Loading...

Secure and reliable embedded products

With our 28 years of combined experience, we leverage the latest technologies to design custom embedded solutions. Whether you need fixed-price or time-and-materials support, we guide you through every step of the process, from design to implementation, to meet your requirements.

Firmware loading from PC
Rocket launch
About Us

Your trusted partner for a comprehensive range of expert services

engineering
Workshop
Interactive sessions focused on design, security, and best practices in embedded software, aimed at finding solutions tailored to your needs.
hub
IoT & Communication
Designing and integrating secure IoT and industrial systems, ensuring reliable communication with third-party devices.
design_services
Software Architecture & Design
Developing the architecture for scalable, efficient, and secure software solutions.
groups
Embedded Software Development
Developing custom software that ensures reliability and enhances device performance.
lock
Security
Enhancing device resilience through strengthened protection measures and automatic detection of vulnerabilities (CVEs).
update
Maintenance & Support
Providing ongoing support to enhance and secure your embedded software.
Our Services

We Provide Solutions For Your Business

data_object
Programming languages
  • ARM and Thumb-2 Assembly
  • MIPS assembly
  • C and C++ (including some modern features)
  • Rust
  • High end programming langage C#, Java
developer_board
MCU development
  • Baremetal or OS (ZephyrRTOS, Amazon FreeRTOS, ThreadX, Micrium OS, …)
  • User Interface development - lvgl
  • ARM Cortex M (StMicroelectronics, Nordic SemiConductors, Renesas, …)
  • Tensilica Xtensa - Espressif
  • Proprietary Core - Renesas, Texas Instuments
  • Firmware development
tux
MPU development
  • Baremetal
  • Bootloaders (U-Boot, E-Boot, …)
  • OS - Linux Yocto, Linux Buildroot, Integrity, QNX, Windows Embedded Compact
  • ARM Cortex A - Texas Instruments, NXP, Microchip (Atmel), …
  • Application development
cell_tower
Wireless
  • Wifi
  • Bluetooth Classic
  • Bluetooth Low Energy including Bluetooth LE Audio
  • Custom protocols
lock
Security
  • Software Bill of Materials / CVE analysis
  • Secure programming
  • Secure and Measured Boot
  • Secure Elements
  • TPM (Trusted Platform Module)
  • Networking authentication
  • TrustZone A (OP-TEE) and M (TF-M)
  • JavaCard
  • Threat Modeling
bug_report
Debugging
  • Complex system problems
  • Low level debugging to identify Memory Corruptions, Scheduling issues, ...
  • Implementation of Lauterbach Trace32 debugging script
deployed_code_update
Deployment
  • Device first installation
  • Provisionning
  • Firmware Update Over the Air (FOTA)