Feeds

NICTA on the budget chopping block

Current funding deed to be its last

Application security programs and practises

Updated The research house that gave the world the first provably secure operating kernel, and has been in the engine room of other IT application innovations in bionic vision, logistics, mapping and hundred-Terabit optical networking, is under threat under the 2013 Federal Budget.

Funding for NICTA, funded through the Department of Broadband, Communications and the Digital Economy's ICT Centre of Excellence program, is to end when its current funding deed expires at the end of 2015.

In previous budgets, the program was expected to continue funding levels of the order of $AU20 million after 2015, but the DBCDE budget papers now state that funding for the program will be phased out.

While the program's commercial revenue has been growing – it's expected to reach $AU10.8 million in the 2014-2015 financial year – the only way the NICTA could exist absent government support would be if it could greatly expand its commercialisation.

Apart from the provably secure kernel, which was snapped up by General Dynamics, other spinoffs include:

  • Mobile video startup Incoming which secured more than a million dollars in funding from OneVentures and Citrix Startup Accelerator
  • Saluda Medical, which is researching neural stimulation for pain management
  • Scalify, which opened for beta testing in March hoping to attract game publishers to its P2P networking platform. It attracted $2 million from Starfish Ventures during 2012.

For one of the government's smaller budgetary commitments, NICTA seems to be a fairly effective way to fund R&D, bringing in a dollar for every two spent.

The Register has sought comment from NICTA and communications minister, Senator Stephen Conroy.

NICTA has stated that it was not anticipating funding beyond 2015. The Minister's office is yet to respond. ®

Update: Senator Conroy's office has replied to The Register:

"NICTA is funded in the budget for the 13/14 and 14/15 financial years, with future funding to be considered in the context of next year's budget.

"The Government has a long-standing history of support for NICTA and the groundbreaking research and innovation it undertakes."

The Register notes, however, that the 2012-2013 budget forward estimates included funding for NICTA through 2016, which has been removed from the forward estimates in the 2013-2014 budget. We have sought further clarification on this point. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Sit back down, Julian Assange™, you're not going anywhere just yet
Swedish court refuses to withdraw arrest warrant
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
MPs wave through Blighty's 'EMERGENCY' surveillance laws
Only 49 politcos voted against DRIP bill
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
British cops cuff 660 suspected paedophiles
Arrests people allegedly accessing child abuse images online
LightSquared backer sues FCC over spectrum shindy
Why, we might as well have been buying AIR
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.