Juchen Technology - Industrial Cloud Computing & AI Integrated Solutions Provider

Client Cases They chose Juchen

Taiyuan Iron and Steel Group

Customer Introduction


Taiyuan Iron and Steel (Group) Co., Ltd., abbreviated as TISCO Group, is a super large steel joint venture in China. TISCO Group has the ability to produce 12 million tons of steel annually and is a global leader in stainless steel. TISCO Group is committed to the research and development, production, and processing of stainless steel, special steel, and advanced carbon steel, forming an efficient, energy-saving, and long-lasting product cluster mainly composed of stainless steel, cold-rolled silicon steel, and high-strength series steel. Key products are widely applied in key fields and emerging industries such as petroleum, chemical, shipbuilding, railway, automobile, nuclear power, aerospace, etc.




Faced with challenges


,the physical machine operation and maintenance costs are high: local computers and industrial control computers need to maintain industrial software and troubleshoot one by one, resulting in low operation and maintenance efficiency; Frequent device compatibility issues can easily lead to business interruptions and affect production progress.

Information security risks are severe: production data, process parameters, and other key information are scattered and stored on local terminals, lacking unified protection; Terminals are susceptible to virus and malware intrusion, posing risks to data security and damaging the core competitiveness of enterprises.

Equipment operation and maintenance efficiency is low: Production equipment operates under high load for a long time, and manual inspections are difficult to grasp the status in real time, making it difficult to detect potential faults in a timely manner; After a sudden equipment malfunction, troubleshooting and maintenance take a long time, increasing maintenance costs and causing long-term downtime.



Solution


In response to the many challenges previously faced by Taiyuan Iron and Steel Control Center, Juchen Industrial Cloud Desktop System provides an integrated solution. This solution adopts hyper fusion technology to centrally manage the computing and data resources of industrial data centers. Through distributed storage technology, the underlying server hardware resources are virtualized to build a unified cluster resource pool, which flexibly allocates computing and storage resources for business systems and greatly improves resource utilization.

Deploy a cloud desktop cluster architecture in the central control center, combined with a multi replica mechanism, to ensure stable system operation. Thin terminals connect to displays through interfaces, replacing traditional industrial computers and achieving unified operation and maintenance management of underlying hardware and business systems. They can monitor device operating status and resource utilization in real time, and allocate resources in a timely manner. At the same time, leveraging the centralized control advantage of cloud desktop systems, unified application installation, system patch updates, and other operations are carried out, significantly improving operation and maintenance efficiency and ensuring the efficient and stable operation of Taiyuan Iron and Steel's centralized control center.



Customer revenue


Resource utilization rate improvement: cluster resource pool breaks down resource barriers, hardware resources are flexibly allocated according to demand, solving the problem of resource idle and tight coexistence, reducing hardware procurement and maintenance costs.

Operation and maintenance efficiency improvement: Cloud desktop cluster+multi replica mechanism ensures stable operation of business 24/7, reducing the risk of failure and downtime; Thin terminals replace industrial computers to achieve unified operation and maintenance, remote monitoring, and centralized processing of system updates, reducing manpower investment.

Information security upgrade: data is stored in a hyper converged cluster, combined with encryption technology and security protection management, to avoid data leakage caused by local terminal virus attacks and hardware damage, and to build a strong security defense line.


Relevant cases

View more

+