top of page

IT CONSULTANCY SERVICES

STONEHOUSE SOFTWARE

PROTOCOL STACKS FROM YOUR SPECIALIST

 

We love Protocols! Everything from https, to tcp/ip, udp and ISO 15118. If any of these are confusing we can help. Reach out via the contact page and one of our experts will be in touch

CONSULTING BY EXPERTS

 

Our team of experts can help with a range of advice from Secure IT Architecture, through user experience to software design and build

CUSTOMISED EMBEDDED SOFTWARE

 

Stonehouse is particularly proud of its experience in embedded software development. We love making code run on smaller and smaller devices - be that Raspberry PI, Arduino, or ARM based. All of these developments are done through the lens of robust security and resilience.

FROM CCS Uni to CCS Bidirectional

Stonehouse have developed a proof of concept to enable Bidirectional charging based around the CCS protocol. This enables EV drivers to charge up when power is green and cheap, and use it to power their homes at peak times

TCP/IPIP
WEBSERVER
SOFTWARE QUALITY

SECURE IT

OUR SERVICES

I'm a paragraph. Click here to add your own text and edit me. It's easy.

EMBEDDED SOFTWARE

PKI

Our consultants are expert in providing an end-to-end service for Secure IT systems. We work with user groups to formulate requirements, take these through Architecture and design, and on to deployment. Check our client list for some examples of companies we've helped.

Software for embedded systems brings unique challenges. The code must be very efficiently written as the devices usually have constrained memory and other resources. Also these devices often need to run unattended for long durations. We are expert at solving these unique challenges.

PKI - Public Key Infrastructure. Quite often in today internet-connected world making the little padlock appear is trivial - purchase the right certificate. In offline or on-prem deployments the entire structure must be built from scratch. We can help - everything from HSMs to Certificate Practice Statements 

SECURITY

I'm a paragraph. Click here to add your own text and edit me. I’m a great place for you to tell a story and let your users know a little more about you.​
SECURITY
EMBEDDED INTERNET

SECURITY

APPS

Our consultants are well versed in applying strict security standards, such as those drawn from NIST 800-53 for example. We can assemble evidence for auditors and accreditors, taking a major headache out of a project.

We don't just do software - we have a growing part of the consultancy that is developing cutting edge electronics, renewable energy technology, customer engagement and more. We operate at the prototyping stage, and once a design is ready and tested we usually go to a partner organisation to start volume manufacture.

APPS

ELECTRONICS

The ubiquitous smartphone app is everywhere. Most of our digital solutions are accompanied by some form of mobile app, we have developed for iPhone, Android, iPad and tablet

CLIENTS

bottom of page