Wednesday, February 29, 2012

NSW:Girl, 5, held at gunpoint by robbers


AAP General News (Australia)
08-16-2011
NSW:Girl, 5, held at gunpoint by robbers

SYDNEY, Aug 16 AAP - A five-year-old girl has been threatened at gunpoint in a home
invasion in western Sydney.

Three men, carrying a firearm and a machete, forced their way into the home at Cranebrook
shortly after 11pm (AEST) on Monday, police say.

The five-year-old girl, a 31-year-old woman and a 33-year-old man were forced to sit
on a lounge while the intruders stole property from their home in Redditch Way.

The intruders, who had their faces concealed, were last seen fleeing the area on foot.

Police are urging anyone who witnessed the incident or any suspicious activity in the
area to come forward.

The first intruder is described as Pacific Islander or Maori, of large build and more
than 183cm tall.

He was wearing blue jeans and a grey jumper with a blue jacket on top.

The other two men are both described as Caucasian, about 180cm tall, and of thin build.

AAP saj/wjf/dep

KEYWORD: INVASION

� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.

Vic: Teenage girl killed in car smash


AAP General News (Australia)
02-19-2007
Vic: Teenage girl killed in car smash

A car smash in Melbourne's north-west has left a teenage girl dead and three young
people in hospital.

Police say the girl .. who is about 15 .. was a rear seat passenger.

The car ran off the Tullamarine Freeway about 10 o'clock (AEDT) last night and crashed
into a sign then trees.

The male driver and two female passengers .. all about 20 .. were taken to the Royal
Melbourne Hospital for treatment.

The accident happened in a city-bound lane of the freeway .. blocking lanes between
the airport and Mickleham Road for several hours.

The crash takes Victoria's road toll to 40 .. down from 50 killed at the same time last year.

AAP RTV dr/bart

KEYWORD: TOLL VIC (MELBOURNE)

2007 AAP Information Services Pty Limited (AAP) or its Licensors.

VIC:Main stories on 3AW


AAP General News (Australia)
04-19-2011
VIC:Main stories on 3AW

MELBOURNE, April 19 AAP - Main stories on 3AW.

- a man has been convicted of murdering his estranged wife who has been missing for 25 years.

- a serial killer has won the right to have his sentence reviewed.

- a young family is lucky to be alive after escaping from their vehicle moments before
it burst into flames.

- Labor has warned maverick senator Barnaby Joyce could be Australia's next deputy
prime minister if the coalition wins the next election.

- Sport: Both Collingwood and Fremantle will take cases to the AFL tribunal tonight.

- an amateur beekeeper has been left nursing 60 stings.

- an engagement ring left behind in an earthquake-ravaged Christchurch hotel has been
returned to its owner.

- Finance: All ordinaries down 63 points to 4881. Australian dollar buys US 104.8 cents.

AAP gfr

KEYWORD: MONITOR 1200 3AW

� 2011 AAP Information Services Pty Limited (AAP) or its Licensors.

HUAWEI UNVEILS NEW BOARD MEMBERS


AsiaInfo Services
01-18-2011
Huawei Unveils New Board Members

SHENZHEN, Jan 18, 2011 (SinoCast Daily Business Beat via COMTEX) -- Huawei Technologies Co., Ltd., a top-ranking telecom equipment maker in China, nominated new members of the board of directors on January 15.

Sun Yafang will remain chairwoman for Huawei, while Ren Zhengfei, Guo Ping, and Xu Zhijun will act as deputy chairmen. In the meantime, Ji Ping and Fei Min, two executives that have served for the Shenzhen-based company for a long time, will withdraw from the board of directors.

The company solicited opinion on the director candidates a month before the launch of the meeting, disclosed executives for Huawei, noting that members of the existing Huawei core management team have been added to the new board of directors to beef up communication between the director board and the management team.

Huawei is looking to regroup its business structure, pointed out market observers, noting that the company is likely to divide its product-based operations into four divisions based on customers, namely telecom operators, enterprise network, terminal, and other.

Huawei will beef up the business model while loosening the right of the board director in the future to make it possible for the four new divisions to grow freely, said the executive.

Huawei is seeming to adjust its business route at the moment, casting its sight on the much-favored cloud computing, pointed out market obsesrvers.

The company released its cloud computing strategy and end-to-end solutions on November 29, part of its attempt to take the opportunities from the ongoing cloud computing technology reform and business model innovation to leverage efficiency for its client data center as well as computing and storage resource sharing.

Huawei, whose rivals in the telecom equipment arena include Telefonaktiebolaget LM Ericsson (Nasdaq: ERIC), Nokia Siemens Networks, Alcatel-Lucent (NYSE: ALU), will add a slew of information technology (IT) firms and Internet firms to its rival list after jumping into the cloud computing fray.

"Huawei will strive to catch up with Cisco Systems, Inc. (Nasdaq: CSCO) in platform in a short time and pace up with Google Inc. (NASDAQ: GOOG) in cloud computing business," said Ren Zhengfei, president for the Chinese company. Some market observers describe Cisco, a market leader that had a dispute with Huawei over intellectual property right seven years ago, as the archrival of Huawei in the new arena.

Huawei has been engaged in the R&D of cloud computing for more than two years, disclosed a vice president for the company, noting that the delayed launch of the product is a result of the factors in the US market. The telecom equipment maker decides to start a direct competition against its peers in the US after seeing a slower-than-expected progress in the north America market.

Source: www.nf.nfdaily.cn (January 18, 2011)

KEYWORD: SHENZHEN INDUSTRY KEYWORD: Telecommunications SUBJECT CODE: Telecommunications Equipment
Telecommunications Equipment
SinoCast China Business Daily news
SinoCast China IT Watch
board
director
cloud computing
IT
management
R&D

Copyright 2011 AsiaInfo Services (via Comtex). All rights reserved

FED:Early counting in Victoria


AAP General News (Australia)
08-21-2010
FED:Early counting in Victoria

Early figures show Labor's behind .. in Prime Minister JULIA GILLARD'S home state of Victoria.

With 5.37 per cent of the vote counted .. there's a 2.38 per cent swing against Labor
on first preferences.

In the marginal regional seat of Corangamite .. the result's close with six per cent
of the vote counted .. Liberal candidate SARAH HENDERSON leading Labor MP DARREN CHEESEMAN.

In McEwen .. with 13.6 per cent of the vote counted .. Labor's ROB MITCHELL is just
ahead of the Liberals' CAMERON CAINE.

