Feeds

Overbuild threat drove NBN decision: Conroy

ABC's Four Corners summarises the history of a venomous debate

Secure remote control for conventional and virtual desktops

Australia could have had privately-built high-speed FTTN broadband, but for the roadblocks put in place by its incumbent carrier, according to an in-depth investigation into the history of the National Broadband Network by ABC programme Four Corners.

Prior to the global financial crisis, successive Australian governments had fielded various proposals to support a national broadband infrastructure built by the private sector. These had run into various problems both of funding and of regulation.

According to the Four Corners report, Telstra was the roadblock to the development of a fibre-to-the-node (FTTN) network in Australia. If it was to build a network itself, it wanted both government support and protection from competition. If the government had mandated FTTN on Telstra's network, it would have had to compensate the carrier for appropriating its property.

"No expert in the field, nowhere in the legal field, commercial field, would give us a suggestion that the sort of bill you'd pay to Telstra was anything less than $15-20bn," Senator Stephen Conroy, minister for Broadband, Communications and the Digital Economy, told the programme.

Had the government done so, it would still have a network under threat of an overbuild by Telstra.

"The government could spend $15bn to build a fibre-to-the-node network, pay $15-20bn to Telstra for compensation, and then Telstra could take that money and build a fibre to the home network past you and strand 70 per cent of $15bn on the side of the road," Conroy said.

Now safely in America, former Telstra executive Phil Burgess agreed with Conroy's assessment, saying "that's the way competition works. The only way it'll be stopped is if they have laws that prevent it".

Those laws passed the Australian parliament this year. ®

Security for virtualized datacentres

More from The Register

next story
Net neutrality protestors slam the brakes on their OWN websites
Sites link up to protest slow lanes by bogging down pages
Drag queens: Oh, don't be so bitchy, Facebook! Let us use our stage names
Handbags at dawn over free content ad network's ID policy
Who us, SHARE infrastructure? Networks reject gov proposal
Execs pour scorn on 'national roaming' outline – report
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Net neutrality fans' joy as '2.3 million email' flood hits US Congress
FCC invites opinions in CSV format, after Slowdown day 'success'
'Serious flaws in the Vertigan report' says broadband boffin
Report 'fails reality test' , is 'simply wrong' and offers ''convenient' justification for FTTN says Rod Tucker
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.