More regional towns added to NBN wireless network
- 05 June, 2012 13:42
Northern New South Wales, the Hunter and the southern part of Darling Downs in Queensland will be connected to the National Broadband Network (NBN) via wireless.
Around 17,000 households in the regions will be able to connect to the NBN from mid to late next year through its fixed wireless network. The complete NBN rollout in the areas is expected to be completed in 2015.
Residents outside the areas will be connected to the NBN via satellite.
NBN Co has brought forward the rollout of wireless and satellite services for the NBN in order for regional households to receive better broadband access, a statement announced.
A total of 93 per cent of homes and businesses will be connected to the NBN via fibre to the home, primarily in towns with more than 1000 premises.
Smaller towns with as few as 500 homes will be connected to the NBN via a fibre transit link.
It was also recently announced Coffs Harbour, Taree and Port Macquarie on NSW’s north coast would be connected to the NBN fixed wireless network, with completion scheduled in 2015.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Appropriate Backup Applications for Accelerated Virtualisation Projects
As virtualisation increasingly becomes an investment priority, a recent EDG survey has found that the associated operating expense can easily become too high a hurdle. In this paper, leading IT organisations quantify the role of inappropriate data-protection as a large obstacle to a stable virtualisation implementation. Read more to find how to optimise your backup applications to meet the present protection requirements.
CSO Spotlight: Security-as-a-Service Gaining Popularity
Organizations that are looking for security features including identity management, encryption and access control — and at the same time want to take advantage of the cost and flexibility benefits of the cloud —might check into security-as-a-service offerings available now from several vendors. Download now to find out more.
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.