And the Greens' JIM REIHER leads in early counting in La Trobe .. the south-east Melbourne
mortgage-belt seat that's a must-hold for the coalition.

AAP RTV gd/sb/jlw/jmt

KEYWORD: POLL10 COUNT VIC (CANBERRA)

� 2010 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: Ship on way to build picture of damaged reef


AAP General News (Australia)
04-14-2010
Fed: Ship on way to build picture of damaged reef

BRISBANE, April 14 AAP - Divers, sonar equipment and cameras towed behind a ship will
be used to determine exactly how much damage a coal carrier has done to the Great Barrier
Reef.

The Australian Institute of Marine Science (AIMS) is leading the investigation into
the grounding of the Shen Neng 1 on Douglas Shoal, off Rockhampton, on April 3.

The Chinese-registered carrier was refloated on Monday. It is now safely anchored in
waters near Great Keppel Island.

The AIMS research vessel RV Cape Ferguson, carrying a team of marine scientists, is
on its way to the shoal to begin the first comprehensive assessment of the damage.

The team will determine the scale of the physical damage and how much toxic anti-fouling
paint scraped off the hull onto the reef.

Dr Andrew Negri, who is leading the AIMS voyage, said a multi-beam sonar would be used
to map the sea floor and reveal the scope of structural damage to the reef.

"... it will accurately record the damage caused by the ship's hull," he said in a
statement on Wednesday.

Dr Negri said marine scientists would be diving with video cameras to take footage
of the effects on reef organisms such as corals, sponges and algae.

"In the areas that are too deep for divers, we have specialised cameras that can be
towed by the ship," he said.

Scientists would also collect for analysis samples of toxic anti-fouling paint, which
is used to hinder the growth of algae and barnacles on ships' hulls.

"This paint usually contains toxic chemicals, including heavy metals and/or herbicides
and if a ship is grounded, it usually scrapes onto the reef," he said.

Previous ship groundings had contaminated up to one hectare of the reef.

Given the movement of the Shen Neng 1 across the reef after it ran aground, the area
of physical damage and contamination could be much larger, he said.

The Great Barrier Reef Marine Park Authority, James Cook University and the Queensland
Parks and Wildlife Service will be supporting the AIMS team during the investigation.

It's expected to take about four days.

AAP tnf/jnb

KEYWORD: CARRIER AIMS

2010 AAP Information Services Pty Limited (AAP) or its Licensors.

Vic: Pies' Brownlow medal fancy in court over bashing


AAP General News (Australia)
08-31-2009
Vic: Pies' Brownlow medal fancy in court over bashing

Eds: Please note language in 9th par

By Melissa Jenkins

MELBOURNE, Aug 31 AAP - AFL Brownlow Medal fancy Dane Swan has fronted a Melbourne
court over his alleged role in a "savage" bashing of a cleaner that left the victim "isolated"

and suffering nightmares.

A jury of six men in the Victorian County Court were shown closed circuit television
footage that they were told captured the Collingwood star along with VFL players Kade
Carey and Aaron Ramsay bashing cleaner Claudio Celano behind Melbourne's Federation Square
in the early hours of December 21, 2003.

Mr Celano's lawyer, Michael Heaton, QC, said his client was simply trying to be a good
samaritan and help his friend, security guard Jesse James, who was being attacked.

The footballers punched and kicked cleaner Mr Celano, who was much smaller than them
and covered his eyes begging them to stop, Mr Heaton said.

"The plaintiff was understandably scared and petrified," he told the jury of six men.

"CCTV footage (shows the) vicious, thuggish, savage and brutal assault."

The trouble began after Carey "body slammed" a moving car carrying several female passengers,
the court was told.

Two women got out of the car and ran across Federation Square. Mr James, accompanied
by Mr Celano, confronted Carey, and a fight ensued.

Mr Heaton told the jury a security guard listening to the two-way radio heard Carey
say: "You f*****' guys think you are bouncers or something".

"Come on, I'll have the lots of youse."

Mr Celano suffered a fractured left eye socket, nose and left cheek bone in the attack,
as well as chipped teeth, cuts to his shoulder and swelling.

He was in a rock band and had to pull out of a performance at the Albert Park Yacht
Club, which was to have launched his CD.

"You can imagine how miserable and painful Christmas was in 2003 for the plaintiff,"

Mr Heaton said.

Mr Celano was not granted any compensation from WorkCover because the attack occurred
during his lunch break.

He was forced to take time off from work, lost his job and had to apply for Centrelink
benefits, Mr Heaton said.

"In 2004, the plaintiff started to have nightmares and flashbacks about the assault," he said.

"As he became more isolated, in pain and not working and not playing music with his
mates and rarely going out, things started to slide."

The hearing before Judge Paul Lacava continues in the Victorian County Court.

AAP mj/jxt/cjb/cdh

KEYWORD: SWAN (FILE PIX AVAILABLE)

2009 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: Another boat of asylum seekers intercepted


AAP General News (Australia)
04-22-2009
Fed: Another boat of asylum seekers intercepted

PERTH, April 22 AAP - Another boatload of asylum seekers intercepted off the West Australian
coast is being taken to Christmas Island, the federal government says.

HMAS Wollongong intercepted the vessel approximately 47 nautical miles southwest of
Barrow Island in an operation coordinated by Border Protection Command.

Home Affairs Minister Bob Debus said the 32 people on board were all Sri Lankan men.

"Today at 12.30 Canberra time, 10.30 Perth time, a vessel containing 32 people was
intercepted off Barrow Island by HMAS Wollongong," Mr Debus told reporters in Perth.

"The vessel had just entered our migration zone, that is to say the vessel had just
entered the zone that extends 33 nautical miles off our shore.

"The people on board will be transported to Christmas Island and as I speak to you
now I am told that the boat is secure and the operation is proceeding very successfully."

It is the seventh boat of asylum seekers to arrive in Australian waters this year and
comes after a vessel carrying 47 asylum seekers and two crew sank following an explosion
off the north Australian coast last week.

An investigation into the cause of the blast, which killed five people and injured
many more, is underway.

Mr Debus said the latest interception demonstrated the government's commitment to strong
border protection.

"The Australian government is committed to strong border security arrangements to deal
effectively and appropriately with people smugglers," he said in a statement released
earlier on Wednesday.

AAP ap/bd/mn/jlw

KEYWORD: BOAT INTERCEPTION SECOND UPDATE

2009 AAP Information Services Pty Limited (AAP) or its Licensors.

NT: 12yr old takes police on car chase


AAP General News (Australia)
12-17-2008
NT: 12yr old takes police on car chase

DARWIN, Dec 17 AAP - A 12-year-old boy was allegedly driving a stolen vehicle when
he took police on a chase through Darwin.

