Feeds

Infinium CEO quits after 14 weeks

Bachus bails

High performance access to file storage

Kevin Bachus, the ex-Microsoft Xbox chief who took charge of online games service Infinium Labs in August, has quit the company after barely three months on the job.

Stepping in to fill the now-vacant CEO post is Greg Koler, who was head of Infinium's European operations. Koler is now Interim CEO. He's also the company's CFO and President. He may even be the guy who makes the tea, too.

"The Company plans to enter into a definitive employment agreement with Mr. Koler in the immediate future," the firm's latest filing with the US Securities and Exchange Commission (SEC) notes.

Bachus assumed the hot-seat on 15 August after company founder and CEO Tim Roberts stepped down to become chairman of the board. Bachus originally joined Infinium in January 2004 as President. He resigned both positions, plus that of acting CFO, on 17 November.

Infinium said simply Bachus quit "to pursue other opportunities".

When The Register spoke to him in September, Bachus said his immediate goals were to put the company's "house in order" - to put a more formal corporate structure in place and make the business a more attractive proposition for investors.

It's not clear how successful Bachus' efforts to find funding have been. Certainly, Infinium didn't address that aspect of his role directly today. Koler said that Bacchus' efforts had "helped put our operational planning on track and has helped create awareness for the company in the industry".

Bachus' industry connections may well have encouraged it to consider Infinium and its proposed Phantom games console and broadband content delivery service a more serious player than before. But it remains the case that delays have caused observers to wonder whether the much-hyped system will ever see light of day.

Phantom was first scheduled to ship late 2003, then in November 2004. After that launch was delayed, Infinium stopped mentioning launch schedules in public. All Bachus would say when we asked him was "sooner rather than later". ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.