Browse Definitions:
Reference

# History of the punch card

The history of the punch card

The standard punched card, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board of Health and several states. After this trial use, punched cards were adopted for use in the 1890 census.

Hollerith wasn't working in a vacuum! His idea for using punched cards for data processing came after he'd seen the punched cards used to control Jacquard looms. Jacquard, working in France around 1810, originated the idea of using holes punched in cardstock to control the pattern a loom weaves. Many Jacquard looms remain in use to this day, and you can occasionally find strings of Jaquard cards for sale.

The string of Jacquard cards illustrated here came from a small rug-making loom in a woolen mill in Amana, Iowa. Each card in this string is 9 inches long by 1.25 inches wide by 1/16 inch thick, but other Jaquard looms used different size cards. Like all Jaquard loom cards, these are strung together on cords. The heavy cardstock is required because the "card reader" mechanism of a Jacquard loom is entirely mechanical. Modern high-volume Jacquard looms use metal cards!

The use of punched cards in the Jacquard loom also influenced Charles Babbage, who decided to use punched cards to control the sequence of computations in his proposed analytical engine. Unlike Hollerith's cards of 50 years later, which were handled in decks like playing cards, Babbage's punched cards were to be strung together like Jaquard's. Despite this and the fact that he never actually built an analytical engine, Babbage's proposed use of cards played a crucial role in later years, providing a precedent that prevented Hollerith's company from claiming patent rights on the very idea of storing data on punched cards.

Like many modern entrepreneurs, after Hollerith had perfected his first series of electromechanical punched-card machines, including a punch, a tabulating machine to accumulate statistics from the information punched on cards, and a sorting machine, he founded a company, originally the Tabulating Machine Corporation. As with many high-tech startups of today, it had a somewhat rocky start until an experienced manager entered the scene. Thomas Watson, previously working for NCR, took over. One of Watson's moves was to rename the company International Business Machines, and within a few decades, his company had expanded to the point that the Federal government sued it for anti-trust violations.

The overall dimensions of punched cards used for data processing have remained the same since Herman Hollerith invented the medium: 7 3/8 inches wide by 3 1/4 inches high by .007 inches thick. Prior to 1929, this was a standard size for many US banknotes, and Hollerith apparently chose it so that he could store cards in boxes made for the Treasury Department. Today, these dimensions are set by the EIA standard RS-292 media 1 punched card. This standard is augmented by ANSI X3.21-1967 governing the holes in the card and ANSI X3.26-1980 governing the use of the Hollerith code to encode alphanumeric data on cards.

The original code used for punched card data recording in the 1890 census had 22 columns with 8 punch positions each (although there was room on the card for a total of 11 punch positions per column). The coding used on those cards did not encode data in columnar fields, but rather, each punch position was assigned a specific meaning. The need to store more data on each card led to higher density formats, first 24 colums of 10 positions each in the 1900 census (inferred from the 1900 National Geographic article), and then 27 columns of 12 positions each in the 1910 census. By the end of the 1920's, the standard format used 45 columns of round holes per card and 12 punch positions in each column.

In 1928, Hollerith's company, now renamed IBM, introduced the rectangular hole 80 column format, almost doubling the amount of data that could be recorded on a card, and by the mid 1930's, IBM was predicting that round-hole cards would soon be things of the past.

In fact, the round-hole format remained in use into the early 1990s, but in a very limited set of applications! The last use I am aware of is toll tickets on some eastern turnpikes. There are two reasons that the round hole format survived: First, IBM had a patent on their new rectangular format, so competitors were forced to limit themselves to the old format. Second, Remington Rand, one of IBM's major competitors in the pre-computer era, moved from Hollerith's code to a 6-bit code that allowed 90 columns of text to be stored on the old 45 column cards. When Remington Rand bought UNIVAC, they naturally integrated their 90 column card format with UNIVAC computers. In many ways, the UNIVAC card code was superior to IBM's "improved" rectangular hole version!

Oliver J. Jones wrote me that, in addition to surviving on some eastern turnpikes, UNIVAC's 90 column cards also remained in use through the 1960's at Macy's Department store and Lerner Stores, in the retail sector, the US Navy Medical Supply office and the Polaris missle control system, in the military sector, the New York City Tax Department, Long Island Lighting, and more. He sent along an image of the cover from a Remington Rand brochure and a promotional poster.

Mike Albaugh wrote me that he helped dismantle a UNIVAC SS90 system in 1974 or 1975 that had been in use up until the week before. He also saw a similar UNIVAC system in use at the Concord Naval Weapons Station around the same time. These apparently used 90 column cards.

If you look at the punched card equipment sold by IBM after 1931, you will find complete hardware support for IBM's alphanumeric Hollerith code, but you will also find that the majority of the machines sold were limited to numeric applications. At a time when, for example, the University of Iowa was punching student names on cards using the Hollerith code, other universities were developing 4-digit numeric encodings of common names so that they could avoid the need for the more expensive alphanumeric equipment.

The book Practical Applications of the Punched Card Method in Colleges and Universities, edited by G. W. Baehne an published by Collumbia University Press in 1935, contains an excellent summary of the state of the art in punched card data processing in 1935, including an appendix that appears to be a reprint of IBM's catalog for that year and many illustrated descriptions of typical applications.

When cards were used to store fixed-format information for data processing applications, they were almost always printed with format information, so that a casual reader could easily determine what punches on the card held what information. This printing could be quite specialized to one application, or it could merely set off fields in a standard way, with no indication on the card of what the purpose was.

The card shown here is typical of those used with IBM's line of card processing equipment from the 1930's onward. This particular example was printed for a range of retail applications where it must have been expected that the customer would handle the cards, as indicated by the warning: Do not fold or mutilate. This warning would be unnecessary if the card were only to be handled by data processing workers. While most fields of this card have no clear purpose, it contains an interesting and very specialized feature, a tab the cashier was supposed to tear off along a perforated line when the card was processed. A card with this tab removed would be seen by card processing equipment as having a punch in column 1, row 12.

It is important to note that the typical card processing applications from the 1890's to the 1950's did not require the use of computers! A deck of cards from a retail application, for example, could be sorted by the category field on a card sorter, and then each category could be run through a tabulating machine to sum the price fields of all cards in that category or similar accounting functions.

Usually, fixed format cards documented the format on the top edge of the card, since keypunches almost always printed their textual information along this edge. Sometimes, as illustrated above, the interpretation was elsewhere. Such departures from the norm were most common on cards that were intended to be machine punched, as in this Gardner Denver wire-wrap machine card. This card was used to control a semi-automatic wire-wrap machine, the machine used to wire the backplanes of many of the mainframes and minicomputers of the 1960's. The wire-list for a backplane was typically produced with the aid of computer-aided-design tools, so this card would typically only be read by people during debugging.

In the 1950's, IBM also supported a truncated version of the 80 column card, with only 51 columns. These were frequently used in retail sales and other applications requiring limited storage capacity per card; they saved both bulk and paper, but added complexity to IBM's card processing equipment to allow support of both formats. In many cases, they began life as 80 column cards from which a stub could be torn, for example, as a receipt, leaving a 51 column remainder for tabulation.

## Cards for Computers

With the advent of computers, complex pre-formatted cards continued to be used for to hold data, but in addition, cards were printed with formats specific to the needs of programmers. Some of these were equal in complexity to the standard data processing cards.

The "IBM CALCULATOR INSTRUCTION CARD" shown here was printed in the early 1950's probably for use by programmers of the IBM 701, IBM's first general purpose computer. The card includes fields for both symbolic and numeric addresses, so it is probable that it was used with a rudimentary assembler that directly punched the assembled object code onto the cards holding the source code.

As programming languages grew more sophisticated, they shifted from fixed format to free format, and the preprinted material on cards began to shift to other functions. The card shown above is an assembly language card printed for Bell Labs, for the GE 600 computer they purchased in the mid 1960's as part of their work in the Multics project. This card contains a few fixed fields, but the artwork centers on a corporate logo, and to help programmers, much of the space on the card is devoted to documentation of the punch positions used for each character in the GE 600 character set.

With the widespread standardization of high level languages such as FORTRAN and COBOL, generic punched cards for those language were widely sold. These were almost entirely free-form languages, with only a few constraints on format, but the tradition of cards with clearly labeled fields lived on for a long time. The FORTRAN card shown here was printed by IBM's New Zealand office, but it is otherwise indistinguishable from millions of similar cards printed around the world.

As fewer and fewer users asked for cards with field markings specific to their applications, it became more and more likely that users would use cards purchased for one purpose for some other purpose. In open shops, such as university computer centers, this became a particular problem. Anyone could walk in off the streets and "borrow" an handful of cards. The solution was to order cards with custom printing to identify the institution! The card here is from one of the oldest computer laboratories in the world, the University of Illinois Digital Computer Lab, home of the ILLIAC computers and builder of ORDVAC. This card has two sets of column indicators across the top, one for printing keypunches, which printed directly above the column being punched, and one for IBM's standard line of interpreters, which printed the first 64 columns on one line and the remaining columns on the line immediately below.

Of course, merely putting the name of the institution on the card is not very exciting, so many institutions, large and small, added corporate logos. Princeton University did this very nicely, as illustrated above. Princeton is noteworthy as the home of the Institute for Advanced Study, where, in 1946, John Von Neumann convened the Princeton Summer School and launched the computer age.

