Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

Telstra awards NBN-related contract to Service Stream, worth up to $420m

Service Stream has previously been responsible for servicing 60 per cent of Telstra’s copper, fibre and broadband networks.

Telstra has awarded a $180 million National Broadband Network-related (NBN) contract to Service Stream for remediation of the telco’s pit and pipe infrastructure in connection with the NBN.

Service Stream will be responsible for remediation activity in New South Wales, the Australian Capital Territory, Western Australia, South Australia and the Northern Territory.

The three-year contract, with options for two two-year extensions, is worth up to $420 million.

Service Stream has previously been responsible for servicing 60 per cent of Telstra’s copper, fibre and broadband networks.

The company is also actively involved with the roll out of the NBN, receiving several contracts from NBN Co, including an $81 million contract to carry out fibre deployment in New South Wales, South Australia, Western Australia and the Northern Territory.

Service Stream has also been awarded a contract to activate NBN equipment in premises over the next two years in Victoria, Western Australia, the Northern Territory and South Australia in a contract worth up to $64 million.

Follow Stephanie McDonald on Twitter: @stephmcdonald0

Follow Computerworld Australia on Twitter: @ComputerworldAU

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Telstra
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: National Broadband Network (NBN), Service Stream, Telstra
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Information Management
    Valuable data can be a needle in a haystack, but by leveraging the value in existing information assets, organisations can generate real and achievable gains in revenue generation, IT investments and productivity gains. This whitepaper discusses how Information Management (IM) is a multi-faceted discipline that can be employed to meet or exceed your business objectives.
    Learn more »
  • The F5 DDoS Protection Reference Architecture part 3 of 3
    This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO