Feeds

David Caminer, creator of the first business computer

We salute the architect of LEO

  • alert
  • submit to reddit

The Power of One Infographic

The IBM that might have been

In 1953, Lyons became the first company in the world with a computerised payroll, and soon LEO was in charge of the accounting and stock control of all the company's 180 teashops. The business computer had arrived.

Three years later - and a good 30 years before the word passed into the English language - Lyons began outsourcing LEO's payroll facility to Ford UK. Other clients, including the Met Office, followed, and the facility was spun off to a subsidiary, Leo Computers Ltd, powered by a new version of the machine, the LEO II.

Leo 2

Leo II at Hartree House
Source: Leo Computer Society

In Caminer's words, the new company was "a high-powered consultancy and software house as well as a computer production line and a service bureau". With the arrival of the LEO III, which replaced valves with germanium transistors, and mercury delay lines with ferrite core memory, Lyons now had a much faster, cooler and more reliable machine that backed its data up onto magnetic tape. It could multi-task.

It became clear that Leo Computers had outgrown its parent - this new game of computers was too rich even for Lyons' deep pockets. With the merger of Leo Computers into English Electric and Marconi to form EELM - a company eventually to snowball towards the end of the 1960s into ICL - the LEO III became, as Caminer describes it, "a world-beating machine". By all accounts it was indeed a direct competitor to the mighty IBM's own 360, introduced in 1964.

Leo 3

Leo 3 at Lyons Elms House, Hammersmith
Source: Leo Computer Society

But that was the problem. Without the marketing resources of the American giant, relying solely on word of mouth, LEO failed to gain market traction. The IBM 360 became the industry standard, eventually adopted by EELM as a clone called System 4. The era of LEO had come to a close. ®

The Lyons Empire

Founded in 1887 by Joseph Nathaniel Lyons, the company had burgeoned from its original roots in tobacco to a Hydra-headed, market dominant conglomerate. Its food manufacturing arm was famous for its ice cream, but was also a household name for bread, cakes, pies and beverages.

Lyons Tea Shop Oxford Street, London

Source: the J Lyons history website

Its Strand Hotels subsidiary ran more than half a dozen London hotels. More famous still was its nationwide chain of tea shops, with flagship "Lyons Corner Houses" in London's West End: multi-storey meet-and-eat venues, each with its own continuously playing orchestra, the musicians managed by Lyons' own Orchestral Department.

As well as its food factories, tea shops, restaurants and hotels, during World War II Lyons had even extended its logistical expertise into running munitions plants. One of the largest catering and food manufacturing companies in the world, its subsidiaries extended across the Commonwealth.

Top three mobile application threats

More from The Register

next story
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.