Feeds

BT reforms broadband registration scheme

'Bout time

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

BT has lowered the number of registrations needed for some exchanges to be converted to broadband in a bid to speed up the roll-out of ADSL in the UK.

For instance, Holmer Green in Buckinghamshire has had its trigger level reduced from 700 to 250, and since it has already passed this threshold, is now set to be converted to DSL.

In all, BT has reduced the threshold for 388 exchanges and also set trigger levels for a further 87 areas.

The thresholds are part of BT's broadband demand registration scheme, which is designed to map pockets of broadband demand across the country currently without DSL. If sufficient demand can be plotted through people registering their interest, then BT is happy to convert the exchange to broadband.

BT originally set some very high thresholds claiming that this number of people was needed to justify the investment. However, it now claims that a review of the economics (such as the price of kit coming down) of providing ADSL at local exchanges means that it can lower the number of people needed to make the investment viable.

In a statement Paul Reynolds, BT Wholesale chief executive, said: "The registration scheme has helped us guide investment in broadband to match demand. Our growing experience of the actual work involved now allows us to be confident in lowering many of the demand levels at which we will upgrade exchanges for broadband."

Last month BT eliminated a layer of clunky bureaucracy from its much-criticised ADSL pre-registration scheme by removing the need for 75 per cent of registrations to be confirmed.

The move was a victory for common sense and means that BT will upgrade an exchange as soon as it hits its trigger level.

BT has so far converted 13 exchanges to DSL thanks to this scheme with work underway at a further 58.

Two-thirds of households (1,132 exchanges) are now connected to a DSL-enabled exchange. ®

Related Story

BT improves ADSL demand trigger process

Security for virtualized datacentres

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.