Browse Definitions:

History of the punch card

The history of the punch card

The standard punched card, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board of Health and several states. After this trial use, punched cards were adopted for use in the 1890 census. 

Hollerith wasn't working in a vacuum! His idea for using punched cards for data processing came after he'd seen the punched cards used to control Jacquard looms. Jacquard, working in France around 1810, originated the idea of using holes punched in cardstock to control the pattern a loom weaves. Many Jacquard looms remain in use to this day, and you can occasionally find strings of Jaquard cards for sale.


 [string of Jacquard cards]

The string of Jacquard cards illustrated here came from a small rug-making loom in a woolen mill in Amana, Iowa. Each card in this string is 9 inches long by 1.25 inches wide by 1/16 inch thick, but other Jaquard looms used different size cards. Like all Jaquard loom cards, these are strung together on cords. The heavy cardstock is required because the "card reader" mechanism of a Jacquard loom is entirely mechanical. Modern high-volume Jacquard looms use metal cards!

The use of punched cards in the Jacquard loom also influenced Charles Babbage, who decided to use punched cards to control the sequence of computations in his proposed analytical engine. Unlike Hollerith's cards of 50 years later, which were handled in decks like playing cards, Babbage's punched cards were to be strung together like Jaquard's. Despite this and the fact that he never actually built an analytical engine, Babbage's proposed use of cards played a crucial role in later years, providing a precedent that prevented Hollerith's company from claiming patent rights on the very idea of storing data on punched cards.

Like many modern entrepreneurs, after Hollerith had perfected his first series of electromechanical punched-card machines, including a punch, a tabulating machine to accumulate statistics from the information punched on cards, and a sorting machine, he founded a company, originally the Tabulating Machine Corporation. As with many high-tech startups of today, it had a somewhat rocky start until an experienced manager entered the scene. Thomas Watson, previously working for NCR, took over. One of Watson's moves was to rename the company International Business Machines, and within a few decades, his company had expanded to the point that the Federal government sued it for anti-trust violations.

The overall dimensions of punched cards used for data processing have remained the same since Herman Hollerith invented the medium: 7 3/8 inches wide by 3 1/4 inches high by .007 inches thick. Prior to 1929, this was a standard size for many US banknotes, and Hollerith apparently chose it so that he could store cards in boxes made for the Treasury Department. Today, these dimensions are set by the EIA standard RS-292 media 1 punched card. This standard is augmented by ANSI X3.21-1967 governing the holes in the card and ANSI X3.26-1980 governing the use of the Hollerith code to encode alphanumeric data on cards.

The original code used for punched card data recording in the 1890 census had 22 columns with 8 punch positions each (although there was room on the card for a total of 11 punch positions per column). The coding used on those cards did not encode data in columnar fields, but rather, each punch position was assigned a specific meaning. The need to store more data on each card led to higher density formats, first 24 colums of 10 positions each in the 1900 census (inferred from the 1900 National Geographic article), and then 27 columns of 12 positions each in the 1910 census. By the end of the 1920's, the standard format used 45 columns of round holes per card and 12 punch positions in each column.

In 1928, Hollerith's company, now renamed IBM, introduced the rectangular hole 80 column format, almost doubling the amount of data that could be recorded on a card, and by the mid 1930's, IBM was predicting that round-hole cards would soon be things of the past.


 [round hole sperry punched card]

In fact, the round-hole format remained in use into the early 1990s, but in a very limited set of applications! The last use I am aware of is toll tickets on some eastern turnpikes. There are two reasons that the round hole format survived: First, IBM had a patent on their new rectangular format, so competitors were forced to limit themselves to the old format. Second, Remington Rand, one of IBM's major competitors in the pre-computer era, moved from Hollerith's code to a 6-bit code that allowed 90 columns of text to be stored on the old 45 column cards. When Remington Rand bought UNIVAC, they naturally integrated their 90 column card format with UNIVAC computers. In many ways, the UNIVAC card code was superior to IBM's "improved" rectangular hole version!

Oliver J. Jones wrote me that, in addition to surviving on some eastern turnpikes, UNIVAC's 90 column cards also remained in use through the 1960's at Macy's Department store and Lerner Stores, in the retail sector, the US Navy Medical Supply office and the Polaris missle control system, in the military sector, the New York City Tax Department, Long Island Lighting, and more. He sent along an image of the cover from a Remington Rand brochure and a promotional poster.