A member of the public contacted police about 8.30pm (CST) on Tuesday night after a
youth was noticed driving a white Mazda van on Chung Wah Terrace.

Officers located the car a short time later but it failed to stop when they activated
their lights.

Following a pursuit by police, the car stopped at the intersection of Emery Avenue
and Harrison Street in the Darwin suburb of Woodroffe.

The 12-year-old boy was arrested and taken to the Darwin watchhouse where it was revealed
the vehicle had been stolen from a residence in Stuart Park, police said.

The youth has been charged with unlawful use of a motor vehicle, driving a motor vehicle
whilst unlicensed and failing to obey a member of the police force.

He was remanded in custody to appear in the Darwin Youth Justice Court on December 22.

Territory Duty Superintendent Michael Murphy said the case was a good example of what
could be achieved when police and the public worked together.

"We encourage anyone that sees suspicious activity to report it," he said.

AAP tr/nf

KEYWORD: CHASE

2008 AAP Information Services Pty Limited (AAP) or its Licensors.

Main stories in the ABC's World Today


AAP General News (Australia)
08-12-2008
Main stories in the ABC's World Today

SYDNEY, Aug 12 AAP - Main stories in the ABC's World Today:

* The Russian invasion of Georgia appears to be worsening beyond the site of the original
flashpoint of South Ossetia, and the propaganda war has also escalated.

* The Russian ambassador to the United Nations has rejected a ceasefire drafted by
the Security Council. The US has called the Russian action heavy-handed and brutal.

* The Department of Foreign Affairs and Trade has upgraded the warning for Australians
travelling to Georgia.

AAP pbc/wjf

KEYWORD: MONITOR WORLD TODAY

2008 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: Garrett to draw on singing days for song summit speech


AAP General News (Australia)
04-03-2008
Fed: Garrett to draw on singing days for song summit speech

Arts Minister PETER GARRETT will combine his two areas of expertise when he presents
the keynote speech at the inaugural Song Summit Sydney today.

Speaking on the topic The Politics of Art .. Mr GARRETT will draw upon his years as
the frontman of Aussie rock outfit Midnight Oil as he opens the three-day event for songwriters.

Presented by APRA/AMCOS and the New South Wales government .. the summit brings together
music creators .. managers .. publishers .. lawyers and deal makers.

The summit will also feature high profile national and international delegates .. including
The Shins frontman JAMES MERCER .. UK singer SANDI THOM .. JOSH PYKE and Evermore.

They'll provide expert advice to aspiring songwriters who submit their compositions
for public review.

AAP RTV acb/tm/crh

KEYWORD: SONG (SYDNEY)

2008 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: NetAlert package effective, says Coonan


AAP General News (Australia)
09-07-2007
Fed: NetAlert package effective, says Coonan

By Rosemary Desmond

BRISBANE, Sept 7 AAP - Federal Communications Minister Senator Helen Coonan says checks
had been completed on a government-funded internet filter and it had not been hacked into
by a teenager last month.

Three weeks ago, a 16-year-old schoolboy from Melbourne said it had taken him only
a few clicks to crack the government's new $84 million internet porn filter.

Tom Wood, a Year 10 student, said it took him about 30 minutes to break through the
government's new filter and his method ensured the software's toolbar icon was not deleted,
leaving his parents believing the filter was still working.

But Senator Coonan today said checks had shown the filter was not compromised, but
rather bypassed.

"What happened was administrative privileges were given in respect of the computer
and the young person with a piece of software was able to override the password," she
said in Brisbane today.

"But the actual filters have now all been tested again with the young person to make
sure they are not compromised.

"So, it's not as if the filter was hacked into."

But Senator Coonan acknowledged that there was no silver bullet to protect children
online and it was possible other children may have been able to bypass the filter.

The free internet filtering programs available on the net were part of a $189 million
package of measures including $43.5 million in extra funding to the Australian Federal
Police (AFP) to combat online child sex exploitation and $22 million over three years
to raise public awareness and educate parents.

"It's a very comprehensive package, but it needs to be seen as a whole package and
I think together all of those elements work very effectively to certainly minimise the
danger that young people have online," Senator Coonan said.

The government has launched a NetAlert booklet which outlines a range of tips for keeping
computers safe from scams such as identity theft and downloading spyware, as well as cyber
bullying, pornography and how to deal with unwanted contact.

Senator Coonan said federal government research showed around 40 per cent of children
who visited internet chatrooms said they had been contacted by someone they did not know
and 39 per cent said they had put a photograph of themself online, enabling them to be
identified instantly.

Another one in five teenagers aged between 13 and 17 said they had seen or heard of
people being bullied online or had abused people online, and more than half said they
had visited websites they knew their parents would not approve of.

"So, with this research and this campaign, we aim to shine the light on a world that
a lot of parents are only vaguely aware of," Senator Coonan said.

AAP rad/pjo/jsh/cdh

KEYWORD: FILTER

2007 AAP Information Services Pty Limited (AAP) or its Licensors.

NSW: Woman and girl threatened during home invasion


AAP General News (Australia)
04-18-2007
NSW: Woman and girl threatened during home invasion

A 44-year-old woman and her 13-year-old daughter have been threatened by three men
who broke into their home in Oaks Flats .. south of Wollongong .. last night.

One of the men had a gun .. and after demanding cash from the woman .. stole her handbag
.. a video camera .. a digital camera and a laptop computer.

The intruders ran off along a bike track on the Lake Illawarra foreshore.

AAP RTV krc/jmt

KEYWORD: INVASION (SYDNEY)

2007 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: First flight of JSF excites Defence


AAP General News (Australia)
12-16-2006
Fed: First flight of JSF excites Defence

By Denis Peters

CANBERRA, Dec 16 AAP/Reuters - The federal government has welcomed the successful first
flight of the F-35 Lightning 2 Joint Strike Fighter (JSF) as a milestone achievement towards
its planned new strike aircraft force.

The 40-minute test flight over Fort Worth, Texas, was observed by Australian defence
officials through visual link in Washington DC.

The first version to fly was a conventional take-off and landing model of the JSF,
although a vertical take-off model of the jet is planned.

The head of Australia's defence overseers, Air Vice-Marshall John Harvey, who watched
the secure location flight, said the test was satisfying after extensive development and
ground checks.

"The first flight itself is a huge achievement," he told ABC Radio.

"It's a great thing to look at, but there's been extensive testing already with all
the individual components and all the integration laboratories.

