SlideShare a Scribd company logo
DESIGN & SECURE YOUR PRODUCT
Classification : Public MU-Electronics company presentation –2018 - 1
You have an IoT project but :
- You don’t have the resources
to meet time & cost targets
Classification : Public 2
- You lack some expertise to improve your product
- You don’t master all the technologies
provides services in
Embedded software
• Firmware, driver & application
development
• Security implementation &
support to certification
• Test & validation
• Digital IC design down to 14
nm
• IC layout
• Place & routing
• PCB layout
Semiconductor
& electronics
Classification : Public 3
M U C O 2
Mastering IoT technologies
Device development
• C/C++ & assembler
• Driver development
• Javacard applets development
• Authentication, encryption,
integrity
• IoT protocols implementation
• IoT Web interface
• MU-Electronics continuously grow
its own expertise with MUCO R&D
Platform
• Server Web application
• Android Application
IoT specific technologies
Classification : Public 4
• Complete firmware development, test
& validation
• Javacard applets
• Flash loader
• Products delivered by
MU-Electronics are
certified by
Take advantage of a security expert
Certifications Realisations
Classification : Public 5
MU-Electronics in few words
Experienced team
• Operating since 2003
• > 30 high skill Engineers
• ASIC, Embedded Software &
Security Engineers
• Employee Turnover <5%
• French & English
Nearshore Morocco
Classification : Public 6
We support your project in a flexible way
Fixed fee turnkey
Project
Remote Time & Material
• Right profile allocated to the designated task
• Supervised by experienced management team
with in depth technical background
• Offer flexibility in resource management with a
large pool of educated engineers
• Proximity, large bandwidth VPN, same time zone
ease cooperation with headquarters
• Easy integration within Agile managed project
• Capability to set remote dedicated organisation
• For complete software or device development
• Or drivers, interface development or security
implementation
• Include test & validation
• No risk for customer
• Timeline and budget under control
• Complete visibility of project management
Classification : Public 7
References
Classification : Public 8
Benefits
•Expertise in embedded software and security
•Flexibility at competitive cost at only one hour time
zone
•VPN fast link allows safe and permanent remote
operation
•French & English languages to ease communication
Classification : Public 9
SECURE YOUR IOT PROJECT
MU-Electronics is a nearshore service company
specialized in embedded software and IC design
with a solid security expertise for IoT, automotive
and finance applications
Classification : Public 10
• Sales office Aix en Provence
• Mohamad CHEHADI: mchehadi@mu-e.com
📞 +33 6 87 61 46 28

More Related Content

What's hot

The Evolution of Industrial Visualization
The Evolution of Industrial VisualizationThe Evolution of Industrial Visualization
The Evolution of Industrial Visualization
Inductive Automation
 
Introduction to Intel's Developer Program
Introduction to Intel's Developer Program Introduction to Intel's Developer Program
Introduction to Intel's Developer Program
Haidee McMahon
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UCRachid ZINE
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
Inductive Automation
 
Brendan McKenna adding capability
Brendan McKenna adding capabilityBrendan McKenna adding capability
Brendan McKenna adding capability
Brendan McKenna
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Mike Taylor
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Inductive Automation
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
DevOps.com
 
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
Hans Andersson
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
Alex Lavell
 
Revolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT HarmonizationRevolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT Harmonization
Sadatulla Zishan
 
TETRA
TETRATETRA
TETRA
Intetics
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
Tempered
 
Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Public
martinvoelk
 
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIsBoundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
Sidney Burks, Ph.D
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol PresentationAkhil Agrawal
 
Bringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusBringing Digital Transformation Into Focus
Bringing Digital Transformation Into Focus
Inductive Automation
 
KIWI IoT Presentation
KIWI IoT PresentationKIWI IoT Presentation
KIWI IoT Presentation
Jeff Katz
 

What's hot (20)

The Evolution of Industrial Visualization
The Evolution of Industrial VisualizationThe Evolution of Industrial Visualization
The Evolution of Industrial Visualization
 
Introduction to Intel's Developer Program
Introduction to Intel's Developer Program Introduction to Intel's Developer Program
Introduction to Intel's Developer Program
 
Offre revendeurs UC
Offre  revendeurs   UCOffre  revendeurs   UC
Offre revendeurs UC
 
Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Brendan McKenna adding capability
Brendan McKenna adding capabilityBrendan McKenna adding capability
Brendan McKenna adding capability
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
ASG
ASGASG
ASG
 
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...Anti key logging and real-time encrypting software | keystrokes encrypting so...
Anti key logging and real-time encrypting software | keystrokes encrypting so...
 
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the RiskOpen and Secure SCADA: Efficient and Economical Control, Without the Risk
Open and Secure SCADA: Efficient and Economical Control, Without the Risk
 
How to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at ScaleHow to Operate Kubernetes CI/CD Pipelines at Scale
How to Operate Kubernetes CI/CD Pipelines at Scale
 
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
From idea to the field - Simplify Your IoT project (Acal BFi Nordic & Sierra ...
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
Revolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT HarmonizationRevolutionizing I4.0 Security and IT/OT Harmonization
Revolutionizing I4.0 Security and IT/OT Harmonization
 
TETRA
TETRATETRA
TETRA
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Cyber51 Company Presentation Public
Cyber51 Company Presentation PublicCyber51 Company Presentation Public
Cyber51 Company Presentation Public
 
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIsBoundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
Boundless Digital - Boost IT Network Capabilities thanks to Cisco APIs
 