Mike Albaugh wrote me that he helped dismantle a UNIVAC SS90 system in 1974 or 1975 that had been in use up until the week before. He also saw a similar UNIVAC system in use at the Concord Naval Weapons Station around the same time. These apparently used 90 column cards.

If you look at the punched card equipment sold by IBM after 1931, you will find complete hardware support for IBM's alphanumeric Hollerith code, but you will also find that the majority of the machines sold were limited to numeric applications. At a time when, for example, the University of Iowa was punching student names on cards using the Hollerith code, other universities were developing 4-digit numeric encodings of common names so that they could avoid the need for the more expensive alphanumeric equipment.

The book Practical Applications of the Punched Card Method in Colleges and Universities, edited by G. W. Baehne an published by Collumbia University Press in 1935, contains an excellent summary of the state of the art in punched card data processing in 1935, including an appendix that appears to be a reprint of IBM's catalog for that year and many illustrated descriptions of typical applications.

When cards were used to store fixed-format information for data processing applications, they were almost always printed with format information, so that a casual reader could easily determine what punches on the card held what information. This printing could be quite specialized to one application, or it could merely set off fields in a standard way, with no indication on the card of what the purpose was.


 [punched card retail form]

The card shown here is typical of those used with IBM's line of card processing equipment from the 1930's onward. This particular example was printed for a range of retail applications where it must have been expected that the customer would handle the cards, as indicated by the warning: Do not fold or mutilate. This warning would be unnecessary if the card were only to be handled by data processing workers. While most fields of this card have no clear purpose, it contains an interesting and very specialized feature, a tab the cashier was supposed to tear off along a perforated line when the card was processed. A card with this tab removed would be seen by card processing equipment as having a punch in column 1, row 12.

It is important to note that the typical card processing applications from the 1890's to the 1950's did not require the use of computers! A deck of cards from a retail application, for example, could be sorted by the category field on a card sorter, and then each category could be run through a tabulating machine to sum the price fields of all cards in that category or similar accounting functions.

 [Gardner-Denver wire-wrap punched card]

Usually, fixed format cards documented the format on the top edge of the card, since keypunches almost always printed their textual information along this edge. Sometimes, as illustrated above, the interpretation was elsewhere. Such departures from the norm were most common on cards that were intended to be machine punched, as in this Gardner Denver wire-wrap machine card. This card was used to control a semi-automatic wire-wrap machine, the machine used to wire the backplanes of many of the mainframes and minicomputers of the 1960's. The wire-list for a backplane was typically produced with the aid of computer-aided-design tools, so this card would typically only be read by people during debugging.

In the 1950's, IBM also supported a truncated version of the 80 column card, with only 51 columns. These were frequently used in retail sales and other applications requiring limited storage capacity per card; they saved both bulk and paper, but added complexity to IBM's card processing equipment to allow support of both formats. In many cases, they began life as 80 column cards from which a stub could be torn, for example, as a receipt, leaving a 51 column remainder for tabulation.


Cards for Computers

With the advent of computers, complex pre-formatted cards continued to be used for to hold data, but in addition, cards were printed with formats specific to the needs of programmers. Some of these were equal in complexity to the standard data processing cards.

 [IBM 701 punched card]

The "IBM CALCULATOR INSTRUCTION CARD" shown here was printed in the early 1950's probably for use by programmers of the IBM 701, IBM's first general purpose computer. The card includes fields for both symbolic and numeric addresses, so it is probable that it was used with a rudimentary assembler that directly punched the assembled object code onto the cards holding the source code.

 [bell labs punched card]

As programming languages grew more sophisticated, they shifted from fixed format to free format, and the preprinted material on cards began to shift to other functions. The card shown above is an assembly language card printed for Bell Labs, for the GE 600 computer they purchased in the mid 1960's as part of their work in the Multics project. This card contains a few fixed fields, but the artwork centers on a corporate logo, and to help programmers, much of the space on the card is devoted to documentation of the punch positions used for each character in the GE 600 character set.

 [generic FORTRAN punched card]

With the widespread standardization of high level languages such as FORTRAN and COBOL, generic punched cards for those language were widely sold. These were almost entirely free-form languages, with only a few constraints on format, but the tradition of cards with clearly labeled fields lived on for a long time. The FORTRAN card shown here was printed by IBM's New Zealand office, but it is otherwise indistinguishable from millions of similar cards printed around the world.

