Guides

Product guides for private intelligence adoption.

Use these static guides to understand BlackBox Node before a formal deployment, support, or onboarding conversation begins.

Static guidance No customer login No confidential uploads Deployment-ready topics

Guide library

Static product education before a private deployment.

These topics support early understanding without adding a customer portal, data upload, or appliance control surface.

Prospects and early deployment teams

Getting Started

Understand the readiness questions, deployment shape, data boundaries, and next steps before a proposal.

  • Readiness goals
  • Buyer roles
  • Data sensitivity
  • Next-step discussion
Read related page

Technical reviewers and operations teams

Deployment Overview

Review appliance host direction, Kestrel, local HTTPS, storage planning, updates, and local operational ownership.

  • Appliance host
  • Local HTTPS
  • Storage
  • Updates
Read related page

Operational owners

Local Appliance Operation

Understand what remains inside the client environment and which operational responsibilities sit with the deployment team.

  • Local runtime
  • Backups
  • Model maintenance
  • Operational review
Read related page

Administrators and managers

Users And Matters

Plan roles, matter permissions, client boundaries, and review workflows before source indexing begins.

  • Roles
  • Matter permissions
  • Client boundaries
  • Audit trail
Read related page

Operational administrators

Document Ingestion

Understand read-only source scope, indexing, chunking, connector review, and safe ingestion boundaries.

  • Read-only sources
  • Indexing
  • Chunking
  • Connector review
Read related page

Professional users

Querying

Use matter-scoped retrieval, citations, local model runtime, and professional review as the expected query pattern.

  • Matter scope
  • Citations
  • Local model runtime
  • Review workflow
Read related page

Managers, administrators, and governance reviewers

Audit Logs

Understand how local audit evidence supports accountable access, ingestion, query, and administration workflows.

  • Access events
  • Ingestion events
  • Query metadata
  • Permission changes
Read related page

Customer contacts and project sponsors

Support Escalation

Know which static pathway to use for sales, onboarding, technical support, and incident escalation before ticketing exists.

  • Sales path
  • Onboarding path
  • Technical route
  • Incident escalation
Read related page

Boundary

Public guides only.

This public website provides product information and support routing only. Do not submit confidential client, patient, case, investigation, student, regulated, or commercially sensitive data through this public website.

Next step

Discuss a private intelligence deployment.

Use the contact path to talk through data sensitivity, sector obligations, appliance shape, and rollout readiness before implementation decisions.