Feeds

Software Warehouse's old retail chain shuts doors

30 stores and 150 staff affected

  • alert
  • submit to reddit

High performance access to file storage

One Stop Computer Solutions, formerly Software Warehouse's retail business, has fallen into administrative receivership four months after Jungle.com boss Steve Bennett offloaded the business.

All 30 shops at the Midlands-based business are currently closed, and more than 150 staff are believed to be affected. Martin Hall and Vincent Sweeney at Price Waterhouse Coopers were yesterday appointed administrators.

The company was previously part of Steve Bennett's Software Warehouse empire, and was started in 1992. He sold the chain of shops via an MBO on 1 April to a group of six Software Warehouse directors and district managers. They paid a total of £1 plus the stock value for the business and changed the name to One Stop Computer Solutions.

As part of the deal, Jungle bought the mail order and logistics side of Software Warehouse, while Bennett put his efforts into e-tail venture jungle.com.

Although One Stop is unconnected with Bennett, he said today he would honour warranties on goods bought before 1 April. One Stop chiefs were unavailable for comment.

Bennett put One Stop's failure down to growth in online shopping. "Unfortunately for the stores, the summer has seen a slow down in retail sales as many purchasers have migrated their shopping online," he said.

In unconnected news Jungle has laid off around 20 staff. The redundancies at its warehouse in Coleshill, Warwickshire on Friday - including 20 full-time employees - was put down to automation and re-organisation at the warehouse.

According to Bennett, the redundancies follow moves to make the company more efficient - it has visited rivals such as Dabs.com and been taking advice from Logica on how to improve the business. They add to the other 20 staff culled in June at Jungle.

Bennett said the company, which has recently built a £1 million 30,000sq ft extension to the warehouse, will be profitable by the end of this year. ®

Related Stories

Jungle job cuts follow Software Warehouse merger
Jungle buys Software Warehouse ahead of planned IPO

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.