Feeds

Airbus revises A380 delivery schedule

Further delays

High performance access to file storage

Airbus has confirmed it's cutting the number of A380s due to be delivered in 2008 and 2009 - from 13 to 12 and 25 to 21, respectively.

The company explains: "Airbus has completed the A380 programme review and is now informing customers about changes to its delivery schedule. The review assessed the programme status at the critical juncture of transitioning from low rate 'individual' production, so-called Wave 1, to the full serial design and manufacturing process, called Wave 2.

"Overall, the recovery programme, initiated in summer 2006, is progressing well. Four aircraft were delivered as planned and are performing very well in airline operations on long-range routes. Seventeen aircraft are in various stages of production, mainly in the wiring installation and system testing phases. Most aircraft earmarked for delivery in 2008 have already flown.

"However, the review has also shown that the steep ramp-up planned in 2006 is not fully achievable. Time and resources needed for Wave 1 production aircraft are higher than expected, and this has created some delay in the changeover to Wave 2 with its new design and manufacturing process."

Quite how expectant airlines will take the news remains to be seen. Airbus currently has total orders of 192 for the A380, with just four delivered and operational with Singapore Airlines. Among those eager to get their hands on the controls are Emirates (58 orders), Qantas (20), British Airways (12) and Virgin Atlantic (6).

Airbus adds: "Details about the new plan and the further ramp-up and delivery slots in 2010 and the following years will be discussed with customers in the coming weeks."

Regarding the financial implications of the knock-back, the company concludes: "The results of this review do not, at this stage, cover the financial impact. The extent of the additional costs will be influenced by the actual production and delivery scenario. This will follow discussions with the customers and a more precise evaluation of the implications of the new delivery schedule for 2010 deliveries and beyond. This will therefore take some more time to determine." ®

High performance access to file storage

More from The Register

next story
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Saturn spotted spawning new FEMTO-MOON
Icy 'Peggy' looks to be leaving the outer rings
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.