"But the first flight itself is always a big confidence boost, to see it actually flying."

Lockheed Martin Corp is developing three models of the radar-evading, multi-role fighter
in a major international cooperation effort financed by the United States and eight other
countries, including Australia.

The Pentagon plans to buy more than 2,400 F-35s by 2027 for the Air Force, Navy and
Marine Corps, in a project worth $US276.5 billion ($A353.8 billion). Britain is expected
to buy 138.

Australia intends to buy up to 100 JSFs, to replace its frontline F-111 fighter-bombers,
at a total cost of about $16 billion.

Defence Minister Brendan Nelson said the first flight was a major event in any aircraft
program and provided confidence the program would meet its highly demanding goals.

"The JSF's first flight builds on the significant testing that has already been completed,
including extensive ground testing of the complete aircraft, testing of the total system
in the integration laboratory and ground and flight testing of the individual systems,"

he said.

Dr Nelson congratulated the JSF Program Office and Lockheed Martin on their successful
management of the JSF program.

"In comparison to previous test programs, the JSF continues to exceed in both performance
and schedule," he said.

AAP dep/nf

KEYWORD: US FIGHTER AUST NIGHTLEAD

2006 AAP Information Services Pty Limited (AAP) or its Licensors.

Fed: PM's interest in gallery "encouraged" by Mrs Howard


AAP General News (Australia)
08-09-2006
Fed: PM's interest in gallery "encouraged" by Mrs Howard

CANBERRA, Aug 9 AAP - Prime Minister John Howard acknowledged the influence of his
wife Janette today as he launched construction of a new home for the National Portrait
Gallery.

Accompanied by his wife, Mr Howard unveiled a plaque to mark the start of construction
of the new gallery in Canberra.

It will be the gallery's third, and hopefully final, home and is scheduled for opening
in December 2008.

Mrs Howard is chief patron of the gallery and Mr Howard acknowledged that she, among
others, had encouraged his interest in the project.

"I have taken a great interest in this gallery. I have been encouraged to do so by
a number of people," he said, to laughter from guests.

"Yes, it is true Janette has taken a great interest, but so have so many others. She
would be the first to acknowledge that."

Mr Howard said today was a significant day in the life of the gallery.

"It has been a stunning success in the eight or nine years of its existence. It has
captured the imagination of the Australian public," he said.

"It is only the fourth in the world and it takes its lead from the other great portrait
galleries.

"It puts on display those images in whatever form they may be of Australians from every
walk of life. That's its compelling simplicity.

"This is showing Australians to Australians in a wonderful way and it has added enormously
to the patronage of our national capital."

The National Portrait Gallery rapidly outgrew its original home in Old Parliament House
and moved to temporary premises on the shore of Lake Burley Griffin.

In 2004, the government gave the go ahead for construction of a dedicated building,
which will be located next door to the High Court.

The new gallery has a projected budget of $73.6 million, of which some $4.25 million
comes from public donations.

Mr Howard said he looked forward to it opening on time and more or less within budget.

"I am sure the finance minister will be quite understanding about the odd dollar or
two we might need along the way.

"I know that would be inadvertent and I know every effort will be made to make certain
that it is," he said.

The proposed new gallery will feature a total floor areas of 14,000 square metres with
ample space for display of the ever expanding collection of portraits as well as for special
exhibitions, functions and storage.

AAP mb/sb/sp/jt/sd

KEYWORD: PORTRAIT (PIX AVAILABLE)

) 2006 AAP Information Services Pty Limited (AAP) or its Licensors.

Qld: Teachers slam school OP comparisons


AAP General News (Australia)
04-03-2006
Qld: Teachers slam school OP comparisons

Teacher representatives have criticised the release of a report .. comparing year 12
pass marks at secondary schools across Queensland.

The report .. released by the Queensland Studies Authority .. is designed to give parents
a snapshot of school performances.

It's released details of the OP scores at the state's 413 high schools .. the first
time in 12 years they've been published.

The report shows small rural state schools have often outshone their city counterparts
.. while some of the most exclusive colleges didn't rank in the top 100.

It also reveals all-girls schools performed better than most all-boys schools.

But Queensland Teachers Union president STEVE RYAN says the figures are deceptive ..

and shouldn't be used by parents to choose schools for their children.





Brisbane Girls Grammar School topped the list with 96 per cent of last year's 215 Year
12 students scoring OP scores of between one and 15.

It was followed by Brisbane Boys Grammar .. with 93 per cent.

The Southport School .. the most expensive school in the state with fees of up to 13
thousand dollars a year .. recorded 72 per cent.

That's been matched by schools in regional areas .. including Mackay North .. Dalby
and Mansfield state high schools.

The prestigious Gold Coast boys' college didn't rank in the top 100 schools academically.

AAP RTV nt/sc/goc/bart

KEYWORD: SCHOOLS (BRISBANE)

2006 AAP Information Services Pty Limited (AAP) or its Licensors.

Monday, February 27, 2012

metric system

metric system A system of measurement based on the decimal system. It was first formalized in France at the end of the 18th century and by the 1830s was being widely adopted in Europe. In the UK, bills for its compulsory adoption were defeated in 1871 and 1907 and Imperial units remained supreme until 1963, when the yard was redefined as 0.9144 metre and the pound as 0.453 592 37 kilogram. The Metrication Board set up in 1969 failed to achieve its target of the metrication of British industry by 1975. However, the Weights and Measures Act (1985), the 1994 Amendment Order, and the 1994 Regulations took into account directives issued by the European Union. As a result certain traditional units such as the hundredweight, ton, pound, ounce, yard, foot, inch, gallon, bushel, square mile, cubic yard, and cubic foot were outlawed for purposes of trade. Finally, in January 2001, the UK adopted into law an EU directive making it illegal (with a few specified exceptions) to sell goods in any measures other than the gram, kilogram, millimetre, and metre. The pint (for milk and draught beer), the mile (for road traffic signs), and the acre (for land registration) are authorized without time limit. For all scientific purposes and many trade and industrial purposes the form of the metric system known as SI units is now in use. In the USA metrication has been even slower than in the UK.

Crying wolf: False alarms hide attacks; Eight IDSs fail to impress during the monthlong test on a production network.(intrusion detection systems)

Crying wolf: False alarms hide attacks

Eight IDSs fail to impress during the monthlong test on a production network.

By David Newman, Joel Snyder and Rodney Thayer

One thing that can be said with certainty about network-based intrusion-detection systems is that they're guaranteed to detect and consume all your available bandwidth. Whether they also detect network intrusions is less of a sure thing.

