Feeds

Welsh small.biz urged to get wired

The band is broad - jump in, says e-minister

  • alert
  • submit to reddit

High performance access to file storage

E-minister Andrew Davies says more small and medium businesses in Wales need to take advantage of broadband Internet access. Wales will have 96 per cent broadband coverage by 2005 but take-up among smaller businesses is disappointing. Davies said that only six per cent of Welsh SMEs have broadband connections, compared to 10.4 per cent nationally.

Davies said: "We need to find ways to increase this figure and promote the advantages of this new technology."

In separate, but related, news broadband suppliers could do a better job of targeting small and medium businesses across Europe, according to the latest research from Frost and Sullivan.

There are still some barriers - broadband providers lack an understanding of the business issues faced by smaller companies and could improve their marketing.

The survey notes that regional and national governments are increasingly promoting the benefits of broadband services to SMEs.

Selling broadband to SMEs is also an opportunity to bundle and sell other products and services. Subsidies for rural areas mean that all businesses should have a chance to get broadband access. Providers should also be aware that simple provision is an increasinly crowded market place so they need to provide a different service.

Paul Devine, research manager at Frost and Sullivan said: "For effective targeting of and penetration into the SME sector, service providers will have to focus on promotion, channel management, increased availability of applications and means of alleviating end-user concerns,"

Frost and Sullivan talked to most European broadband providers for this survey. The UK business broadband is growing at 100 per cent a year. France will see 90 per cent of SMEs with potential access to DSL by 2005, Germany already has 250,000 SMEs with broadband connections. ®

Related stories

BT and Microsoft target small.biz
BTo touts DSL discounts for Small.biz
Broadband by blimp idea floated

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.