Deployment model

A managed local appliance, not a public SaaS tenant.

BlackBox Node is planned for client-controlled appliance deployments on approved hardware, with ASP.NET Core hosted through Kestrel, local HTTPS, and managed operating practices.

Apple Silicon target Kestrel hosting Local HTTPS launchd startup Offline update direction

Hardware direction

Apple Silicon appliance targets

The Mac appliance direction includes Apple Silicon Mac Mini, Mac Studio, or similar approved hardware sized for the client's model, storage, and usage needs.

Runtime hosting

ASP.NET Core through Kestrel

The local web experience is expected to run through ASP.NET Core and Kestrel, with local HTTPS and network exposure reviewed during deployment planning.

Managed operations

Supportable startup, updates, and maintenance

macOS launchd startup, signed installer packaging, offline update support, backup planning, and model maintenance remain explicit deployment topics.

Deployment path

The deployment conversation starts with control, not a hosted signup.

The public site explains the high-level managed deployment path while leaving environment-specific implementation to the deployment engagement.

  1. 01

    Assess environment

    Review data sensitivity, users, source systems, hardware fit, and network boundaries.

  2. 02

    Prepare appliance

    Select approved Apple Silicon hardware and install the BlackBox Node runtime stack.

  3. 03

    Bind local access

    Configure Kestrel, local HTTPS, startup service, and local access patterns.

  4. 04

    Connect sources

    Enable approved read-only connectors and indexing schedules.

  5. 05

    Validate permissions

    Confirm roles, matters, client boundaries, audit events, and support runbooks.

  6. 06

    Operate and maintain

    Plan model updates, backups, support cadence, and offline update procedures.

Public website boundary

This site explains the product. It is not the appliance.

This public website is product information only. Do not submit confidential client, patient, case, investigation, regulated, or commercially sensitive data through the public website.

Next step

Discuss a private intelligence deployment.

Use the contact path to talk through data sensitivity, sector obligations, appliance shape, and rollout readiness before implementation decisions.