Those are the major conclusions of our first-ever IDS product comparison conducted "in the wild." Unlike previous tests run in lab settings, we put seven commercial IDS products and one open-source offering on a live ISP segment to see what they'd catch.

What we found wasn't encouraging:

l Several IDSs crashed repeatedly under the burden of the false alarms they churned out.

l When real attacks came along, some products didn't catch them and others buried the reports so deep in false alarms that they were easy to miss.

l Overly complex interfaces made tuning out false alarms a challenge.

Because no product distinguished itself, we are not naming a winner (See story "No cigar," page 58). The eight products we tested [yen] from Cisco, Intrusion, Lancope, Network Flight Recorder (NFR), Nokia (running on OEM version of Internet Security Systems RealSecure 6.5), OneSecure, Recourse Technologies and the open-source Snort package [yen] all ask too much of their users in terms of time and expertise to be described as security must-haves.

That's not to say IDSs have no place in corporate networks. They can be valuable tools for learning about network security and can validate that other security devices are doing their jobs. But setting up the current generation of IDSs requires a substantial time investment to ensure they'll flag only suspicious traffic and leave everything else alone.

We used the production network of Opus One, an ISP in Tucson, Ariz., as our testbed. Opus One offers Web hosting and leased-line, DSL and dial-up Internet access services to 50 small to midsize businesses. The backbone infrastructure includes nine T-1 circuits with an average utilization in the range of 9M to 12M bit/sec.

To spice things up a bit, we deployed four "sacrificial lambs," systems running old, unpatched versions of Windows 2000 Server and NT 4.0 Server, Red Hat Linux 6.2 and Sun Solaris 2.6. Putting plain-vanilla versions of these operating systems on the Internet is just asking to be attacked. Past studies have shown that unpatched systems get owned in a matter of minutes, thanks to automated scripts that find and exploit well-known vulnerabilities. We figured the IDS sensors couldn't miss seeing these attacks.

All IDSs consist of at least one sensor that monitors traffic and sends alarms whenever suspicious behavior occurs. There are two major methods of detecting problems: signature detection and anomaly detection. Signature detection, used by all products in this review except Lancope's StealthWatch, will generate an alarm whenever traffic matches a known attack pattern. With anomaly detection, the IDS compares current behavior against a baseline of "normal" traffic on that network and flags anything out of profile as an alarm.

For signature detection, the size of the attack library is key and vendors boast about spotting large numbers of attacks. On the flip side, signature-based IDSs only report on attacks they know about. With new attacks appearing daily, keeping the library current is a must.

Anomaly-based IDSs don't need to know about specific attacks, only exceptions. This makes them easier to maintain. At the same time, alarms from anomaly-based systems are only as useful as the baseline with which they're compared. An anomaly-based system might characterize a network already rife with attacks as "normal" and thus miss future intrusions.

We wanted our test to model corporate use of IDSs, especially when it came to management. Most IDSs offer a management hierarchy with two tiers (or more), so sensors on one network can report to a management console and/or database in another location. To model this distributed approach, we set up an IP Security tunnel from the sensors at Opus One to Network Test's offices in Los Angeles, where the management stations were located.

Staying alive

Initially, we planned to assess the IDSs on accuracy and ease of use. As it turned out, we needed to add a third metric: uptime.

All the products we tested [yen] save one [yen] suffered at least some downtime during our approximately 30 days of testing (see "Uptime table," page 60).

Even before we turned loose the sacrificial lamb hosts, we experienced numerous crashes as IDS sensors struggled to keep up with traffic. In some cases, this occurred because the sensor simply fell over. An early version of the NFR software, for example, caused the vendor's NID200 sensor to use all available memory and CPU resources. A software patch fixed that problem.

A more common problem lay with the management stations. Most wouldn't stay up for more than a few days because of database overload.

Cisco's Secure Intrusion Detection System 4235, Intrusion's SecureNet 7145C and Nokia's IP530 [yen] were especially shaky on availability. Cisco's sensor never locked up, but its management software was another story.

The vendor initially supplied Version 2.3.3i of its Cisco Secure Policy Manager (CSPM). CSPM is a powerful application with tons of useful features and one very significant downside: Whenever its database grows too large, the application ceases to function.

CSPM hit this threshold daily. Cisco suggested we create and run a batch file twice daily that would automatically prune CSPM's logs. This fix kept the application going, but it also excised the database of previous entries that CSPM could have used for its event correlation and reporting functions.

Cisco says it will announce a new version of CSPM next month that runs atop a more robust database. We hope so. Although CSPM is intended to collate input from large numbers of sensors, in our test it took just one to kill it.

We also used a beta version of Cisco's free management tool [yen] Integrated Device Manager (IDM) with Integrated Event Viewer. IDM Version 3.1 didn't crash once.

Intrusion's SecureNet Provider (SNP) software uses a multitiered approach in which different machines can be used as sensors; consoles (for configuring the sensor); databases (for storing alarms from multiple sensors); and clients.

In our experience, it was the SNP client that locked up repeatedly. We'd see CPU utilization rise above 90% and stay there. In that state, it was impossible to tell what events Intrusion's client was and wasn't seeing.

The vendor's fix was twofold: First, Intrusion tuned its database not to store any alarms for what it deemed low-severity events. Second, the company configured the client to store only a day's worth of alarms. These measures kept the client running but limited the amount of data stored locally. Intrusion's database continued to log all medium- and high-severity events it received. However, the lack of local information at the management client could be irksome for a network professional trying to piece together an incident after, say, a long weekend.

The most troublesome performer of all was Nokia's IP530. What the vendor touts as a "high-performance security platform" locked up 13 out of the approximately 30 days we used it.

On the sensor side, Nokia's hardware-based security appliance runs RealSecure 6.5 from Internet Security Systems (ISS). The volume of traffic on the Opus One network caused the IP530's RealSecure process to terminate roughly once a day until Nokia supplied a patch.

Volume was the root problem for Nokia's management application. The first of several problems was Nokia's decision to supply Microsoft Database Engine (MSDE) as its data store. MSDE works well on a very quiet network, but it was unable to keep up with the feed from Opus One. It would fill up and stop running less than 24 hours after each reinstallation (which also wiped out all previous data). At our request Nokia supplied another management machine running Microsoft's SQL Server, but this too locked up.

Most of the other sensors and/or consoles also suffered from at least some downtime in our tests. The OneSecure Intrusion Detection and Prevention (IDP) sensor crashed once and wouldn't reboot; installing a software upgrade also left the sensor unusable because it didn't set a default route.

