Feeds

Compromise fends off PNC Telecom collapse

Out on Manoeuvres

  • alert
  • submit to reddit

Build a business case: developing custom apps

PNC Telecom, the owner of the KJC mobile telecom retail chain, staved off collapse today after striking a "compromise" deal with a major shareholder.

Geremy Thomas, former CEO, founder and owner of 17.62 per cent of the company, had called an EGM for today in an attempt to vote out the entire board - with the exception of the finance director.

But PNC had a bombshell of its own: in a regulatory news statement issued to the London Stock Exchange, the mobile firm said a major creditor (said by FT to be Vodafone) had informed it on Christmas Eve that it would withdraw extended facilities and demand immediate payment of monies owed if there was a change of management control.

And if that weren't bad enough: "In addition to repaying the above, this action will require the Company to seek further alternative sources of credit to purchase stock. The Company does not currently have sufficient facilities available to it to meet these obligations. In the event that the Company is unable to fund this outflow, it is the opinion of the directors that PNC will have to cease to trade."

The stark warning was enough to bring the two sides to the negotiating table: the deal sees Thomas return to the company as non-exec deputy chairman, the departure of Lord Stevens as chairman, and the appointment of John Peete, already a director as new chairman.

A run-through of PNC news over the last year on Etrade UK makes for dismal reading: two profit warnings, the dismissal/resignation of CEO Darren Ridge and proceedings launched against him for the return of monies that the company says is due to it. Shares today are 19.5p, against a 12-month high of 33p and the glorious bubble heights of 400p, reached in 2000.

PNC also owns the 07000 personal phone number operation. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.