For review & sharing

Architecture Directory

Every section of the architecture, as a direct link. Copy the exact link a reviewer needs and drop it into the thread — no page-hunting. Each link opens straight to the section, scrolled into view.

Patient Simulation TrainingReal-time voice · STT → LLM → TTS
Overview
What this use case is
Interaction pipeline
Architecture highlights
Platform capabilities
Cloud Architecture
Cloud architecture diagram
Deployment Models
All deployment models
Standard CloudRecommended
HybridBalanced
Self-HostedMaximum Control
Full security architecture
Layer 1 — Perimeter Security
Layer 2 — Network Security
Layer 3 — Identity & Access
Layer 4 — Data Protection
Layer 5 — AI Governance & Application
Layer 6 — Monitoring & Audit
User Lifecycle
Full user lifecycle
Phase 1 — Discovery & Frontend DeliveryAll Use Cases
Phase 2 — Authentication & SSOAll Use Cases
Phase 3 — Workspace & Agent ProvisioningAll Use Cases
Phase 4A — Real-Time Patient SimulationPatient Simulation
Phase 5A — Patient Communication AssessmentPatient Simulation
Phase 7 — Data Persistence & AuditAll Use Cases
Workplace Conduct TrainingReal-time voice · STT → LLM → TTS
Overview
What this use case is
Interaction pipeline
Architecture highlights
Platform capabilities
Cloud Architecture
Cloud architecture diagram
Deployment Models
All deployment models
Standard CloudRecommended
HybridBalanced
Self-HostedMaximum Control
Full security architecture
Layer 1 — Perimeter Security
Layer 2 — Network Security
Layer 3 — Identity & Access
Layer 4 — Data Protection
Layer 5 — AI Governance & Application
Layer 6 — Monitoring & Audit
User Lifecycle
Full user lifecycle
Phase 1 — Discovery & Frontend DeliveryAll Use Cases
Phase 2 — Authentication & SSOAll Use Cases
Phase 3 — Workspace & Agent ProvisioningAll Use Cases
Phase 5B — Workplace Conduct AssessmentWorkplace Conduct
Phase 7 — Data Persistence & AuditAll Use Cases
Feedback EvaluationAsync analysis · Transcript → LLM → PDF
Overview
What this use case is
Interaction pipeline
Architecture highlights
Platform capabilities
Cloud Architecture
Cloud architecture diagram
Deployment Models
All deployment models
Standard CloudRecommended
HybridBalanced
Self-HostedMaximum Control
Full security architecture
Layer 1 — Perimeter Security
Layer 2 — Network Security
Layer 3 — Identity & Access
Layer 4 — Data Protection
Layer 5 — AI Governance & Application
Layer 6 — Monitoring & Audit
User Lifecycle
Full user lifecycle
Phase 1 — Discovery & Frontend DeliveryAll Use Cases
Phase 2 — Authentication & SSOAll Use Cases
Phase 3 — Workspace & Agent ProvisioningAll Use Cases
Phase 4C — Feedback Session RecordingFeedback Evaluation
Phase 5C — Async Transcript AnalysisFeedback Evaluation
Phase 7 — Data Persistence & AuditAll Use Cases