The bigger problem with OneSecure was glacial screen updates on its management console. Although the Java-based application logged a large number of events, scrolling through the log entries took so long that the application often seemed to be hung. Only exiting the application would bring it back to life.

Recourse's ManHunt application, also Java-based, was nearly as sluggish at times. It hung twice during our tests.

The only commercial product that didn't crash at all was Lancope's StealthWatch. This Web-based appliance didn't have a separate management application to crash. Further, the StealthWatch sensor never once locked up.

Who goes there?

Our main metric for this project was accuracy. What attacks would the IDSs see, and how clearly would they identify those attacks?

We considered an attack to be any compromise of any computing resource on the "protected" network. That resource could be bandwidth, disk space, a printer, a password file [yen] basically, anything for which access is not explicitly authorized. This is not the same as an attempted attack; if there was no compromise, then the IDS is essentially reporting on a vulnerability that doesn't exist. During the test, most of the ISPs generated so many false positives that it was difficult to spot reports of real attacks.

We expected the IDS sensors to report any behavior outside these bounds and only such behavior. The major challenge when it comes to IDS reporting is reducing the number of false positives, while at the same time avoiding false negatives (see online IDS glossary, page 62).

Sensors take different approaches to reporting accurately. A sensor that sends an alarm every time a packet goes by would be very accurate because it would flag every attack packet. But this sensor also would flag everything else, making it difficult to distinguish real attacks from background noise. Open-source Snort came closest to this model, with NFR's NID200 a close second.

At the other end of the spectrum, an IDS could be configured to send alarms for only a narrowly defined set of criteria. For example, it could flag only FTP sessions to host X from user Y at time Z.

The big danger here is false negatives; because if the IDS only listens for a few specific events it will miss everything else. We were especially concerned about this when tuning the Cisco, Intrusion and Nokia products because they had to reduce their reporting load to stay operational. In addition, OneSecure's device had relatively few alarms enabled by default.

We found most IDSs reported far too much rather than too little, making it difficult to pick out actual attacks from all the noise.

Our first indication of trouble came before we'd even powered up the sacrificial lambs. Two Macintoshes attached to Opus One's network froze at the same instant, possibly indicating a denial-ofservice attack.

Checking the IDS clients, we found thousands of alarms from all sensors [yen] but only NFR's NID200 and Recourse's ManHunt actually reported a SYN flood attack at the instant the Macs froze (see attack chart, below).

The Cisco, Intrusion and Nokia systems were unavailable because their databases had frozen as a result of the huge volume of alarms they handled, almost all of which were false positives. Lancope's StealthWatch and the OneSecure sensor didn't see an attack. Snort was off the air at the time of the attack because of misconfiguration on our part.

Determining which sensors did and

didn't see the attack was a chore. Using NFR's Administration Interface management tool, we could query for all incidents. However, the version of Administration Interface we tested only returned a maximum of 4,096 records per query, or around 17 minutes' worth of traffic on the network. A registry edit on a later version of Administration Interface lets a query return more responses.

Positively negative

So what was it that kept the sensors so busy they couldn't report on actual incidents? By far the biggest problem was a huge number of false positives, with sensors sending alarms for insignificant events [yen] or even worse, for vulnerabilities that didn't exist.

The most egregious example of the latter was the massive number of reports of the Code Red and Code Blue attacks commonly launched against Microsoft's Internet Information Servers (IIS) Web servers. NFR also sent many "successful Nimbda attack" reports, alerting us to the presence of another way in which IIS can be compromised. To be sure, such attacks are a real problem [yen] provided the vulnerability also is real.

But Opus One's servers run OpenVMS, not Windows. Even though it is trivially easy to figure out what operating system a Web server uses, not one of the IDSs did so. Instead, they collectively generated literally millions of alarms about attacks that never happened.

An even greater source of noise was reporting on benign events on the network. The Cisco, Intrusion, Lancope, Nokia, OneSecure and Recourse products prioritize alarms by severity, tagging events with labels such as high, medium or low severity.

In most cases the sensors spewed vast quantities of "low" or "informational" alarms. The Nokia and Intrusion devices sent low-priority alarms every time an end user requested a Web page. This might be desirable in paranoid network configurations where Web access is forbidden, but on an ISP's network where Web traffic is the norm, it's not only annoying but also dangerous to the well-being of the IDS sensor and its manager.

Things went from bad to worse once we attached the sacrificial lamb machines to the network. Attackers compromised these hosts soon after we deployed them [yen] but in some cases it was the host's own message logs, and not the IDSs, that offered proof positive.

The easiest target was our Windows NT Server box. It became a launching pad for the Code Red and Code Blue worms within an hour of deployment. We soon began receiving complaints from other ISPs advising us we had a compromised machine.

Unfortunately, the IDS sensors weren't as clear in their reports. Code Red and Code Blue worms involve lots of traffic, and this blinded some of the sensors. NFR saw the attacks, but these alarms were buried inside thousands of other reports of attempted attacks against other machines that weren't running IIS. It was a similar story for Recourse's ManHunt and the open source Snort program.

Drowning under the huge volume of traffic, most systems either buckled or simply missed the attack outright. The Cisco, Intrusion and Nokia systems stopped logging. Each required a database purge to get going again but, in fairness, we must say that all three recognized this attack after we resuscitated them. The Lancope StealthWatch and Onesecure systems

didn't spot the attack the first time, but both companies' engineers offered guidance in reconfiguring the systems so they would see subsequent attacks.

Vision test

With such an abysmal record of flagging attacks in the wild, we began to wonder whether the IDSs could catch any attack. As a sort of vision test, we decided to launch a controlled attack of our own. We picked a well-known, 3-year-old attack that exploited the Red Hat Linux FTP server.

The good news is that Cisco, Intrusion, Nokia and Snort products spotted the compromise immediately. However, the Lancope, Recourse and NFR systems failed to report a compromise.

The final vendor, OneSecure, also missed seeing the FTP exploit the first time around. OneSecure's vision is apparently related to the way it's deployed in networks.

For this test, we deployed OneSecure in passive mode, meaning it was attached to the same hub as the sacrificial lamb hosts. But OneSecure also works in so-called in-line mode, meaning it can sit in front of a protected network and actively block suspicious traffic. This time, OneSecure reported and blocked the attempted FTP exploit. We're puzzled why OneSecure's IDP didn't see the attack in passive mode; we made no configuration changes to the sensor or management client when making the switch.OneSecure the vendor acknowledged the false negative as a bug, and said a corrected signature would be available by press time.

