YOU ARE NOWENTERING
TIME: 3 MNSSCROLL TO EXPLORE
THE OPERATING SYSTEMFOR INSTITUTIONAL COGNITIVE WORK
©2026AXE TECHNOLOGIES INC.

CASTLE

SCROLL

Training · live

Edge-2 is training, right now.

A 1.19-billion-parameter foundation model, trained from scratch on Canadian iron at AXE Studio Toronto. Numbers below refresh from JL1 every minute. No mocks, no marketing demos — actual loss values from the live run.

Step of 500,000 · %
Val Loss best
Tokens / s perplexity
ETA to completion
Model · edge-2 Config · chinchilla-v3 Params · 1.19B Train host · JL1 · Toronto Updated ·

/ 01 — What it is

Six systems.
One operating system.

CROWN memory ATLAS data SHIELD auth TOWER policy LENS browsing ECHO inference

CASTLE binds inference, memory, data, identity, policy, and the controlled web into a single operating fabric. The model talks to the ontology. The ontology talks to the data. Every request crosses the same audit boundary in both directions.

Customers stop integrating six vendors. They start operating one system.

/ 02 — The six

Each system earns its place.

/ 01 — InferenceEchoRoutes requests to the right Edge size. Streams responses. OpenAI-compatible API. Built for institutional throughput, not consumer chat.↳ Explore Echo
/ 02 — MemoryCrownInstitutional memory and ontology. Every interaction captured, every decision recallable, every relationship traversable.↳ Explore Crown
/ 03 — DataAtlasStructured store with row-level security. Object storage. Real-time subscriptions. Every byte stays on customer hardware.↳ Explore Atlas
/ 04 — AuthShieldZero-trust authentication across the platform. Every request verified. Nothing past the gateway is uncategorized.↳ Explore Shield
/ 05 — PolicyTowerGranular access control. Role-based and attribute-based, down to individual records and endpoints. Policy is code.↳ Explore Tower
/ 06 — WebLensAI-controlled browser. Navigate, extract, and interact with the web under strict supervision. Every action logged.↳ Explore Lens

/ 03 — Provenance

Audit by default.
Knox.

APPEND-ONLY HASH-LINKED Ed25519 + ML-DSA-65 POST-QUANTUM REPLAYABLE EXPORTABLE

Every hop, every header, every hash is signed and stored append-only. The audit chain reconstructs any decision, in any order, by any reviewer with the right key.

Frontier labs don't track inference-level provenance — consumer users never demanded it. Every regulator AXE will meet does.

/ 04 — Architecture

The deployment shape.

5 layers 6 systems 1 audit chain

Five layers, six systems, one audit chain. Every request enters through the gateway, traverses cognition and knowledge, and leaves a receipt with Knox on the way out.

This is the actual deployment shape — not a marketing abstraction.

KNOX · AUDIT CHAIN — EVERY HOP, EVERY HEADER, EVERY HASH APPEND-ONLY · SIGNED · REPLAYABLE / 01 — CLIENT / 02 — GATEWAY / 03 — COGNITION / 04 — KNOWLEDGE / 05 — SUBSTRATE Browser operator UI · web SDK SDK programmatic access · CI API OpenAI-compatible Shield zero-trust authentication Tower policy & access control Echo · Edge routing  ·  inference  ·  Canadian-trained model edge-1 / edge-pro / edge-flagship Crown memory · ontology Atlas structured store Lens controlled browsing Customer Hardware · Customer Network · Customer Storage on-prem  ·  private cloud  ·  air-gapped  ·  sovereign-by-deployment

/ 05 — Edge

Trained on Canadian iron.
Not API-wrapped.

edge-1 compact edge standard edge-pro server edge-flagship cluster

Every weight learned from scratch on hardware in Canada. One model family, four sizes, one training pipeline. No upstream dependency.

Frontier labs sell tokens. We sell the room the model lives in.

/ 06 — Deploy

On your iron.

Cloud Validation

  • Full-featured cloud deployment
  • Managed database + vector store
  • Auto-scaling inference
  • Dedicated support
  • Production-ready in days

Hybrid Infrastructure

  • Customer hardware + cloud gateway
  • Secure inter-node communication
  • Burst to cloud when needed
  • Phone support
  • Architecture consultation included

Fully Canadian

  • Customer hardware · customer network
  • No external API calls
  • Air-gap capable
  • Premium support · 24/7
  • Custom onboarding + training

/ 07 — The live surface

What it looks like, alive.

