Feeds

TNZ braves the demerger with strong profits

While Stephen Fry gets throttles

High performance access to file storage

The freshly de-merged Telecom New Zealand has posted a net profit of $NZ1 billion after what the CEO described as the “most complex corporate transaction in recent New Zealand history.”

Adjusted profits rose 52 per cent to $NZ240 million with earnings from continuing operations coming in at $NZ129 million. The carrier demerged its infrastructure unit in November 2011, impacting the results.

"Due to the demerger timing and the associated accounting impact, year-on-year financial comparisons are a complication," said Telecom NZ CEO Paul Reynolds. “The demerger was probably the most and a world’s first for a telecommunications company. I am pleased it has helped deliver real value for customers and shareholders.”

He added that the simplification of the business had delivered both improvement to customer satisfaction and reduction in costs.

“Customer satisfaction has improved in New Zealand, and the focus on simplicity and efficiency means that costs have declined faster than revenues, enabling Telecom to maintain flat EBITDA for its continuing operations,” he said.

But one customer, Stephen Fry, who is in New Zealand working on the Hobbit took to the Twiitersphere this week to vent his anger with the carrier. Fry tweeted that New Zealand's broadband is probably the worst he'd encountered. A spokeswoman for Telecom said that the problem had been a 'misunderstanding' and that Fry had blown the data cap on the residential broadband plan at the house where he is staying and his service was throttled.

“Telecom has since spoken to the broadband customer and they have now been put on a plan better suited to their needs,” the carrier said. Fry later tweeted that Telecom had been 'quick and polite' in fixing his problem adding “I wonder if everyone who complains gets this attention.”

Telecom NZ broadband revenues were up 5% during the half, through a combination of a 7,000 increase in connections during the half and a 2 percent increase in ARPU (average revenue per user). ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.