S100 Computers

Home S-100 Boards History New Boards Software Boards For Sale
Forum Other Web Sites News Index    
 
CompuPro - History

Compupro Logo

CompuPro started out as a company call Godbout Electronics founded by one of the legends of the early micro-computer era, Bill Godbout.  Unlike some of the other S-100 computer founders Bill had quite a bit of experience in building and selling computer/electronic equipment. He started in the business working as a manager and buyer for a guy named Mike Quinn who had a legendry electronics equipment store near Oakland Airport in California. Mike's store in the early 70's was a hive of activity where pioneers in the field like Lee Felsenstein, Bob Marsh  & Gordon French (Processor Tech) , George Morrow (ThinkerToys, Morrow Designs) , Chuck Grant & Mark Greenberg (Northstar Computers) , Howard Fulmer  (Equinox-100), Brent Wright (Fulcrum)  and many others hung out.  Eventually Bill started his own mail order business in the early 1970's selling electronic experimenter kits.  He setup in the building behind Mike Quinn -- thereby always being in contact with new products, ideas and people. 
 
Bill started in the S-100 board business in 1976 by selling RAM memory boards out of his Godbout Electronics mail order business. His contacts and experience in getting chips fast and at good prices help him get going quickly and allowed Godbout Electronics to fill a market need for boards that Altair, IMASI and even Processor Technologies could not meet in those early days.  In the end Godbout/CopmuPro had more different types of S-100 RAM boards than anybody else in the business. All their boards were static RAM boards. As the business grew the evolved into most other S-100 board types eventually putting together complete S-100 systems. Their S-100 boxes were arguably the most solid and reliable ever made. His innovative products played a large part in the success of the S-100. Bill played a major role in setting the specs for the S-100 bus IEEE-696 standard, being one of its authors.

8-16 Box

CompuPro made a number of complete systems over the years.  The CompuPro 8/16 came in various forms of capability and probably represented the best example of a S-100 boards cooperating with each other. It was one of the last commercial systems to come out for the S-100 bus. There are still some of these boxes around still working! At a late point in the companies history CompuPro started to call themselves Viasyn.  Late boards were labeled with this name.

The CompuPro 8/16 was probably the last commercial system to come out for the S-100 that was marketed to both hobbyists and commercial users in the mid to  late 1980s.  However like Cromemco, Compupro designed and sold even more advanced systems based on the S-100 bus to commercial users up until they went out of business in 1990/91. These systems were of little interest to hobbyists because of their extreme cost, and the fact they were primarily designed to support connections to multiple users each working at a “dumb terminal”.

A note of caution: some of the later Viasyn boards and systems were run without the voltage regulators on the boards. Instead, 5V was supplied on a non-standard S-100 bus.  If you put these boards into a standard S-100 system without the regulators reattached, you will fry the board IC's.

Proxy Links [better] 🆕 Real

In conclusion, proxy links are a vital and accessible tool for achieving a more open and less monitored internet experience. Their ability to mask an IP address and bypass local restrictions makes them invaluable for individuals facing censorship, travelers needing access to home content, and businesses conducting competitive research. They offer a quick, browser-centric solution without the setup complexity of a VPN. However, their fundamental lack of encryption and the trust required in the proxy provider pose serious privacy and security risks. Therefore, while proxy links are excellent for low-stakes tasks like accessing a blocked news article or streaming a video, they are a poor choice for online banking, shopping, or transmitting any confidential data. Understanding this trade-off between simplicity and security is essential. In the end, a proxy link is not a shield but a mask—effective for changing one's appearance, but offering little protection if one is singled out for a closer inspection.

The fundamental operation of a proxy link is straightforward yet powerful. When a user clicks on a proxy link or configures their browser to use a proxy server, their internet request is rerouted. Instead of sending a request directly to the target website's server (e.g., requesting a news article), the user's computer sends the request to the proxy server. The proxy server then forwards this request to the target website on the user's behalf. The website, in turn, sends its response back to the proxy server, which finally relays the data to the user. This process effectively masks the user's original Internet Protocol (IP) address, making it appear as though the request originated from the proxy server's location. This simple act of indirection is the foundation upon which all proxy functionalities are built. proxy links

Despite their utility, proxy links are not a panacea and come with significant limitations and risks. The most critical vulnerability is the lack of standard encryption. While a proxy hides your IP address, the data you send and receive often travels in plain text. This means that the proxy server operator, or anyone who has compromised that server, could potentially intercept and read your passwords, credit card numbers, or private messages. In contrast, a VPN creates a secure, encrypted tunnel, making it far superior for handling sensitive information. Furthermore, many free proxy services are financially unsustainable. These services may resort to injecting advertisements into your web traffic, logging your browsing history to sell to marketing firms, or, in worst-case scenarios, embedding malware. The user’s trust is entirely placed in the proxy provider, and for free, anonymous proxies, this is often a risky bargain. Performance is another issue; using a proxy can significantly slow down connection speeds due to the extra routing step, and free proxies are frequently overcrowded and unreliable. In conclusion, proxy links are a vital and

One of the most prevalent applications of proxy links is circumventing geo-restrictions and censorship. Many streaming services, such as Netflix or Hulu, offer different content libraries based on the viewer's country. A user in a region with a limited library can use a proxy link with an IP address from the United States to access the fuller American catalog. Similarly, in nations with stringent internet censorship, such as China or Iran, citizens utilize proxy links to access globally blocked platforms like Wikipedia, Twitter, or Google. For students and employees, proxy links are often deployed to bypass school or corporate firewalls that block social media, gaming, or video-streaming sites. In these contexts, the proxy link serves as a digital passport, granting entry to otherwise forbidden online territories. However, their fundamental lack of encryption and the

Beyond access, proxy links offer tangible privacy and security benefits. On a basic level, they obscure a user's IP address, preventing websites from easily pinpointing their physical location or tracking their browsing habits across sessions. This is particularly useful on public Wi-Fi networks, such as those in coffee shops or airports, which are notoriously vulnerable to eavesdropping. An anonymizing proxy can add a layer of obscurity, though it is crucial to note that most standard proxies do not encrypt traffic end-to-end (unlike a VPN). Web scraping, a technique used by businesses to collect publicly available data from competitor websites or for market research, also relies heavily on rotating proxy links. By distributing requests across many different proxy IP addresses, companies can avoid being blocked by target websites that might otherwise flag and ban a single IP making too many requests in a short period.

 

his page was last modified on 05/20/2020     Â