logo-removebg-preview
Our Services


SYSTEMS ENGINEERING


The core of our competencies is our understanding of systems engineering concepts as well as of processes and the necessary tools to design a system.


Our systems engineering offering includes:


Technology studies

Feasibility studies

Requirements definitions

Process definitions

System engineering

Detailed design

Integration, validation and verification (IVV)

Quality management

Project management


Our engineering teams work according to different methodologies, depending on the specification of the system and the process requirements of our customers. This ranges from highly linear engineering processes based on the ECSS standard suite, AGILE processes based on Scrum, to Kanban and extreme programming in order to offer maximum flexibility.  


We routinely use the Model Based System Engineering (MBSE) methodology and formal reference systems such as DODAF and MODAF.



SOFTWARE SOLUTIONS

Mission critical systems and services for aerospace customers

Our employees, who exclusively develop our software solutions, oversee numerous fixed-price projects and develop new products internally. Our team is organized in competence centers in order to ideally bundle our know-how.  


Thanks to the wide variety of projects, we cover all phases of the engineering life cycle. This includes:


Needs analysis

Choice of technology

Prototyping

specification

Implementation, integration, validation

Provision, maintenance and support of the application systems

as well as training.


Our engineering teams use both classic development and AGILE methods and use modern engineering, integration, test and validation technologies. We see the applied methodology as the key and pioneer for our customers and combine methods and technologies for them. Different systems and different organizations require different engineering approaches and solutions.




DRONE DETECTION

Drone detection: effective protection against small drones


DIDIT stands for Distributed Detection, Identification and Tracking. Authorities as well as companies and private individuals benefit from DIDIT, our solution for the automatic detection, localization and tracking of small drones. DIDIT is our answer to this new type of threat. It enables our customers to react to the diverse challenges posed by small drones and to prevent undesirable consequences. 


DIDIT contributes to the protection of public security, prevents violations of privacy and enables companies to protect their trade secrets. People, information and systems are effectively protected. The location of the drones and their pilots allows our customers to prevent undesired and illegal activities.



ICT SOLUTIONS

BS TECH ENGINEERING supports companies and organizations in the development, maintenance, migration and further development of their information and communication technology infrastructure (ICT). Our offer includes design, development, system monitoring and control.


Our experience

BS TECH ENGINEERING has more than ten years of experience in the management and development of mission-critical IT infrastructure in space. The ESA's ESTRACK network deserves a special mention here, as is the international ground segment network of Columbus, the German research laboratory on the ISS.


BS TECH ENGINEERING has highly qualified employees with experience in the design, implementation, development and maintenance of complex ICT infrastructures, especially for business-critical environments, including communication infrastructure, design of hardware platforms (size adjustment, performance considerations) and information security. Our ICT employees are trained in the globally recognized standards for project management (Prince2) and ICT (ITIL).  


Depending on requirements, we manage parts or the entire ICT infrastructure of our customers. In order to determine the needs and requirements of an omnipresent, future-proof ICT infrastructure, our consultants and engineers carry out a status quo analysis of the network physics currently in use, as well as the hardware and software. Based on the results, we then present a "weak point analysis" in order to be able to discuss realistic technical and commercial possibilities.