Updated NBN Co plan to be released next week
- 03 August, 2012 14:19
NBN Co will release its revised corporate plan next week, following widespread media reports it would be released this week.
NBN Co confirmed with Computerworld Australia that the revised corporate plan will be released next week and “will contain some new statistics” on take-up rates to the National Broadband Network (NBN).
The Australian reported on Wednesday that around 235,000 were expected to be passed by June 2013, which is below the 950,000 target NBN Co announced in its December 2010 corporate plan.
Paul Budde, telecommunication analyst at BuddeComm, told Computerworld Australia the revised corporate plan is also expected to firm up rollout data, which he said should be in line with previous information, with a new starting date from 2012.
“So data will be firm from now on with the Telstra and Optus contracts in place,” he said. “[There will also be a] firming up of the costing and [it] should stay in line with earlier data and reports. In other words, not a blow out as had been predicted by some.”
NBN Co told Computerworld Australia take-up figures were “promising” around Australia.
“For example, in the Kiama first release site, take-up is 38 per cent. In Willunga, it is 35 per cent. These figures show strong demand for the NBN, especially given that the NBN has only been live in these areas for a year and many Australians will still be on existing broadband contracts,” NBN Co said.
Kiama was switched onto the NBN in July 2011, with the Kiama Downs/Minnamurra region on the south coast of NSW covering around 2350 premises.
During the region’s trial period, 80 per cent of properties consented to the connection of a line during construction to make them NBN ready.
Willunga, 47kms south of Adelaide, switched onto the NBN in September last year and covers 940 premises. Around 91 per cent of premises consented to connection lines to make them NBN ready.
Beyond the trials, which concluded in September 2011, premises had to connect to the NBN via retail service providers.
While NBN Co stated in its initial corporate plan for 2011 to 2013 that "it is anticipated that the plan will be updated at least once a year," the plan has not been updated since its December 2010 release.
Follow Stephanie McDonald on Twitter: @stephmcdonald0
Follow Computerworld Australia on Twitter: @ComputerworldAU
Take part in the Computerworld conversation: LinkedIn: Computerworld Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
- Customer Success - St. John Ambulance Australia
- Hybrid IT Service Management: A Requirement for Virtualisation and Cloud Computing
- Expanding Web Single Sign-On to Cloud and Mobile Environments
- Real-Time Protection Against Malware Infection
- Five Strategies to Help You Carve Out Costs With Open Source Solutions
Why change management doesn’t work
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
A Holistic Approach to your BYOD Challenge
More and more enterprises are seeing significant benefits from allowing employees to choose the device they use to get their jobs done, and are adopting bring your own device (BYOD) initiatives. While the BYOD trend increases flexibility and productivity, it introduces a host of new challenges for your IT administrators. Click for more!
Spear-Phishing Email: Most Favored APT Attack Bait
This research paper presents findings on APT-related spear phishing from February to September 2012. We analysed APT-related spear-phishing emails collected throughout this period to understand and mitigate attacks. The information we gathered not only allowed us to obtain specific details on spear phishing but also on targeted attacks. We found, for instance, that 91% of targeted attacks involve spear-phishing emails, reinforcing the belief that spear phishing is a primary means by which APT attackers infiltrate target networks.
Advanced Malware Exposed
This handbook shines a light on the dark corners of advanced malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens. This ebook will provide readers with a new understanding of the rapidly developing cyber threat landscape and practical insights into how they can protect their data and computing infrastructures. Download now.