Feeds

Telstra, not Turnbull, at fault in Twitfight

Caveat emptor applies to broadband so Turnbull was rude but right

Maximizing your infrastructure through virtualization

Australia's communications minister Malcolm Turnbull stands accused of telling small business owner Julia Keady to move to another home if she wants better broadband, but that interpretation of the exchange between Turnbull and Keady is not correct and ignores the golden rule of any transaction: buyer beware.

Here's the pair of tweets that kicked off the exchange.

The source of the first tweet, small business owner Julia Keady, has since blogged the following points:

  • Our research into Ocean Grove showed adequate broadband for our needs
  • When we called to connect our services, we were told there would be no broadband available to us. We did check prior to purchasing our house.
  • Telstra customer service said they would not be putting any more ports into the exchange due to the uncertainty brought about by the NBN

Our take on the post is that prior to buying the house, Keady checked about broadband availability and was told DSL services are available in the area. But upon attempting to actually acquire a DSL service the lack of available ports was pointed out, leading Keady to express her ire.

Keady's more detailed explanations on her blog show the situation does deserve some attention. Whatever source Keady used to satisfy her curiosity about the availability of broadband, it clearly did not offer the nuanced information that would have allowed a properly-informed decision. Turnbull's portfolio gives him scope to ensure that fate does not befall others.

But accusing Turnbull of suggesting Keady move house is nigh-on impossible to support on the facts in the public domain.

The Register's Australian staff feel Turnbull often displays the point-scoring, evasive behaviour that Australians so revile in their leaders. But on this occasion, he asked a reasonable question - did you check before you moved? - and did not receive a direct response.

Keady's points are well made. More pervasive broadband is a fine idea. Few in Australia contest that notion and fewer of those who do are credible. Turnbull's mixed-media national broadband network plan is unashamedly about speed and cost of rollout. Its fingers-crossed attitude towards delivery of a durable investment is worrying, but he's doing little to delay the NBN. Keady's beef on this occasion should therefore be with the source of information she used and Telstra, not Turnbull.

If you think different, here's a forum you can use to tell us how wrong we are. ®

Top three mobile application threats

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
'Blow it up': Plods pop round for chat with Commonwealth Games tweeter
You'd better not be talking about the council's housing plans
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.