Conroy demands apology for false NBN claims
- 16 July, 2012 16:12
Senator Stephen Conroy has moved to reassure the Queensland regions of Townsville, Rockhampton and Mackay that they will receive the National Broadband Network (NBN) via fibre.
The move follows claims by Nationals leader, Warren Truss, on Meet the Press that the three regions would receive the NBN via wireless, despite “[Julia Gillard promising] them that they were going to get fibre-optic cable to the home,” Truss said.
NBN Co released three statements last week regarding fixed wireless planning proposals for the three areas. However, NBN Co told Computerworld Australia the NBN would be delivered via fibre in the metropolitan areas of Townsville, Rockhampton and Mackay, with the outskirts of the metropolitan areas will receive the NBN via fixed wireless and beyond those areas via satellite.
Fibre construction in Mackay and Rockhampton is due to begin in the next 12 months, according to Conroy, minister for broadband, communications and the digital economy. Fibre construction has already commenced in Townsville to over 14,500 premises.
Around 12,500 premises are expected to be passed by fibre in Mackay, with 11,000 premises receiving the NBN in the area via fixed fireless from late 2013.
A round 14,200 premises are to be passed by fibre in Rockhampton, with around 3500 premises receiving the NBN in the area via fixed wireless from late 2013 to late 2014.
Meanwhile, the NBN will be delivered to around 15,000 premises in Townsville from late 2013 to late 2015.
Conroy called on Truss to apologise for making misleading statements about the NBN.
"Over 50,000 homes and businesses in Townsville, Mackay and Rockhampton are already part of the fibre rollout," Conroy said.
“This is not the first time Mr Truss has been caught out on the NBN. In March and May, he claimed people in his electorate of Wide Bay were not getting the NBN. He misled the Australian public on both occasions.”
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Take part in the Computerworld conversation: LinkedIn: Computerworld Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- The SPARC Difference - Reduce Risks, Cut Costs, Power Innovation
- Data Centre Physical Infrastructure: Optimising Business Value
- IDC Insight: Saving Time and Money with Savvy Use of Flash in Automated Storage Tiering
- Enterprise Mobility Management: Embracing BYOD Through Secure App and Data Delivery
- Staying Ahead of the Data Explosion
- HTC unveils new Butterfly s phone that packs more battery life
- CIOs bemoan lock-in and the 'false flexibility' of the cloud
- Google Glass apps for enterprises coming by early 2014
- iPad 5 rumour rollup for the week ending June 18
- Say 'cheese', Earthlings! Spacecraft to snap home planet pic from deep space
Solving the skills conundrum – part 1
Samsung Galaxy S4 vs. HTC One: 5 Reasons to Choose the GS4
High school students still see ICT as ‘sitting at a computer all day’: survey
Does encryption really shield you from government's prying eyes?
Solving the skills conundrum – part 1
Best Practice in BYOD
The key trend affecting enterprise mobility today can be summarized in four letters: BYOD – Bring Your Own Device. As the number of end-users bringing devices into your organization grows, so does the need for an effective Enterprise Mobility Management (EMM) solution. Learn how to manage devices across multiple platforms all from a single, centralised and unified management console. Download for more!
Choice and Control – Considerations for Developing Enterprise Cloud Strategies
Enterprise-wide cloud implementation can be a challenging process, requiring a thoughtful, strategic approach. In this whitepaper, IBM® shares considerations for developing enterprise cloud strategies. It looks into how the rapid-scale enterprise-class environment can help enable the type of agile infrastructure that aids organisations in quickly meeting the demands of an ever-evolving marketplace, thereby providing true business value. Read now.
Detecting APT Activity with Network Traffic Analysis
Today’s successful targeted attacks use a combination of social engineering, malware, and backdoor activities. This research paper will discuss how advanced detection techniques can be used to identify malware command-and control (C&C) communications related to these attacks, illustrating how even the most high-profile and successful attacks of the past few years could have been discovered.