Tech CEO Report Card - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next Tech CEO Report Card-4 Next

Intel’s Paul Otellini saw his rating increase by three points for a 90 percent approval rating between March 2010 and March 2011.

Glassdoor recently published their annual tech CEO report card. For the report, they evaluated company and CEO approval ratings between March 16, 2009 through March 15, 2010, and March 16, 2010 through March 15, 2011. The CEO approval ratings are calculated similarly to presidential approval ratings; Employees are simply asked: “Do you approve of the way your CEO is leading the company?”

Over the two years, company ratings for the dozen tech companies evaluated remained pretty stable year-over-year. The highest rated is Google at 3.8 (satisfied) on a scale of one to five, followed closely by Adobe (3.6, satisfied), Apple (3.6, satisfied) and Intel (3.6, satisfied).  eBay saw the greatest increase, increasing from a 2.7 to a 2.9 (ok) rating in the past 12 months. Amazon slipped during the same period from a 3.3 to a 3.1 (ok) rating.

More Slideshows:

Ten Free Software Tools for the Cost-Conscious Consultant Ten free applications that will help you manage your time and tackle niche tasks.

Six Tips for a Greener Data Center Steps for creating better airflow in the data center.

Smartphone Security: Alarming Complacency Among Mobile Users Most consumers are unaware of the security risks associated with their smartphones.


Related Topics : Fiber-to-the-Premises

More Slideshows

Holiday20-190x128 5 Ways to Protect Your Data Center from a 'Zombie' Server Attack

It's easy to forget about the ghosts of servers past that are hiding in the background, continuing to consume electricity and potentially exposing organizations to malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.