Gwentech develops software and electronic hardware products for consumer, industrial, and construction markets.

Integrity ●  Trust  ●  Quality  ●  On-Time  ●  Flexible


Electronic Hardware

DSPs · Power Circuits · Real-Time Control · Custom Interfaces · Analog Circuits · Wireless

Read More>>

Software Design

Embedded Firmware · Web Applications · PC Applications · Mobile Apps

Read More>>


Development Tools for Engineers

Read More>>

Here's how we rate our skills. If your project involves anything outside of our skillset, just ask anyway. Chances are, we know someone who can fill in the gaps.

Electronic Design
Using a chainsaw
Playing Golf
'Thanks to Gwentech for their product and assistance. They provided excellent support for both hardware and software'.
ETH Zurich
'Gwentech delivered a custom variation of their product in record time for a concept design. We look forward to future business with them!'
'Gwentech was very responsive in helping us prototype our concept with their GT1026 product. Thanks for your part in making our project a success!'
Pi Innovo

Latest News


Making IoT Secure
July 31, 2015

The Internet of Things (IoT) makes some fascinating promises of capability, competence and efficiency, which have left most of the industry starry-eyed. Not without good reason. However, it can’t be denied that IoT also brings a host of unprecedented risks and threats as well. Now, the scenario is such that anything with a footprint on […]


Low Power and High Performance
July 31, 2015

Up until a few years ago, you could expect small form factor boards to be used only with a limited number of standard form factors, say the venerable PMC or PC/104. However, not anymore. Small form factors options for board formats are quickly gaining traction in diverse embedded software systems and operations, in both standard […]


Detecting and Managing Persistent Threats
July 31, 2015

The Internet is rife with an array of security threats that is only growing larger by the day. Consequently, any device, network or system connected to the Internet or connected to other device/network/system over the Internet, is vulnerable to threats. The good news is most organizations are aware that threats exist and have put in […]