Browse Definitions :
Definition

Herman Hollerith

Born in 1860 in Buffalo, NY, Herman Hollerith was the creator of the Hollerith Electric Tabulating System, the ancestor to computers as we know them today. The system used cards with punched holes to tabulate data. Though first used in 1887 for calculating mortality statistics, Hollerith's punch card system became widely known when it was used to tabulate the U.S population during the 1890 census.

Hollerith founded the Tabulating Machine Company in 1896. His punch card machine, now fitted with automatic card feeders, was used again in the 1900 census. But by 1910, the US Census Bureau decided to build their own machines because Hollerith was charging too much money for use of his machines.

In 1911, Hollerith's Tabulating Machine Company merged with another machine manufacturer to form Computer Tabulating Recording Company. The new company struggled to gain market share for nearly ten years, and it wasn't until 1920 that it became a leader in the counting machine industry. Hollerith retired in 1921. In 1924, under the direction of Thomas Watson, Sr., the company was renamed International Business Machines Corporation (IBM).

As a primary form of data input for computers, the punch card existed well into the early 1970s before the interactive display terminal began its ascendance. Hollerith died in 1929 in Washington, D.C., and is widely known today as the father of information processing.

This was last updated in September 2005
SearchNetworking
  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close