New 1U rackmount chassis and power supply design passed Intel rigid testsing and being adopted in the Intel hosting center
CAI starts manufacture and assembly rackmount based network appliance for Italy based company Petral.
CAI and Allen Bradley agreed to let CAI manufacture rackmount chassis for its industrial and military computing division
In the spring of 1987, CAI was founded to a build PC-based cardiology instrument for a group of medical researchers. Since them, we have developed many different hardware and software solutions for companies large and small. Our solutions go to many Fortune 500 companies, as well as Mom and Pop shops.

In recent years, we have also acquired manufacturing capabilities. We make rackmount chassis and rackmount power supplies in our factories in Taiwan and China. Our automated rackmount chassis production line can produce over 2,000 high quality rackmount chassis in one day. We have offices in US, Australia, China and Taiwan. All our factories in Taiwan and China are ISO 9001 certified.

For each product we manufacture, exhaustive and repeatitive tests are conducted so that we can assure our customers that they will receive the highest quality product. We assure our customers that each product will perform exactly as designed, or we will refund your money. We choose high quality parts and go the extra mile to make sure our products will last for a long long time in an industrial, military or IT environment.

No Spam, Why did you send us spam!

Spam emails waste so much time for so many people. We hate spam, and we block any server sending spam email to us. If your email being rejected by our servers due to our block, you may go to Yahoo mail or Hotmail to send us a notice with the header part of the email message, so that we can unblock your server.

Some people may also receive spam emails that claimed from us. Are they really from us? Who can you trust when we telling you the spam is not from us, but the email return address said us? If you received a spam email claimed from us, please check its header carefully. Here is an example of a spam email we received with email header expanded:

Return-Path: <>
Received: from ( [])
   by (8.12.8/8.12.8) with ESMTP id i3THN7i9006301
   for <>; Thu, 29 Apr 2004 10:23:07 -0700
Message-Id: <>
Subject: Re: Your music
Date: Thu, 29 Apr 2004 10:31:05 -0700
MIME-Version: 1.0
Content-Type: multipart/mixed;
X-Priority: 3
X-MSMail-Priority: Normal

See the attached file for details.
<omit the actual spam>

This spam pretended from us. When you received a spam email, the only thing you can trust is your own email server. Spammer can fake almost everything in a spam, except the line your own email server reported where did it received that spam. In the above spam, Spammer faked its server name as "", but the actual IP address is located at, that is not fakeable. Does not matter which domain it says where it came from, your server will report the actual IP address spammer sending the spam to you. If you block that IP address, it will not be able to send spam to you from that IP address again. If you received a spam pretend from us, you should check its source IP address and find out the real spamer and complaint to ISP hosting that IP address. Or you can forward the entire spam email with detailed header to We do forward all spam emails to .

© 1987-2008 Compute Aid, Inc. All rights reserved.