ENDECTA
Contact Sales

Calculations are code, not guesses

Language models hallucinate numbers. Every engineering calculation in Carmkn runs as deterministic code, not AI approximation. The AI decides what to calculate; verified formulas do the math.

NEC Article 220 load calculations with progressive demand factors, dwelling method (220.82), motor loads (430.24), and non-coincident load handling (220.60).

Voltage drop analysis using the full AC impedance formula with conductor-specific values for all conduit materials.

Power flow and short-circuit analysis that models entire building electrical systems.

Every result carries NEC article citations so a Professional Engineer can trace every value.

Your data stays your data

Your project data lives in a database that can be placed on our cloud, your cloud, or your local servers. The application layer connects to wherever you host it.

Your project data is stored in a dedicated database, separate from platform operations.

Database placement is flexible -- Endecta cloud, your cloud provider, or on-premise servers.

Multi-tenant isolation is enforced at the database level with row-level security.

Tenant isolation by default

Multi-tenant isolation is the architecture, not a feature toggle. Every database query is filtered by organization.

Your organization's data is isolated at the database level -- not just the application level.

Each user's file access respects their own permissions from connected systems (Egnyte, OneDrive).

Separate access controls for different roles: admin, power user, viewer, and standard user.

Responsible AI use

Carmkn uses Claude by Anthropic for reasoning. Anthropic's commercial API terms provide zero-day data retention -- your data is not stored by the AI provider.

Zero-day retention on the AI provider's side -- your data is not stored or used for training.

Every response is grounded in your retrieved project documents with source citations -- not general training data.

When the system is uncertain about an answer, it tells you.

SOC 2 Readiness

Organized and preparing for SOC 2 Type II certification across AICPA Trust Service Criteria. Controls are in place; formal audit has not yet been completed.

SOC 2-aligned controls implemented across security, availability, processing integrity, confidentiality, and privacy.

All connections use TLS encryption. All stored data is encrypted at rest via Azure-managed encryption.

Severity-classified incident response plan with documented containment procedures.

Database backups managed by Azure with point-in-time restore. Files are re-processable from your connected source systems.

Access control

Role-based permissions with multi-factor authentication via Azure AD B2C. Organization-scoped access enforced at the database level.

Rate limiting, input validation, and strict cross-origin policies.

Multiple layers of protection between the internet and your data.

File connector controls

When Carmkn connects to your Egnyte, OneDrive, or SharePoint, your admin controls what gets accessed. Read-only by design.

Read-only access -- Carmkn never modifies your files.

Supports .pdf .docx .xlsx .pptx .txt .dwg .rvt .csv .md and more.

Connectors are organization-scoped -- each org manages its own connections.

© 2024 Endecta LLC. All rights reserved. Carmkn can make mistakes so validate all responses. Carmkn executes with Claude (Anthropic).