MODULE 01

Sovereign Operations Room

Real-time visualization of a sovereign AI platform operating within Canadian jurisdiction. Every request. Every model. Every decision. Under your control.

Canadian
hosting
Zero trust
architecture
Data
sovereignty
Auditable
by design
JURISDICTIONCANADA
DATA RESIDENCY100%

Live Traffic

Requests / s
8,426
Models Active
23
Tokens / s
12.4M
Location
TORONTO, CA
Threats Blocked 24H
3,651
System status OPERATIONAL

MODULE 02

Audit Chain by Design

Every action leaves a verifiable, cryptographically signed trail. Complete transparency for regulators, partners, and your future self.

  • Cryptographic Signatures
  • Immutable Evidence Blocks
  • Full Provenance & Lineage
  • Regulator & Enterprise Ready
2026-05-13 10:21:43.219Z
Receipt
IDa7f3…9c2b
Sourceops-portal
Useroperator_42
J.LewisSIGNED
2026-05-13 10:21:43.231Z
Evidence
Policy Setenterprise_v3
DecisionALLOW
Risk Score8 / 100
J.LewisSIGNED
2026-05-13 10:21:43.452Z
Evidence
Modelaxe-70b-instruct
Routeecho-router-3
Latency142ms
J.LewisSIGNED
2026-05-13 10:21:43.874Z
Evidence
Memory Graphcrown-prod
Results12 chunks
Confidence0.94
J.LewisSIGNED
2026-05-13 10:21:44.105Z
Receipt
Tokens2,531
StatusSUCCESS
Duration884ms
J.LewisSIGNED
2026-05-13 10:21:44.203Z
Block
Block Hash9b66…f4d1
Prev Hash3c2a…7e91
Index7,842,119
J.LewisSIGNED
Chain Verified
All evidence signed
All actions accountable
10:21:43.219Z
REQUEST
TOTAL TIME: 1.004s 10:21:44.223Z
COMMITTED

MODULE 03

Operator Command Surface

Built for operators, SREs, and security teams. Observe, decide, and act with speed and clarity.

  • Model Routing & Performance
  • Memory Retrieval & Context
  • Policy Gates & Risk Signals
  • Decision Evidence & Audit Links
Live Overview 1H
Requests / s
8,426
+12.4%
Error Rate
0.18%
−0.03%
P95 Latency
742ms
−8.2%
Tokens / s
12.4M
+9.1%
09:0010:0011:0012:0013:00
Model Routing
request axe-70b-instruct 42% 742ms
ops-portal axe-coder-33b 28% 612ms
ops-portal axe-embed-3b 18% 120ms
fallback fallback-13b 12% 315ms
Policy Gate
Decision
ALLOW
Risk Score
8/100
Policy Setenterprise_v3
ReasonCompliant with policy
No risk indicators
View Policy Trace →
Decision Evidence
Response ID
a7f3c9e2-b6d1-4f72-9f2a-8d9c2b0a1e77
Model
axe-70b-instruct
Latency
742ms
Tokens In / Out
1,842 / 2,531
Confidence
0.96
View Full Chain →
Memory Retrieval (Crown) crown-prod
Results · 12 Confidence · 0.94
Active Context
Customer: North Sector Ops
User: operator_42
Intent: Threat investigation
Entities: 7
Time range: Last 24h
View Context →
System Health
Castle ComputeOPERATIONAL
Shield PerimeterOPERATIONAL
Tower PolicyOPERATIONAL
Crown MemoryOPERATIONAL
Knox AuditOPERATIONAL
Recent Activity
10:21:44Response delivered
10:21:43Retrieval executed
10:21:43Model routed
10:21:43Policy evaluated
10:21:43Request received
View All Activity →

Software for the rooms that can't use frontier APIs.

Request a Demo → Explore Echo

/ Contact · we read every inquiry

Talk to AXE.

Demos, partnerships, government RFPs, technical questions. A person reads every form. You hear from someone — not a queue.

Inquiry type

Replies within one business day · Knox audit chain records every inquiry