Feeds

Airbus A380 bows out of Air Force One competition

Let Boeing have the unimportant deals, says EADS

High performance access to file storage

European Aeronautics Defence and Space (EADS), parent company of Airbus, has announced that it doesn't intend to bid for the recently-announced contract to supply new US presidential aeroplanes.

Aviation Week quotes Guy Hicks, EADS North America spokesman in Washington, as saying:

"After careful review, we've determined that participation in the Air Force One program will not help us meet [our] business objectives."

Hicks said that EADS - with Airbus involvement - wanted to focus on "bringing value to the US warfighter", which means that the company want the enormous deal to supply the new US air force tanker fleet. EADS actually managed to snatch that deal from Boeing last year, but the rival US aerospace behemoth protested to Capitol Hill that the buy hadn't been handled properly and was upheld - throwing the contract open again.

Though EADS/Airbus had planned - still does plan - to place much of the tanker work in the US, the company still faces a terrible image problem as a foreign supplier. The sense of affront to American pride at the idea of future Presidents riding around in Airbus A380 superjumbos would probably be even stronger - EADS has evidently calculated that going after the Air Force One bid would weaken its chances of winning the much bigger tanker deal on the second attempt.

That's probably a sound business decision, but it will weaken the US air force in bargaining with Boeing for the presidential jets, as the US manufacturer is now the only realistic contender.

As a footnote, one should note that the President will still nonetheless spend plenty of time in European aircraft: the new presidential helicopters, just now going into production, are modified UK/Italian Merlins. Air Force One will be US-made for the foreseeable future, then: but Marine One* will soon be substantially foreign-sourced. ®

Bootnote

*The President's aeroplane, operated by the USAF, takes on the callsign "Air Force One" when he is aboard. His helicopter is operated by the US Marines, and similarly becomes "Marine One".

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.