diff --git a/ANNOUNCE b/ANNOUNCE
index d4585cba4db43f31aa7b8714d4b907ebfbfba5f4..8ebf0542dd79cf29c7493980dfdf31ae4d617cff 100644
--- a/ANNOUNCE
+++ b/ANNOUNCE
@@ -1,13 +1,13 @@
 Pike 7.1 developer version
 
 While still young, Pike matured over the last few years, and
-development is now co-ordinated by a team at Idonex AB. Pike is still
-released under the GNU General Public License (GPL). It is, and will
-continue to be, freely distributed. Briefly, this means that you are
+development is co-ordinated by a team at Roxen Internet Software AB.
+Pike is released under the GNU General Public License (GPL). It is, and
+will continue to be, freely distributed. Briefly, this means that you are
 free to use and modify the source code in any way you please, see the
-file COPYING for details. Idonex maintains the right to the brand name
-and the copyright, guaranteeing that Pike will be continuously
-developed and enhanced, and remain free software.
+file COPYING for details. Roxen Internet Software maintains the right
+to the brand name and the copyright, guaranteeing that Pike will be
+continuously developed and enhanced, and remain free software.
 
 Pike is easily learned, and just as easily used to develop powerful
 applications. Pike is designed to be useful and powerful. As the
@@ -17,7 +17,7 @@ object-oriented language, powerful applications can be rapidly
 developed. Pike has evolved rather than been designed. The changes to
 Pike that have been made have been guided by its users' needs. In
 general, the better you get to know Pike, the more you will appreciate
-it, from a user's perspective.
+it, from a users perspective.
 
 Pike is just as suitable for intricate and large applications as for
 creating use-once scripts. When needed, you can also write
@@ -40,10 +40,10 @@ A list of pros and cons with Pike follows:
         + Portable - Platform independent and available on most flavors of Unix
 	  At present the following platforms are supported:
 	  
-	     Solaris 2.5 & 2.6 (Sun SPARC & Intel x86) 
+	     Solaris 2.5.1 & up (Sun SPARC & Intel x86) 
              Tru64
              AIX 4.3
-             IRIX 6.3 
+             IRIX 6.5
              FreeBSD 4.0
              HP-UX 10.20 
              Linux Red Hat 4.2, 5.2, 6.1 and others (Intel x86) 
@@ -63,14 +63,11 @@ How Pike relates to other programming languages:
         + C-like Syntax - Easy to learn
 
 Below you will find a list of some desired but missing features, or
-cons, of Pike. As indicated by the version number 0.5, Pike is still
-under development and the goal is to incorporate those in future
-versions.
+cons, of Pike. Pike is still under development and the goal is to
+incorporate those in future versions.
 
         - No Pike native compiler or debugger available
-        - Limited image format import and export support
         - Not optimal for heavy numeric processing jobs
-        - Not for GUI based applications
         - Limited range of special effect image filters for image
           processing
 
@@ -102,15 +99,12 @@ performing any kind of drawing operation. Using the Image module, you
 can automate jobs that would otherwise have required tedious work in
 an interactive image processing program such as Adobe PhotoShop.
 
-Currently, the only input format is ppm. Output formats are ppm and
-gif.
-
 
 Sql - Interface to SQL Databases 
 
 The SQL interface makes it possible to use common SQL databases from
-within your applications. It includes support for mSQL, MySQL and
-Postgres. 
+within your applications. It includes support for mSQL, MySQL, Postgres,
+Oracle and ODBC.
 
 
 MIME - Multimedia Internet Mail Extension Module
@@ -131,7 +125,7 @@ Crypto - Cryptographic Toolkit
 
 The crypto toolkit is a set of objects implementing various
 cryptographic algorithms, as well as objects used to glue the other
-objects together. The toolkit includes block ciphers IDEA, DES
+objects together. The toolkit includes block ciphers AES, IDEA, DES
 (including tripple DES) and CAST, the RC4 stream cipher, the hash
 functions MD5 and SHA, and the public key cryptography algorithm
 RSA. It also includes a some randomness sources.