 [University of Illinois generic punched card]

As fewer and fewer users asked for cards with field markings specific to their applications, it became more and more likely that users would use cards purchased for one purpose for some other purpose. In open shops, such as university computer centers, this became a particular problem. Anyone could walk in off the streets and "borrow" an handful of cards. The solution was to order cards with custom printing to identify the institution! The card here is from one of the oldest computer laboratories in the world, the University of Illinois Digital Computer Lab, home of the ILLIAC computers and builder of ORDVAC. This card has two sets of column indicators across the top, one for printing keypunches, which printed directly above the column being punched, and one for IBM's standard line of interpreters, which printed the first 64 columns on one line and the remaining columns on the line immediately below.

 [Princeton University punched card]

Of course, merely putting the name of the institution on the card is not very exciting, so many institutions, large and small, added corporate logos. Princeton University did this very nicely, as illustrated above. Princeton is noteworthy as the home of the Institute for Advanced Study, where, in 1946, John Von Neumann convened the Princeton Summer School and launched the computer age.

 [MIT punched card]

The graphic design work that goes into making special printing plates for a punched card can cost money, so sometimes, institutions opted for a less expensive route, overprinting a standard form with their logo instead of designing the form around the logo, as Princeton did. The MIT card shown above is a remarkably crude example of this, from an institution from which better would have been expected. In fact, this card was a stopgap measure while MIT was in the process developing a modernized logo.

 [IBM 96-col punched card]

In the 1960's, IBM introduced a 128 column card, containing 4 rows of 32 character positions each, where each character position was punched using a 6-bit code. These cards, at 2 5/8 inches high by 3 1/4 inches wide, were significantly smaller than the original Hollerith cards, and they could boast 38 more characters of data per card than the old UNIVAC standard. These cards were introduced along with IBM's System 3 line of "small business" computers, and they were intended to displace 80 column cards from the market. Despite their obvious advantages, they never caught on outside of certain specialized applications, notably retail sales price tags and inventory management. The 128 column cards were also used with only 96 columns of punched data, leaving room for 4 rows of print along the top edge instead of the usual 3 rows.

Most users considered these to be 96 column cards because punching the 4th row, the top row, punched through the textual version of the data, making it difficult for people to read what was printed there; furthermore, by the early 1970's, there was a strong demand for support for mixed upper and lower case text; this required the switch from a 6-bit to an 8-bit code. In order to maintain compatibility, the high 2 bits of the 8-bit code were punched separately from the low 6 bits, subdividing the top row of the card (formerly reserved for columns 97-128) to hold 3 tracks of 2-bit data instead of one track of 6-bit data. Clever code design ensured that old cards, punched using the 6-bit code, were correctly read using 8-bit software so long as the card did not contain more than 96 columns of data.

By the mid 1970's, most large scale data processing operations were at least investigating moving their punched card operations to timesharing environments, with their data stored on disk or magnetic tape, and by the mid 1990's, with timesharing mainframes and personal computers, the shift was almost complete, with very few businesses still using cards for anything other than scratch paper.iOne of the last important uses of punched cards has proven to be be voting. Use of pre-scored punched card ballots was introduced in the 1960's, and despite problems in the 1968 general election in Detroit, where a sudden rainstorm drenched at least one load of ballots in transit from a polling place to the counting center, this format quickly grew to become the most widely used computer-based election technology. By the time of the contested presidential elections of the year 2000, it was estimated that 1/3 of the polling places in the United States still used punched card ballots.

The problems with punched card ballots in the 2000 presidential election should not have come as a surprise. By the 1984 general election, the state of Iowa had effectively banned the use of punched card ballots, and in 1988, the Computer Professionals for Social Responsibility published a call for a general ban on the use of pre-scored punched card ballot. By the early 1990's mark-sense ballots and direct-recording electronic voting machines had both been developed to the point where they were viable replacements for punched card ballots, and in fact, by the year 2000, the major vendors of card based voting systems had all shifted their marketing emphasis to these newer technologies.

This article is part of  the Punched Card Collection by Douglas W. Jones
Reprinted with permission.

This was last updated in November 2008

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Why are IBM's intimate connections to Nazi Germany not mentioned in this history? Without IBM's punch cards, the Nazis wouldn't have been able to trace and murder so many Jews. IBM made millions for selling its machines and punch cards to Nazi Germany, as demonstrated by award-winning investigative journalist Edwin Black in his New York Times bestseller book 'IBM and the Holocaust' (2001).


File Extensions and File Formats


  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...


  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...



  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...


  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...


  • Tier 0

    Tier 0 (tier zero) is a level of data storage that is faster, and perhaps more expensive, than any other level in the storage ...

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...


  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...