Login

FAQ

AICOM® (Artificial Intelligence Cloud Optimization Management) is an intelligent cloud management platform built for modern enterprises. By unifying asset management, cost optimization, cloud governance, security operations, and access control, AICOM® empowers organizations to achieve operational excellence and accelerate digital transformation. Through its intuitive interface, dynamic visual reporting, and robust permission management, AICOM® establishes a transparent, secure, and high-performance cloud operations framework.

AICOM® is specifically designed to address major challenges in cloud management, including cloud resource analysis, billing management, and user access control.

AICOM® provides powerful functionalities, including:

  1. Integrated One-Stop Management: Comprehensive cloud management services covering all aspects of resource allocation and monitoring.
  2. Cloud Cost Management: Real-time expenditure monitoring for precise cost control and optimization.
  3. Cloud Resource Management: Efficient allocation and scheduling of resources to ensure optimal performance.
  4. Secure User Management: Enhanced user authentication and access control to boost security.

AICOM® is specifically designed to address three critical cloud management challenges:

  • Cost Complexity: Unify multi-cloud billing for total budget transparency.
  • Resource Inefficiency: Identify underutilized assets and optimize cloud resource allocation.
  • Operational Disruptions: Ensure business continuity with the support of our technical experts and AI-driven services.

If you forget your AICOM® password, follow these steps:

  1. Visit the AICOM® login page.
  2. Click the “Forgot Password” link.
  3. Enter your account or registered email address.
  4. Follow the instructions in the email to reset your password.

To update your account information:

  1. Log in to the AICOM® platform.
  2. After entering the homepage, click on your profile picture in the top-right corner to edit personal information, change your password, or add multi-factor authentication.
  3. Edit the necessary details and save the changes.

Admins can add or remove users by following these steps:

  1. Log in to the AICOM® platform and go to the User Management page.
  2. Click Group Overview to predefine appropriate group permissions for new users.
  3. Select User Overview, add a new user, and enter their email information.
  4. To remove a user, select the target user, click Edit, and update their status.
  5. Save the changes to complete the process.

When a new user is added:

  1. They will receive a system email titled [AICOM®] New User Account Notification, containing their login UUID, default account, and password.
  2. Upon first login, they will need to complete basic setup, including personal information, login account, and password.
  3. Note: The initial login account can be modified once and will serve as their future account.

To access reports generated by AICOM®:

  1. Log in to the AICOM® platform.
  2. Navigate to Billing Center > Cost Analysis.
  3. Select the desired date range and apply filters, such as account, region, and service.
  4. Click Apply Filters.
  5. Once the data and charts are generated, click Export to save the report to your device.

To bind a cloud resource account:

  1. Log in to the AICOM® platform.
  2. Go to User Center > Cloud Resource Account Binding.
  3. Click Add to start adding a role ARN.
  4. (Recommended) Copy the external ID, click Bind Now, and follow the steps. Refer to the User Manual > ARN Cross-Account Access for guidance.
  5. Paste the role ARN link and complete the naming process.
  6. Click Add to finish the binding.
  7. AICOM® will update resource collection according to the service update schedule.
Note: Nextlink uses AWS CloudFormation stack technology to automatically generate a credential with “Read-only Access” permissions. This means that once this credential is linked to your account, it will only have read access to data and will not be able to modify or expand any permissions on your account. More specifically, this “Read-only Access” credential will not allow users or applications to access the operating system (OS) or database, so you don’t need to worry about this credential posing any unnecessary risks or changes to your system or data. This setup is designed to ensure high security and data protection, while also allowing users to effectively manage and monitor their resources in the cloud environment.