Wendt1wallet

Jerome Wendt

President and Founder, DCIG, LLC.

Jerome Wendt currently serves as the President and Founder of DCIG, LLC, which he founded in 2007. Mr. Wendt is an avid writer who has written thousands of articles that have appeared in multiple magazines, on-line publications, and websites. Mr. Wendt is recognized as one of the foremost technology analysts in the enterprise data storage and data protection industries. Mr. Wendt covers topics related to enterprise and cloud infrastructures to include all-flash and hybrid arrays, cloud computing, cloud storage, data protection, hyperconverged infrastructures, and software-defined storage (SDS).

Since founding DCIG, Mr. Wendt originated and developed the processes and methodologies that went into the creation of the DCIG Buyer’s Guides. The first DCIG Midrange Array Buyer’s Guide was released in 2010 with millions of copies of the DCIG Buyer’s Guides being distributed worldwide. These Buyer’s Guides have assisted decision makers in properly evaluating and classifying key enterprise data center technologies. The DCIG Buyer’s Guides are widely recognized and used by information technology professionals who view them as the “go-to” source if looking to understand where a product best fits in their enterprise infrastructure.

Prior to founding DCIG, Mr. Wendt served as storage engineer working for First Data Corp. He also has written and contributed to leading publications to include ComputerWorld, InfoStor, IT Central Station, SearchStorage.com, and Storage Magazine, among others. He earned a bachelor’s degree in Computer Information Systems in 1995 from Washburn University (Topeka, KS) and a bachelor’s degree in Theology in 1990 from Ambassador University (now merged with Azusa Pacific University) in Pasadena, CA. More recently, Mr. Wendt was certified as an Amazon Cloud Solutions Architect. When away from work, he enjoys bowling, camping, fishing and playing Sudoku.

Lastest Posts By Jerome Wendt

Four New Requirements for Modern Backup Software Solutions

All enterprises contain multiple applications, databases, operating systems, hypervisors, and data types in their data centers. As such, enterprises minimally expect any modern backup software solution to protect those items. However, protecting them only scratches the surface of the needs that enterprises expect modern backup software solutions to meet.

Read More

Upcoming Webinar Examining How to Validate Your DR Plan Against Modern Cyberthreats

Phishing, malware, ransomware, and DDoS attacks have captured the attention of organizations of all sizes across the globe. The prevalence of these attacks has forced organizations to acknowledge that it is a matter of when, not if, they experience one. Due to their likelihood of occurring, organizations must take action to prevent the attack from becoming a disaster. To discuss how organizations can best prepare, I am joining a panel that includes cybersecurity and DR representatives from Acronis on an upcoming DRJ.com webinar.

Read More

Three New Evaluation Criteria for VMware vSphere Backup Software

In the last 20 years, VMware vSphere has expanded from a nascent technology to a staple of data centers worldwide. Right alongside it, backup software that protects applications and data hosted on vSphere virtual machines (VMs) has experienced similar growth. Now as vSphere backup software enters its third decade of existence, new criteria exist for evaluating and selecting these solutions.

Read More

TOP 5 Questions to Ask a VMware vSphere Backup Solution Provider

Selecting the best solution for any project, regardless of what it is, starts with asking the right questions. To select the best VMware vSphere backup solution, the process is the same. Begin with a list of questions to ask the provider. These represent the TOP 5 questions organizations should ask to identify the best vSphere backup solution for their environment.

Read More

Kubernetes Environment Maturity Influences Backup Choice

One can almost feel the buzz around Kubernetes. Most enterprises plan to implement cloud-native architectures in the coming years using Kubernetes as a foundational technology to do so. As enterprises move down this path, they must protect both their Kubernetes environment and the applications and data in it. Selecting the right backup solution to perform these tasks may well hinge upon the maturity of one’s Kubernetes environment.

Read More