SlideShare a Scribd company logo
1 of 7
International Business Machines, abbreviated IBM, is a multinational computer, technology and IT consulting corporation. IBM manufactures and sells computer hardware and software (with a focus on the latter), and offers infrastructure services, hosting services, and consulting services in areas ranging from mainframe computers to nanotechnology.
The IBM Personal Computer, commonly known as the IBM PC, is the original version and progenitor of the IBM PC compatible hardware platform. It is IBM model number 5150, and was introduced on August 12, 1981.
Deep Thought Deep Thought was a computer designed to play chess. It was initially developed at Carnegie Mellon University and later at IBM. It was second in the line of chess computers starting with ChipTest and culminating in Deep Blue. The computer was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc.
Deep Though The computer was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc.
It was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc. Deep Thought- fictional
Smarter Planet Smarter Planet is a corporate initiative of IBM. The initiative underscores how forward-thinking leaders of governments around the world are capturing the potential of smarter systems to achieve economic growth, sustainable development and societal progress. Examples of smarter systems include smart grids, water management systems, solutions to traffic congestion problems, greener buildings, and many other. IBM plays a part in these smarter systems by providing a big part of the technology and process management capabilities. Smarter planet logo
The Other Side Not all of IBM’s initiatives are peaceful ,however, throughout it’s history a main part of IBM’s funding has come from the selling of military equipment such as: And guiding systems for  90-millimeter anti-aircraft guns Browning light machine guns M1 Rifles

More Related Content

Similar to Ibm1

Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial IntelligenceDhrumil Shah
 
The shapes of computer today
The shapes of computer todayThe shapes of computer today
The shapes of computer todayPrabesh Shrestha
 
Fourth Generation Computers.pptx
Fourth Generation Computers.pptxFourth Generation Computers.pptx
Fourth Generation Computers.pptxAbi Abi
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple EssayJamie Boyd
 
New Technology Lecture L13 The Power of Software
New Technology Lecture L13 The Power of SoftwareNew Technology Lecture L13 The Power of Software
New Technology Lecture L13 The Power of SoftwareÓlafur Andri Ragnarsson
 
Write a 7 page paper in APA format.The research paper should in.docx
 Write a 7 page paper in APA format.The research paper should in.docx Write a 7 page paper in APA format.The research paper should in.docx
Write a 7 page paper in APA format.The research paper should in.docxmayank272369
 
Branrel Santos Powerpoint Presentation
Branrel Santos  Powerpoint PresentationBranrel Santos  Powerpoint Presentation
Branrel Santos Powerpoint PresentationJesus Obenita Jr.
 
Fourth Generation Computers
Fourth Generation ComputersFourth Generation Computers
Fourth Generation ComputersJessa Ü Borja
 
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...Bernard Marr
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxherthalearmont
 
Computer Timeline - Year when it was introducepptx
Computer Timeline - Year when it was introducepptxComputer Timeline - Year when it was introducepptx
Computer Timeline - Year when it was introducepptxMelodyChua4
 
Computer Timeline - Year when it was introduce.pptx
Computer Timeline - Year when it was introduce.pptxComputer Timeline - Year when it was introduce.pptx
Computer Timeline - Year when it was introduce.pptxMelodyChua4
 

Similar to Ibm1 (20)

Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
The shapes of computer today
The shapes of computer todayThe shapes of computer today
The shapes of computer today
 
Fourth Generation Computers.pptx
Fourth Generation Computers.pptxFourth Generation Computers.pptx
Fourth Generation Computers.pptx
 
Decline Of Apple Essay
Decline Of Apple EssayDecline Of Apple Essay
Decline Of Apple Essay
 
Modern CPUs
Modern CPUsModern CPUs
Modern CPUs
 
New Technology Lecture L13 The Power of Software
New Technology Lecture L13 The Power of SoftwareNew Technology Lecture L13 The Power of Software
New Technology Lecture L13 The Power of Software
 
Write a 7 page paper in APA format.The research paper should in.docx
 Write a 7 page paper in APA format.The research paper should in.docx Write a 7 page paper in APA format.The research paper should in.docx
Write a 7 page paper in APA format.The research paper should in.docx
 
Sentia 2012 IT Quiz Finals
Sentia 2012 IT Quiz FinalsSentia 2012 IT Quiz Finals
Sentia 2012 IT Quiz Finals
 
L13 The Power of Software
L13 The Power of SoftwareL13 The Power of Software
L13 The Power of Software
 
Branrel Santos Powerpoint Presentation
Branrel Santos  Powerpoint PresentationBranrel Santos  Powerpoint Presentation
Branrel Santos Powerpoint Presentation
 
Fourth Generation Computers
Fourth Generation ComputersFourth Generation Computers
Fourth Generation Computers
 
Computer
ComputerComputer
Computer
 
Ibm
IbmIbm
Ibm
 
Ibm
IbmIbm
Ibm
 
SOROC TECHNOLOGIES the name
SOROC TECHNOLOGIES the nameSOROC TECHNOLOGIES the name
SOROC TECHNOLOGIES the name
 
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...
Man Vs. Machine: The 6 Greatest AI Challenges To Showcase The Power Of Artifi...
 
TitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docxTitleAuthorsSourceDocument TypeSubject Terms.docx
TitleAuthorsSourceDocument TypeSubject Terms.docx
 
Computer Timeline - Year when it was introducepptx
Computer Timeline - Year when it was introducepptxComputer Timeline - Year when it was introducepptx
Computer Timeline - Year when it was introducepptx
 
Computer Timeline - Year when it was introduce.pptx
Computer Timeline - Year when it was introduce.pptxComputer Timeline - Year when it was introduce.pptx
Computer Timeline - Year when it was introduce.pptx
 
Personal Computers
Personal ComputersPersonal Computers
Personal Computers
 

Recently uploaded

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 

Ibm1

  • 1. International Business Machines, abbreviated IBM, is a multinational computer, technology and IT consulting corporation. IBM manufactures and sells computer hardware and software (with a focus on the latter), and offers infrastructure services, hosting services, and consulting services in areas ranging from mainframe computers to nanotechnology.
  • 2. The IBM Personal Computer, commonly known as the IBM PC, is the original version and progenitor of the IBM PC compatible hardware platform. It is IBM model number 5150, and was introduced on August 12, 1981.
  • 3. Deep Thought Deep Thought was a computer designed to play chess. It was initially developed at Carnegie Mellon University and later at IBM. It was second in the line of chess computers starting with ChipTest and culminating in Deep Blue. The computer was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc.
  • 4. Deep Though The computer was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc.
  • 5. It was named after Deep Thought, a fictional computer in Douglas Adams' series, The Hitchhiker's Guide to the Galaxy. The naming of chess computers has continued in this vein with Deep Blue, Deep Fritz, Deep Junior, etc. Deep Thought- fictional
  • 6. Smarter Planet Smarter Planet is a corporate initiative of IBM. The initiative underscores how forward-thinking leaders of governments around the world are capturing the potential of smarter systems to achieve economic growth, sustainable development and societal progress. Examples of smarter systems include smart grids, water management systems, solutions to traffic congestion problems, greener buildings, and many other. IBM plays a part in these smarter systems by providing a big part of the technology and process management capabilities. Smarter planet logo
  • 7. The Other Side Not all of IBM’s initiatives are peaceful ,however, throughout it’s history a main part of IBM’s funding has come from the selling of military equipment such as: And guiding systems for 90-millimeter anti-aircraft guns Browning light machine guns M1 Rifles