We also should note that OneSecure's in-line mode performance wasn't perfect. Not long after we changed it from passive to in-line mode, the company's own management software notified us that one of the sacrificial lambs was sending outbound trivial FTP traffic to a bogus address. On any of the sacrificial lambs, outbound traffic of any kind is a sure sign that the machine has been compromised.

A little help?

By now, readers with security expertise probably are asking why we didn't tune the IDSs to reduce the chatter and improve our chances of seeing real attacks. The short answer is that we did, or at least we tried to. Including setup time, this project stretched along three months; and during that period we worked on these systems almost every day.

In the last major area of our test, ease of use, we found that IDSs don't offer users enough help in the way of improving the signal-to-noise ratio. All the products we tested assume that before any tuning begins, the user already knows what attacks exist on the network.

That assumption is shaky on two counts. First, security isn't a full-time job for most network professionals. As such, they're unlikely to know every attack they might encounter.

Second, the management software for the products we tested offer cryptic error messages, hard-to-use graphic user interfaces and limited assistance in identifying what is and isn't a real vulnerability. These products don't offer anything like expert systems, instead leaving the user to puzzle out what actually happened.

Consider, for example, a DNS alarm reported by NFR's NID200 sensor. The sensor reported a huge number of alarms marked as "Non-Internet Query class:

error(user error), name es\x00." followed by a hexadecimal string.

It took our DNS expert a couple of hours to identify the "attack" as harmless attempts to find the root name server for Spain. The NFR documentation did not explain why this alarm occurred; why it was classified as non-Internet; or where false positives might occur.

Cisco's Integrated Event Viewer also

reported these DNS "attacks" and compounded the confusion by burying specific alarms two levels deep in its interface.

On the plus side, all the commercial IDSs offer at least a capsule description of each attack. This is actually the single-best feature of all the products we tested, as it helps educate users about what the IDS sees. Some products also suggest resolutions to the alarms, information on events that could lead to false positives, and links to fixes and additional data.

The Nokia management software offered all these types of information. The Intrusion product's suggested resolution for an IIS attack is a bit more terse: It simply asks users to "verify that the latest patches are installed." Even so, any description of an attack can be helpful, especially for a user seeing an attack for the first time.

We also noted a couple of minor usability annoyances with the IDSs that made troubleshooting more difficult. With the commendable exception of OneSecure, all IDSs display IP addresses and not host names. With only an address and not a domain name with which to work, it's harder to figure out where an attack might be coming from.

StealthWatch was especially irksome in this regard; it makes prominent use of addresses and only displays host names deep inside a second-level menu.

Second, most IDSs don't offer a means of grouping hosts or networks together under some easily remembered nickname. The exception is NFR, which let user-defined groups be set up using its N-code programming language.

Other devices allowed us to query groups of hosts, but not as a single object. Intrusion's SNP product let us run queries for a given host or a given subnet, but it wouldn't run a query on a group on noncontiguous addresses, even if all were on the same subnet.

Wrapping up

Don't expect IDSs to be plug-and-play devices. To be effective, they require a lot of tuning, and a fair amount of security expertise. They'll also require willingness to spend a lot of time sifting through reports, at least until the configuration is tuned properly. Even then, IDSs will require constant updating as new attacks appear. IDSs can be lifesavers and invaluable educational tools [yen] but only for those with a lot of patience and a willingness to learn.

Newman is president of Network Test in Westlake Village, Calif., an independent benchmarking and network design consultancy. He can be reached at dnewman

@networktest.com. Snyder is a senior partner at Opus One in Tucson, Ariz. He can be reached at joel.snyder@opus1. com. Thayer is an independent security consultant and co-author of the IETF's RFCs on the IPSec road map and the OpenPGP architecture. He can be reached at rodney

@tillerman.to.

Mgage Systems Delivered Mobile Chat Application to D2 Vodafone.

Business Editors

STOCKHOLM, Sweden--(BUSINESS WIRE)--March 28, 2001

D2 Vodafone launches Mgage Mobile Chat application delivered by Ericsson Germany's co-operation partner Mgage Systems.

The Mobile Chat application is demonstrated at the world's largest IT show, CeBIT, in the D2 Vodafone stand (Pavilion 35) in Hannover, Germany. The Mobile Chat is accessible through D2 Vodafone's mobile portal.

Mobile Chat is a real time chat service that can be used from WAP phones as well as over the web. It brings all the familiar Internet chat functionality right down in the mobile terminal, enabling users to chat mobile-to-mobile, mobile-to-web and web-to-web. Simply log on to a chat room and start chatting with people from all over the world. This is a unique application and it adds true value to the consumers. No matter what brand of phone or PC, everyone can join as long as they have Internet access.

"Mgage can already today offer a wide range of mobile messaging applications to mobile operators and service providers that wish to offer their customers new high value services," says Styrbjorn Horn, CEO of Mgage Systems. The company is working closely with mobile operators and device and infrastructure vendors, and is committed to making the best mobile messaging applications to satisfy the needs of the end users. "Mobile messaging applications like Mgage's Mobile Chat will be the real drivers for mobile Internet, specially for the mobile generation, and community services will become the cornerstone of every mobile operators' service offering. I believe that Mgage with its extensive messaging portfolio is very well suited to satisfy that need," added Mr Horn.

The mobile generation have already adopted SMS messaging as a preferred way to communicate and are the fastest growing users of text messages. Today e-mail is the number one application on the Internet and messaging services like ICQ and Yahoo Messenger are tremendous successes with millions of users. Up until now, users have been forced to use a stationary computer to keep in touch. Now users are going mobile. The first inkling fact is that more than 15 billions of SMS messages were sent in January 2001 alone.

Ericsson Germany and Mgage Systems intend to extend collaboration between the two companies where Mgage Systems develop mobile messaging applications and Ericsson will introduce the applications to mobile operators and service providers.

"To complement our own development activities we are constantly scanning the global market for leading edge solutions that enrich the product range of our customer," says Bernd Schmidt, Director Business Management, Mannesmann Group, Ericsson Germany.

Mgage Systems provide mobile operators and service providers in Europe with innovative mobile messaging applications. The company was founded in February 2000 backed up by strong international investors. Today Mgage Systems employ 35 people in Stockholm and Gothenburg. The vision is to be a world-leading provider of mobile messaging applications - King of Mobile Messaging. For more information: http://www.mgage.com

------------------------------------------------------------ This information was brought to you by BIT http://www.bit.se The following files are available for download: http://www.bit.se/bitonline/2001/03/28/20010328BIT00420/bit0001.doc http://www.bit.se/bitonline/2001/03/28/20010328BIT00420/bit0001.pdf

eNorthern Goes Live Powered by SunGard BrokerWare.

