Skip to main content
Software development

Software engineering: successfully designing proprietary developments

Some call it individual software, others proprietary software. Relevant at this point: as software developers, physicists, mathematicians and computer scientists, we speak your language in every case and are just as familiar with software engineering as we are with hazard analyses, risk assessments and the like.

This mix makes us the best possible address for all challenges that software development for your medical devices, public sector or industrial applications entails.

As a medium-sized software company, we are flexible and bold enough to solve a wide range of problems in an agile manner and work with you to drive various development projects forward. Alternatively, we can implement your engineering projects based on the specification completely autonomously from ramp-up to ramp-down at our development center in Nuremberg.

Frequently asked questions from our customers - maybe your challenge too?

  • How is test-driven software development structured?
  • What phases are there in software development?
  • Is it possible to collect reliable data from software development?
  • How do you arrive at the right problem definition and thus solution-oriented software development?
  • How does the validation of individual software work?
  • Can software validation be automated?

Do you have questions about risk distribution or cost reduction? Let's talk about your project by calling 0911 / 81510-0 or e-mailing


Concepts and codes: Quality requirements in software engineering

As charming and innovative as up-and-coming small software companies are: Software engineering for medical technology, measurement technology, optoelectronics, large public authorities or industry is often extremely complex and requires a broad and in-depth understanding.

This experience and the software engineering perspective of our computer scientists, physicists, mathematicians and developers are the foundation for designing your software for the future right from the start and then writing it efficiently. We consider quality assurance right from the start. We take a close look at what you expect from your software and how, for example, tests need to be written in order to provide reliable proof of quality.

In short: we make it easy for you - no matter what role you play in the project. Another plus that speaks for us: the development of individual software often goes hand in hand with high regulation and countless conventions. Topics in which we are at home.

Here are a few typical questions about our competencies and skills as a connector that development managers, research project managers, team leads, department heads and managing directors often ask us.

  • .NET und .NET Core
  • Java SE und Java EE
  • Containerisierung
  • Orchestrierung
  • Cloud
  • Microservices
  • u.v.m.

  • C#
  • Java
  • C/C++
  • JavaScript
  • Angular
  • R
  • Vue.js
  • React

  • Azure DevOps / TFS
  • Microsoft Team Foundation Server (TFS)
  • GIT / GITLab
  • JIRA
  • Axure
  • Visual Studio / Visual Studio Code
  • Jenkins
  • Maven
  • TeamCity

  • DevOps
  • Continuous Integration
  • Continuous Testing
  • Continuous Deployment
  • Continuous Delivery

  • BDD (Behaviour Driven Development
  • TDD (Test Driven Development)
  • Agile Software-Entwicklung nach SCRUM und Kanban
  • Exploration Day
  • PowerWeek
  • Domain Driven Design
  • Clean Code
  • Documentation as code
  • Design Thinking
  • Service Design
  • User Journey
  • Limbic Map
  • Process Mining
  • Data Mining
  • Data Analysis
  • SWOT
  • Stakeholder Map

  • EN ISO 9001
  • EN ISO 13485
  • EN ISO 27001

Are your requirements for methods, language or standards much more specific?
Let's talk about it on 0911 / 81510-0 


UX design - because software has to fit the user

The topic of UX design has been such a matter of course for us for so long that we no longer need to say much about it. Our UX designers know large magnetic resonance and computer tomography scanners, compact medical devices and apps in as much detail as the hospital staff.

The situation is similar for measuring instruments, highly functional applications in public administration or industry: we have mastered the view through designer and user glasses and know what doctors, engineers, researchers or administrative officials and clerks need to do their job not only well, but also with pleasure.


Cyber security starts with the development process

You can believe us: there is little that we are not familiar with when it comes to security vulnerabilities. Because in addition to concept and code, we train all topics at our ASTRUM IT Academy - including security-related ones. 

That's why protection against cyber attacks is at the top of the agenda for every development project. We take cyber security into account during development and know which organizational measures are relevant. Is your company part of the critical infrastructure? We have compiled the most important facts for you here.

And if your needs are non-technical in nature, our experts will visit you in person to train and sensitize your employees to the topic of cyber security. Alternatively, we can implement an information security management system (ISMS).

As you can see: As a medium-sized software company, we can do far more than engineering.


Security audit & transparent logging 

  • Rapid basic protection of your assets using tried-and-tested procedures
  • Creation of a roadmap for the continuous expansion of the desired security level (VdS 10000, ISO 27001 or BSI basic protection)



Contact us personally on 0911 / 81510-0 and let's talk about your security issues.




Keyword artificial intelligence: it is the central technology topic of the present - across all areas of life and industries. Would you like to use AI in the robot-assisted assembly of components, for example? Or would you like it to handle data collection and analysis in your company? Many things can be done to relieve your employees, counteract the shortage of skilled workers and drive digital transformation.

Whether AI in company administration (information technology, IT) or AI in the automated areas of production (operational technology, OT) - cyber security must not only be implemented holistically in line with KRITIS - after all, viruses know no boundaries.

Hardware and software and how to make the most of them

We've actually always done it this way! Hand on heart - we've all said, thought and done it before. Humans are creatures of habit and, especially in times of increasing dynamism, routines are also something beneficial.

As a manager in a medical technology company, a municipal administration or in industry, you rarely have this capacity. As experts, we know exactly what is important.

You too can rely on us to

  • Check hardware and software for functionality and security
  • check processes for practicability and data protection
  • master contemporary requirements and usability engineering
  • create auditable processes

Your benefits:

more security

more efficient processes

better component quality

Reduced costs

Relief for the workforce


  • Support in drawing up the specifications
  • Help with the choice of provider
  • Sparring during implementation
  • User training
  • Professional and transparent documentation

How can we support you? Let's talk about it.
Tel. 0911 / 81510-0 or e-mail