2FA Protocol Presentation
2FA Protocol Presentation2FA Protocol Presentation
2FA Protocol Presentation
 
Bringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusBringing Digital Transformation Into Focus
Bringing Digital Transformation Into Focus
 
KIWI IoT Presentation
KIWI IoT PresentationKIWI IoT Presentation
KIWI IoT Presentation
 

Similar to Design & Secure Your Connected Product

Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business Value
Infopulse
 
Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
Khursheed Farooq
 
Reliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUpsReliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUps
Fortifier. IT Company
 
Resume_Achhar_Kalia
Resume_Achhar_KaliaResume_Achhar_Kalia
Resume_Achhar_KaliaAchhar Kalia
 
Hutchinson Networks Overview
Hutchinson Networks OverviewHutchinson Networks Overview
Hutchinson Networks Overview
Matthew Thomson
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Codit
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5digiflak
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
Janani S
 
Vahid nazaritalooki cv
Vahid nazaritalooki cvVahid nazaritalooki cv
Vahid nazaritalooki cv
Vahid Nazaritalooki
 
Scale Focus en
Scale Focus enScale Focus en
Scale Focus en
Valdis Hinkov
 
Best Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company IndiaBest Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company India
Parthesh Raval (AdWords and Analytics Certified)
 

Similar to Design & Secure Your Connected Product (20)

Soliman_Mohamed TM
Soliman_Mohamed TMSoliman_Mohamed TM
Soliman_Mohamed TM
 
Software Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business ValueSoftware Engineering Solutions that Create Long-Term Business Value
Software Engineering Solutions that Create Long-Term Business Value
 
Azr infotech services
Azr infotech servicesAzr infotech services
Azr infotech services
 
Tk amk new
Tk amk newTk amk new
Tk amk new
 
Tk amk new
Tk amk newTk amk new
Tk amk new
 
IT_manager
IT_managerIT_manager
IT_manager
 
Reliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUpsReliable Engineering for InsurTech StartUps
Reliable Engineering for InsurTech StartUps
 
Resume_Achhar_Kalia
Resume_Achhar_KaliaResume_Achhar_Kalia
Resume_Achhar_Kalia
 
sampath_kumar
sampath_kumarsampath_kumar
sampath_kumar
 
Hutchinson Networks Overview
Hutchinson Networks OverviewHutchinson Networks Overview
Hutchinson Networks Overview
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 
ESS Software and Firmware
ESS Software and FirmwareESS Software and Firmware
ESS Software and Firmware
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
Career Domain 2022-23.pptx
Career Domain 2022-23.pptxCareer Domain 2022-23.pptx
Career Domain 2022-23.pptx
 
Vahid nazaritalooki cv
Vahid nazaritalooki cvVahid nazaritalooki cv
Vahid nazaritalooki cv
 
Resume
ResumeResume
Resume
 
MOBODEXTER
MOBODEXTERMOBODEXTER
MOBODEXTER
 
Scale Focus en
Scale Focus enScale Focus en
Scale Focus en
 
Best Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company IndiaBest Software Development company india and Web marketing Company India
Best Software Development company india and Web marketing Company India
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 

Design & Secure Your Connected Product

  • 1. DESIGN & SECURE YOUR PRODUCT Classification : Public MU-Electronics company presentation –2018 - 1
  • 2. You have an IoT project but : - You don’t have the resources to meet time & cost targets Classification : Public 2 - You lack some expertise to improve your product - You don’t master all the technologies
  • 3. provides services in Embedded software • Firmware, driver & application development • Security implementation & support to certification • Test & validation • Digital IC design down to 14 nm • IC layout • Place & routing • PCB layout Semiconductor & electronics Classification : Public 3 M U C O 2
  • 4. Mastering IoT technologies Device development • C/C++ & assembler • Driver development • Javacard applets development • Authentication, encryption, integrity • IoT protocols implementation • IoT Web interface • MU-Electronics continuously grow its own expertise with MUCO R&D Platform • Server Web application • Android Application IoT specific technologies Classification : Public 4
  • 5. • Complete firmware development, test & validation • Javacard applets • Flash loader • Products delivered by MU-Electronics are certified by Take advantage of a security expert Certifications Realisations Classification : Public 5
  • 6. MU-Electronics in few words Experienced team • Operating since 2003 • > 30 high skill Engineers • ASIC, Embedded Software & Security Engineers • Employee Turnover <5% • French & English Nearshore Morocco Classification : Public 6
  • 7. We support your project in a flexible way Fixed fee turnkey Project Remote Time & Material • Right profile allocated to the designated task • Supervised by experienced management team with in depth technical background • Offer flexibility in resource management with a large pool of educated engineers • Proximity, large bandwidth VPN, same time zone ease cooperation with headquarters • Easy integration within Agile managed project • Capability to set remote dedicated organisation • For complete software or device development • Or drivers, interface development or security implementation • Include test & validation • No risk for customer • Timeline and budget under control • Complete visibility of project management Classification : Public 7
  • 9. Benefits •Expertise in embedded software and security •Flexibility at competitive cost at only one hour time zone •VPN fast link allows safe and permanent remote operation •French & English languages to ease communication Classification : Public 9
  • 10. SECURE YOUR IOT PROJECT MU-Electronics is a nearshore service company specialized in embedded software and IC design with a solid security expertise for IoT, automotive and finance applications Classification : Public 10 • Sales office Aix en Provence • Mohamad CHEHADI: mchehadi@mu-e.com 📞 +33 6 87 61 46 28