Feeds

Gameplay axes 275 jobs

Blood on carpet, walls, windows, sofa...

  • alert
  • submit to reddit

High performance access to file storage

Gameplay is to axe 275 jobs as part of a major shake-up it that will save the multiplatform games outfit £12.5 million a year.

The far-reaching restructuring programme hits just about every aspect of the business even though directors at the company have increased their revenue estimate for the six months to January from £40 million to more than £43 million.

From today, the Group is to be divided into two distinct operating divisions: the Technology Division and the Boxed Games Division. Non core businesses and activities will be closed or sold, the company said.

However, while Gameplay focuses on restructuring and its path to profitability, others have described today's announcement as a massacre.

Yesterday, The Register reported that Gameplay was set to make job cuts today. However, even we have been taken aback at the scale of the losses.

The catalogue of cuts made by Gameplay's management makes grim reading since every one is likely to result in job losses.

Gameplay's UK call centre and distribution operations in Leeds will be amalgamated into one site.

It will also close its eight shops, although The Register understands that these may have already been shut down.

Gameplay said there will also be "some rationalisation to reduce the cost base in Germany" and it appears the outfit could pull out of France altogether.

It is to reduce the number of Web sites it runs from 16 to ten. And instead of being run from within their country regions, the sites will be run centrally.

Oh, and 54 jobs will go at its head office in London.

In a statement, Mark Strachan, Chairman of Gameplay, said: "This is a broad and decisive restructuring of the business with the single aim of bringing forward the point at which the Group is profitable."

Mr Strachan was unavailable for comment when The Register called Gameplay this morning.

In December Gameplay shed 20 jobs and lost its MD, Tim Coles. ®

Related Story

Gameplay to make more job cuts?

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
Jeff Bezos reveals Amazon's brutal scale in annual letter
Bit-flipping retail mogul seems hybrid of Ford and Rockefeller
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.