Feeds

Humble Fiorina declined 'most powerful woman in the world' post

She's still pretty amazing

Seven Steps to Software Security

Stripped of her position atop the technology world, Carly Fiorina has morphed into a humbler, gentler globe-trotting celebrity speaker. Or so the Mercury News would have us believe.

A Merc puff piece from last week seems torn between presenting Fiorina as the ultimate jet-setter and portraying her as someone who became calm and pensive after learning a difficult lesson. Why even write such a story? Well, it's been about a year since HP gave Fiorina the boot.

"Slowly, she's been admitting some mistakes she made while at the helm of HP," the paper tells us about the material found in Fiorina's speeches, which cost more than $50,000 a pop.

And then the paper turns to Rich Tehrani, who hired Fiorina to speak at a conference.

"She wanted to make sure we didn't call her the most powerful woman in the world,'' Tehrani said. "She seemed beyond humble. She's put on this pedestal by so many people, and yet is more humble than the person sitting next to you. Maybe that has to do with not working. Retirement may relax you to such a degree that you're not stressed out anymore.''

We've always said that the ultimate sign of humility is asking not be called the most powerful member of your gender anymore. Of course, being kicked off the Fortune list of the 50 most powerful women in 2005 probably made that call a bit easier.

Part of Fiorina's return to humbleness includes the purchase of a $3.6m Washington, DC, home to complement a Los Altos home assessed years ago at being close to $4m.

And what Fiorina love-fest would be complete without an appearance from Dial-A-Quote - Rob Enderle - who having served in advisory roles at the likes HP, IBM and Dell always has a critical take on PC personalities.

"She has amazing vision,'' Enderle said.

And, still maintaining that the Compaq buy was a great idea, she seems to have a unique version of hindsight as well.

More from the Merc here

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.