Business Editors/Hi-Tech Writers

MONTREAL--(BUSINESS WIRE)--June 8, 2000

SunGard announced today that eNorthern, the online brokerage arm of Northern Securities Inc. (a unit of Digital Gem Corporation) has gone live powered by SunGard BrokerWare(TM) technology. Billed as Canada's first truly investor-friendly, customizable financial services portal, eNorthern offers consumers a wide range of features unique to the Canadian landscape. Using SunGard BrokerWare to power the backbone of its site, eNorthern not only provides users with the latest in financial information and the ability to trade online, but with added features and tools to enhance the online brokerage experience.

"Since we began building the original site, we have adapted several times to new innovations in the marketplace to ensure that the product we are launching is as current and as leading-edge as it can be," said Nadir Desai, chairman and chief executive officer of Digital Gem. "SunGard BrokerWare allowed us to integrate a wide range of content, and it gives us the ability to rapidly upgrade and enhance the services we offer."

SunGard BrokerWare is a complete e-brokerage solution that allows a financial institution to offer its customers full online trading capabilities, as well as access to a wide array of market data and services -- from real-time quotes, news, and advanced charting, to in-depth research and PCS alerts. BrokerWare's technology allows these services to be accessed via the Web, hand-held wireless devices (WAP/HDML), and touch-tone telephones (VRU), either independently or integrated into a complete solution.

With constant research and development into new and emerging technologies, BrokerWare remains at the cutting-edge of technology, and is today considered one of the leading e-brokerage solutions on the market. Backed by over 10 years of continued development, BrokerWare's unique modular architecture provides a fully scaleable system, which can easily be upgraded and expanded to accommodate both new users and new features. This feature provides for scaleable growth in user capacity, as well as the ability to add new delivery methods and new technology quickly, seamlessly, and cost-effectively.

eNorthern.com is the first financial services Web site to be launched by Digital Gem Corporation (TSE:GEM), a Toronto-based financial services company that provides low cost, high quality e-commerce products to individuals and to small and medium- sized Canadian businesses. Digital Gem is being developed on and for the Internet, and will use powerful technology to simplify and streamline investment decisions. Northern Securities Inc., a wholly-owned subsidiary of Digital Gem, is focused on providing high quality services to small market capitalization companies.

BrokerWare is developed and marketed by SunGard eCRM Systems, an operating unit of SunGard (NYSE:SDS), a global leader in integrated IT solutions and eProcessing for financial services. SunGard is also the pioneer and a leading provider of high-availability infrastructure for business continuity. With annual revenues in excess of $1.4 billion, SunGard serves more than 10,000 clients in over 50 countries, including 47 of the world's largest 50 financial services institutions. Visit SunGard at www.sungard.com.

Sunday, February 26, 2012

Computer Motion Hires Vice President of Clinical, Regulatory and Quality Affairs; New Executive to Lead Company's Clinical Study Programs and Regulatory Approval Strategies.

Business Editors

SANTA BARBARA, Calif.--(BUSINESS WIRE)--Dec. 20, 1999

Computer Motion Inc. (Nasdaq:RBOT) announced today it has named Richard J. DeRisio to the position of vice president of clinical, regulatory and quality affairs.

DeRisio will be responsible for the strategic development of Computer Motion's clinical and regulatory processes and how they integrate into the company's overall business strategy.

DeRisio has more than 15 years in the medical device industry, 10 of which were spent working for Johnson & Johnson. He most recently served as the vice president, quality & compliance and vice president, clinical, regulatory and quality at Biosense Webster Inc. (a division of Johnson & Johnson).

DeRisio also spent 10 years working for the United States Food and Drug Administration (FDA), where his responsibilities included engineering and technical review, management of device foreign inspection activities, Good Manufacturing Practices (GMP) compliance and providing guidance on sterilization and microbiological control.

"Computer Motion is thrilled to have Mr. DeRisio join our team," said Robert W. Duggan, chairman and CEO of Computer Motion. "With his background with the FDA and the medical device industry, Dick has developed significant regulatory experience with Investigational Device Exemption (IDE) studies, 510(k) approvals and Premarket Approvals (PMA) for cardiovascular devices.

"Bringing Dick on board with his FDA experience in Class II and Class III medical devices reinforces our commitment to ensure that Computer Motion meets or exceeds all requirements and expectations of the FDA and other regulatory approval agencies worldwide," added Duggan.

DeRisio commented, "I am excited to be a part of the team that will bring this innovative technology to doctors and their patients in the United States. Computer Motion has assembled a remarkable group of employees who are passionate about robotically assisted surgery and the benefits we believe it brings to health care."

DeRisio received a B.S., Chemical Engineering and an M.S., Food Science & Technology with a Minor in Microbiology from Cornell University. He is also a member of the Association for the Advancement of Medical Instrumentation (AAMI), the Regulatory Affairs Professional Society (RAPS) and the Editorial Advisory Board for Medical Device & Diagnostic Industry magazine.

Computer Motion is creating the cornerstone technologies and products for tomorrow's Intelligent Operating Room(TM). The company develops, manufactures and markets proprietary computer-enhanced and robotic surgical systems which enhance surgeons' capabilities, improve outcomes and reduce costs.

Computer Motion markets the AESOP(R) 3000, a voice-controlled endoscope positioning system; the HERMES(TM) Control Center, a centralized system which enables the surgeon to voice control a network of "smart" medical devices; and the ZEUS(TM) Robotic Surgical System for new minimally invasive microsurgical procedures, such as beating heart Endoscopic Coronary Artery Bypass Grafting (E-CABG(TM)).

The ZEUS System is currently under an FDA-approved investigational device exemption and is CE Marked for commercial sale in Europe. ZEUS is being co-marketed by Computer Motion and Medtronic (NYSE:MDT). The company's Internet Web site is www.ComputerMotion.com.

This news release contains forward-looking statements concerning the company's business and products. Actual results may differ materially depending on a number of risk factors, including the risks of competition and competing technologies, duration or suspension of clinical studies, regulatory clearances and approvals, and physician, hospital and payor acceptance of the company's products. These factors and other risks inherent in the company's business are described from time to time in the company's Securities and Exchange Commission filings, including its Annual Report on Form 10-K. The company undertakes no obligation to revise the forward-looking statements contained herein to reflect events or circumstances after the date hereof to reflect the occurrence of unanticipated events.