobile Office IBM Managed Services Website Search... Applications Legal Best Practice Vulnerabilities Data storage Retail Healthcare Laptop Paperless Office Travel Antivirus Virtual Reality Social Engineering Maintenance User Cryptocurrency Black Market Cleaning Robot Sports Social Websites SaaS Chrome DDoS Mobility Meetings Remote Workers iPhone Education Google Maps Cortana Mobile Computing Scam Windows 7 Content Filtering Free Resource Marketing Data Breach Twitter Router VPN Running Cable Law Enforcement How To End of Support Update Windows 11 Printer The Internet of Things Storage YouTube Monitoring Wireless Technology Google Docs Employees eWaste Bluetooth Avoiding Downtime Saving Time HIPAA Distributed Denial of Service Holidays Office Tips Downtime Physical Security Computers Bitcoin Private Cloud Memory Safety Cooperation Telephone Video Conferencing Virtual Desktop Start Menu Experience Politics Virtual Machines Downloads Computer Care Excel Machine Learning Computer Repair Settings Vulnerability Professional Services Solid State Drive Software as a Service Data Protection Disaster PowerPoint Administration Virtual Assistant Drones Presentation Chromebook Managed Services Provider Specifications Lithium-ion battery Automobile Virtual Private Network IT Consultant Processors Customer Relationship Management How To Current Events Processor Tech Terms Co-Managed IT Microchip Flexibility Solutions Entertainment Managed IT Digital Integration Images 101 Hack Identity Theft Display Taxes Multi-factor Authentication Notifications Unified Communications Service Level Agreement Keyboard Computing Infrastructure Administrator Workplace Text Messaging Wasting Time Proactive IT Audit Modem Spyware Troubleshooting Management Hard Drives Device security Bring Your Own Device eCommerce Videos intranet Microsoft Excel Surveillance File Sharing Wireless Headphones Tech Wireless Going Green Shortcut Business Cards Scams Managing Costs Redundancy Music SSID Cache Error Heating/Cooling Environment Media Social Networking Development Employer/Employee Relationships Unified Threat Management Windows XP Bookmark Workers Term Download Piracy Botnet Cables Virtual Machine Rental Service Optimization Printing Micrsooft Business Owner CCTV HTML Reviews Nanotechnology 2FA Flash Teamwork Touchscreen Browsers Business Growth Google Play Upload Computer Malfunction Software License Data Storage Point of Sale Telephone Systems Hypervisor Emergency Medical IT Vendor Mangement Social Network Shopping Screen Reader Paperless Shortcuts SQL Server Data Analysis Samsung Google Wallet Security Cameras Uninterrupted Power Supply Staffing Trends Webcam Mobile Technology PCI DSS Banking Licensing Messenger Humor Deep Learning Business Mangement Inbound Marketing Customer Resource management IP Address Devices Gig Economy Business Communications Tip of the week Internet Service Provider Be Proactive Azure Fileless Malware Tablets Hosted Solution Gamification Company Culture Regulations Compliance Business Metrics Managed IT Service Books Memes Google Calendar Telephone System Supercomputer Regulations Backup and Disaster Recovery Human Resources Net Neutrality Workplace Strategies Language Virus Electronic Payment Society Directions Recovery Content Motion Sickness Competition Desktop Financial Data Reading IT Comparison Monitors Google Drive Visible Light Communication Electronic Medical Records Accountants Risk Management Phone System Database Google Apps Entrepreneur LiFi Windows 8 Corporate Profile Documents Application Telework Knowledge Business Intelligence Relocation Communitications Television Displays Microsoft 365 Telephony Advertising Health IT Employer Employee Relationship Equifax Smartwatch Tactics Hard Drive Disposal Procurement Smart Technology Work/Life Balance Tech Support Cabling Tablet Securty Username G Suite FinTech Freedom of Information IT Assessment Mouse VoIP Tracking Domains Computer Accessories Startup CES Addiction email scam In Internet of Things Supply Chain Management Value Navigation Network Congestion Web Server Mobile Security Organization Hacks Cyber security News Reliable Computing Smart Devices SharePoint Writing User Tip Digital Payment Legislation Worker Network Management Remote Working Supply Chain Evernote Access Public Speaking AI Trend Micro Fake News Scalability Electronic Health Records Transportation Time Management Streaming Media Proxy Server Public Cloud Emails Digital Security Cameras

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?