APQ IPC Manager

  • APQ IPC Manager
  • APQ IPC Manager 2
  • APQ IPC Manager 3
  • APQ IPC Manager 4
  • APQ IPC Manager 5

Platform based operation and maintenance, application integration, and centralized equipment operation and maintenance management

Monitoring the health status of equipment and preventing faults instead of repairing them

Analyze operation and maintenance data to form a dynamic knowledge base

Multi platform compatibility: Windows, Linux, Android

  • Condition Monitoring
  • Equipment Debugging
  • Data Backup
  • Remote Control
  • Abnormal Event Reporting
  • Batch Maintenance
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy 2
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy 3
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy 4
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy 5
  • Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Comprehensive Detection Strategy

    The system has a comprehensive detection strategy configuration, including: CPU load exceeding threshold, CPU temperature exceeding threshold, memory occupancy exceeding threshold, insufficient disk space, and disk S M. A.R.T. anomalies, network anomalies, motherboard temperature, software startup, and other events.

    Timely and effective detection of equipment abnormalities, improving operational efficiency

    Comprehensive Detection Strategy 6
  • Supervise

    Real Time Monitoring

    Remote real-time monitoring of equipment

    Historical Data Tracing

    Tracing of equipment historical data and operation and maintenance data

    Device Alarm Notification

    Equipment anomaly warning

    Mobile Maintenance

    Mobile APP

  • Supervise

    Real Time Monitoring

    Remote real-time monitoring of equipment

    Historical Data Tracing

    Tracing of equipment historical data and operation and maintenance data

    Device Alarm Notification

    Equipment anomaly warning

    Mobile Maintenance

    Mobile APP

  • Supervise

    Real Time Monitoring

    Remote real-time monitoring of equipment

    Historical Data Tracing

    Tracing of equipment historical data and operation and maintenance data

    Device Alarm Notification

    Equipment anomaly warning

    Mobile Maintenance

    Mobile APP

  • Supervise

    Real Time Monitoring

    Remote real-time monitoring of equipment

    Historical Data Tracing

    Tracing of equipment historical data and operation and maintenance data

    Device Alarm Notification

    Equipment anomaly warning

    Mobile Maintenance

    Mobile APP

Software Architecture

Apply SaaS Layer

APQ Operation and maintenance system
  • Equipment monitoring
  • Efficiency analysis
  • Data modeling
  • Product Traceability
  • Cost Analysis
  • Equipment monitoring
  • Efficiency analysis
  • Data modeling
  • Product Traceability
  • Cost Analysis
Workshop Screen WeChat Enterprise Account/Mini Program
Standard Restful API

Platform Layer

APQ IoT platform
  • Device authentication
  • Device access
  • Equipment monitoring
  • Equipment management
  • Application management
  • Cloud API
  • IT Operation Management
  • Lifecycle management
  • Object Model Definition
  • Rule engine
  • Firmware update
  • ......
Standard protocols: HTTP/MQTT/CoAP

Network Transport Layer

soft soft

APQ Edge Gateway

Internet / 2G / 3G / 4G / 5G, NB-loT

WIFI / LoRa / Zigbee / Sigfox

Network Transport Layer

soft soft soft soft soft soft soft
soft soft soft soft soft soft

Supports two methods of cloud deployment and local deployment

Deploy the operation and maintenance platform to provide unified monitoring, unified operation and maintenance management, and other functions
Center End

In order to simplify network deployment configuration, additional local message forwarding services will be deployed within each subnet of the project site.

On the IPC deployed by the visual analysis system of each machine on site, deploy the Agent to complete the IPC's own control execution and attribute event collection.

Optional software gateway for protocol adaptation, private API conversion, and access to various sub devices.

Service