Publications

Business Continuity

Infinity symbol

Avoid Data Corruption by Switching from Passive Replication to Automated Failover and Recovery

The Connection, by Paden R. Holenstein
Gravic published a use case article, Real-world Use Case: Avoid Data Corruption by Switching from Passive Replication to Automated Failover and Recovery in the January/February issue of The Connection...

Stock photo of server room on fire

Dramatically Reduce Outage Costs with Advanced Business Continuity Solutions

The Connection, by Keith B. Evans
Whether it be fire, power failure, software error, malfeasance, or some other cause, events occur which can lead to unplanned outages of IT services. If your...

Solution word image

Hardware vs. Software Data Replication for Business Continuity (Disk/Cache Flushing vs. Transactional Replication Engines)

The Connection, by Keith B. Evans
Business continuity encompasses activities that an enterprise performs to maintain timeliness, consistency, and availability of its data, operations, and services. Application availability depends upon the ability of IT...

Bank

Major U.K. Bank Migrates its BASE24™ Application to Active/Active for Continuous Availability

The Connection, by Peter Schvarcz and Andrew Baurenschmidt
Gravic recently published the use case article, "Major UK Bank Migrates its BASE24 Application to Active/Active for Continuous Availability" in the November/December issue of The Connection....

Stock photo of business person drawing numerous graphs and formulas on a clear board

Protecting Your Vital Applications

The Connection, by Mark Pollans, HPE Sr. Worldwide Product Manager
This article is based on the excellent and informative presentation that Mr. Pollans gave at the 2017 Connect Technical Boot Camp on how to design and build...

Hacker on computer

Ransomware Protection and Data Recovery

The Connection, by Paden R. Holenstein
Gravic published the article, Ransomware Protection and Data Recovery, in the September/October issue of The Connection, based on our presentation at the recent Connect Technical Boot Camp (TBC). Threats from Malware and...