Resilience
A multi-megawatt solar array does not keep a data center alive. A multi-megawatt-hour battery does not keep a critical facility online. Resilience is the architecture, the controls, and the operational discipline that turns components into uptime.
For mission-critical facilities — federal installations, hyperscale data centers, crypto and HPC operations, and IPP-owned generation — the question is never whether the array produces the rated power on a clear day. The question is whether the facility stays online when the grid goes down, when one of two transformers fails, when a fire suppression event takes a string of batteries offline, or when a control loop detunes after a firmware update.
Those are architecture questions. They get answered up-front, in the resilience phase of the delivery model — or they get answered the wrong way, at 3 AM, by an operator with a phone in one hand and a paper one-line in the other.
Aurevia engineers the architecture so the second scenario doesn't happen.
Every Aurevia microgrid project is architected around six resilience capabilities. The components — solar inverters, BESS containers, switchgear, controls — are selected to deliver against these capabilities, not the other way around.
Seamless transition from grid-tied to islanded operation when the utility source fails or is intentionally disconnected. The facility continues to operate without dropping load. Reconnection is managed through synchronization control, not manual intervention.
Engineering InputsUtility tie point characterization · Anti-islanding protection coordination · Sync-check relay architecture · Load shedding plan
The microgrid can re-energize itself from a fully de-energized state without external power. BESS-as-grid-former architecture provides the voltage and frequency reference; supplemental generation and solar synchronize behind it.
Engineering InputsGrid-forming inverter selection · BESS state-of-charge planning · Block-loading sequence · Auxiliary power for switchgear
During constrained operation, mission-critical loads stay online; non-essential loads shed in tiers. The prioritization logic is engineered into the microgrid controller, not negotiated during the event. Acceptance test verifies the prioritization works under simulated stress.
Engineering InputsFacility load survey by criticality tier · Sheddable load identification · Controller logic verification · Acceptance test scenarios
Critical equipment is identified and either redundantly provisioned, gracefully degradable, or rapidly replaceable depending on cost-benefit. SPOF analysis is documented as a deliverable so the customer can verify the redundancy posture matches the mission requirement.
Engineering InputsSPOF register · Redundancy posture per component · Spares strategy · Mean time to repair targets
For islanded operation through extended grid-down events, the BESS state-of-charge reserve, supplemental fuel inventory, and solar yield assumptions are modeled together. Operating envelopes are defined so the facility knows how long it can run independently under stated load and weather assumptions.
Engineering InputsOutage duration scenarios · BESS reserve policy · Fuel inventory and refill logistics · Weather sensitivity analysis
Resilience against cyber events sits alongside resilience against physical events. SCADA, microgrid controller, and inverter communications are segmented, access-controlled, and logged. Patch management is part of the operations plan, not a future agenda item.
Engineering InputsNetwork segmentation design · Access control policy · Patch management plan · Audit logging architecture
We'll walk through the resilience architecture appropriate for your mission requirements before talking about MW or MWh.
Discuss Your Project