Feeds

GUS sniffs around PowerHouse

Currys issues 'open invitation' to PH staff

  • alert
  • submit to reddit

GUS, parent of retailers such as Argos and Homebase, is reportedly sniffing around what's left of PowerHouse after the electrical retailer went tits up last week.

The Sunday Telegraph this past weekend reported that GUS has been in talk with receivers Deloitte & Touche to acquire some or all of the 130 stores across the country.

If successful, GUS could either rebrand the PowerHouse stores under Argos' colours or opt for a standalone outfit, reported the paper.

Electrical retailers Dixons and Comet are also reported to have taken an interest in buying up parts of PowerHouse.

PowerHouse - the UK 's largest independent electrical retailer - called in the receivers last week with the immediate closure of 93 stores and the loss of 813 jobs.

Receivers Deloitte & Touche said they were "carrying out a rapid assessment of the company’s operations" with a view to selling the business as a going concern.

Separately, Currys - parts of the Dixons Group - has issued an "open invitation" to poach some of the PowerHouse staff who might be facing the chop.

Currys plans to hire some 500 permanent staff immediately and a further 800 temporary workers for the busy Christmas period. ®

Related Story

PowerHouse axes 813 jobs

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.