The graphic design work that goes into making special printing plates for a punched card can cost money, so sometimes, institutions opted for a less expensive route, overprinting a standard form with their logo instead of designing the form around the logo, as Princeton did. The MIT card shown above is a remarkably crude example of this, from an institution from which better would have been expected. In fact, this card was a stopgap measure while MIT was in the process developing a modernized logo.

In the 1960's, IBM introduced a 128 column card, containing 4 rows of 32 character positions each, where each character position was punched using a 6-bit code. These cards, at 2 5/8 inches high by 3 1/4 inches wide, were significantly smaller than the original Hollerith cards, and they could boast 38 more characters of data per card than the old UNIVAC standard. These cards were introduced along with IBM's System 3 line of "small business" computers, and they were intended to displace 80 column cards from the market. Despite their obvious advantages, they never caught on outside of certain specialized applications, notably retail sales price tags and inventory management. The 128 column cards were also used with only 96 columns of punched data, leaving room for 4 rows of print along the top edge instead of the usual 3 rows.

Most users considered these to be 96 column cards because punching the 4th row, the top row, punched through the textual version of the data, making it difficult for people to read what was printed there; furthermore, by the early 1970's, there was a strong demand for support for mixed upper and lower case text; this required the switch from a 6-bit to an 8-bit code. In order to maintain compatibility, the high 2 bits of the 8-bit code were punched separately from the low 6 bits, subdividing the top row of the card (formerly reserved for columns 97-128) to hold 3 tracks of 2-bit data instead of one track of 6-bit data. Clever code design ensured that old cards, punched using the 6-bit code, were correctly read using 8-bit software so long as the card did not contain more than 96 columns of data.

By the mid 1970's, most large scale data processing operations were at least investigating moving their punched card operations to timesharing environments, with their data stored on disk or magnetic tape, and by the mid 1990's, with timesharing mainframes and personal computers, the shift was almost complete, with very few businesses still using cards for anything other than scratch paper.iOne of the last important uses of punched cards has proven to be be voting. Use of pre-scored punched card ballots was introduced in the 1960's, and despite problems in the 1968 general election in Detroit, where a sudden rainstorm drenched at least one load of ballots in transit from a polling place to the counting center, this format quickly grew to become the most widely used computer-based election technology. By the time of the contested presidential elections of the year 2000, it was estimated that 1/3 of the polling places in the United States still used punched card ballots.

The problems with punched card ballots in the 2000 presidential election should not have come as a surprise. By the 1984 general election, the state of Iowa had effectively banned the use of punched card ballots, and in 1988, the Computer Professionals for Social Responsibility published a call for a general ban on the use of pre-scored punched card ballot. By the early 1990's mark-sense ballots and direct-recording electronic voting machines had both been developed to the point where they were viable replacements for punched card ballots, and in fact, by the year 2000, the major vendors of card based voting systems had all shifted their marketing emphasis to these newer technologies.

Reprinted with permission.

This was last updated in November 2008

### 1 comment

Send me notifications when other members comment.
Why are IBM's intimate connections to Nazi Germany not mentioned in this history? Without IBM's punch cards, the Nazis wouldn't have been able to trace and murder so many Jews. IBM made millions for selling its machines and punch cards to Nazi Germany, as demonstrated by award-winning investigative journalist Edwin Black in his New York Times bestseller book 'IBM and the Holocaust' (2001).
Cancel

## SearchCompliance

• ### risk map (risk heat map)

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

• ### internal audit (IA)

An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

• ### pure risk (absolute risk)

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

## SearchSecurity

• ### FIDO (Fast Identity Online)

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

• ### cryptanalysis

Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

• ### Trojan horse (computing)

In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

## SearchHealthIT

• ### vendor neutral archive (VNA)

A vendor neutral archive (VNA) is a technology that stores medical images in a standard format and interface, making them ...

• ### HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009

The HITECH (Health Information Technology for Economic and Clinical Health) Act of 2009 is legislation that was created to ...

• ### Epic Systems

Epic Systems is one of the largest providers of health information technology, used primarily by large U.S. hospitals and health ...

## SearchDisasterRecovery

• ### business continuity and disaster recovery (BCDR)

Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

• ### business continuity plan (BCP)

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

• ### call tree

A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

## SearchStorage

• ### cloud storage provider

A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals ...

• ### personal cloud storage (PCS)

Personal cloud storage (PCS) enables users to store data, photos, music, videos and other files on a local network-attached ...

• ### cloud SLA (cloud service-level agreement)

A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

## SearchSolidStateStorage

• ### hybrid hard disk drive (HDD)

A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close