was successfully added to your cart.
All Posts By

Jerome M. Wendt

A More Elegant (and Affordable) Approach to Nutanix Backups

By | Backup Appliance, Data Protection, Data Reduction, Deduplication, Disaster Recovery | No Comments

One of the more perplexing challenges that Nutanix administrators face is how to protect the data in their Nutanix deployments. Granted, Nutanix natively offers its own data protection utilities. However, these utilities leave gaps that enterprises are unlikely to find palpable when protecting their production applications. This is where Comtrade Software’s HYCU and ExaGrid come into play as their combined solutions provide a more affordable and elegant approach to protecting Nutanix environments.

Read More

The Five (and soon to be Six) Classifications of All-flash Arrays

By | All-Flash Array, Solid State Storage Flash Memory, Solid state storage Flash Memory SSD, Storage Systems | No Comments

The all-flash array market has settled down considerably in the last few years. While there are more all-flash arrays (90+ models) and vendors (20+) than ever before, the ways in which these models can be grouped and classified has also become easier. As DCIG looks forward to releasing a series of Buyer’s Guides covering all-flash arrays in the coming months, it can break these all-flash arrays into five (and soon to be six) general classifications based upon their respective architectures and use cases.

Read More

Differentiating between the Dell EMC Data Domain and ExaGrid EX Systems

By | Backup Appliance, Data Protection, Deduplication | No Comments

Deduplication backup target appliances remain a critical component of the data protectioninfrastructure for many enterprises. While storing protected data in the cloud may be fine for very small businesses or even as a final resting place for enterprise data, deduplication backup target appliances continue to function as their primary backup target and primary source for recovering data. It is for these reasons that enterprises frequently turn to deduplication backup target appliances from Dell EMC and ExaGrid to meet these specific needs that are covered in recent DCIG Pocket Analyst Report.

Read More

Glitch is the Next Milestone in Recoveries

By | Business Continuity, Cloud, Continuous Data Protection, Data Protection, Disaster Recovery, Disaster Recovery High Availability Clustering | No Comments

No business – and I mean no business – regardless of its size ever wants to experience an outage for any reason or duration. However, to completely avoid outages means spending money and, in most cases, a lot of money. That is why, when someone shared with me earlier this week, that one of their clients has put in place a solution that keeps their period of downtime to what appears as a ‘glitch’ to their end-users for nominal cost, it struck a chord with me.

Read More

Five Ways to Measure Simplicity on All-flash Arrays

By | All-Flash Array, Fibre Channel, SSD, Storage Systems | No Comments

Simplicity is one of those terms that I love to hate. On one hand, people generally want the products that they buy to be “simple” to deploy and manage so they can “set them and forget them.” The problem that emerges when doing product evaluations, especially when evaluating all-flash arrays(AFAs), is determining what features contribute to making AFAs simple to deploy and manage. The good news is that over the last few years five key features have emerged that organizations can use to measure the simplicity of an AFA to select the right one for their environment.

Read More

Nuancing the Management of HCI Deployments

By | DCIG, Hyper-converged | No Comments

When one examines enterprise data protection and data storage products through the lens of hyper-converged infrastructure (HCI) designs, one would think each product either supports an HCI architecture or it does not. But as one begins to see when one scrutinizes this topic, the answer is not a simple “Yes” or “No”. Nuancing how well or if a product fits into an HCI design, one first needs to think about the question or even the series of questions that he or she should ask to properly make this assessment.

Read More

2017 Reflects the Tipping Point in IT Infrastructure Design and Protection

By | Business Continuity, Data Protection, Hyper-converged | One Comment

At the end of the year people naturally reflect on the events of the past year and look forward to the new. I am no different. It is as I reflect on the past year and look ahead on how IT infrastructures within organizations have changed and will change, 2017 has been as transformative as any year in the past decade if not the past 50 years. While that may sound presumptuous, 2017 seems to be the year that reflects the tipping point in how organizations will build out and protect their infrastructures going forward.

Read More

Viewing the World through the Lens of Hyper-converged Infrastructures

By | DCIG | No Comments

Every organization, consciously or unconsciously, views and evaluates new technologies through a lens. In recent years, they have largely evaluated new data center technologies in the context of virtualization and how easily it enabled them to achieve that end. That viewpoint has begun to change. Having largely virtualized their infrastructure, they increasingly view and evaluate new and existing data center technologies through the lens of hyper-converged infrastructures and how well these technologies support and enable the adoption hyper-converged infrastructure platforms in their environment.

Read More

Defensible Data is the Goal

By | Buyer's Guides, Pocket Analyst Report | No Comments

Individuals occasionally reach out to DCIG and allege that certain data found in DCIG publications is, from their perspective, “incorrect.” While I appreciate the time and effort that individuals take to review data found in the various DCIG publications and provide feedback on it, viewing any data present in any analyst publication – be it from DCIG or otherwise – as either “right” or wrong” is the larger premise that one should consider. While DCIG always does its best to follow established, internal processes to ensure that the data it publishes reflects the actual capabilities of the products it covers, DCIG’s broader objective is to publish defensible data.

Read More

Dell EMC VxRail vs Nutanix NX: Eight Key HCIA Differentiators

By | Converged Infrastructure, Hyper-converged | No Comments

Hyper-converged infrastructure appliances (HCIAs) radically simplify the next generation of data center architectures. Combining and/or virtualizing compute, memory, stor­age, networking, and data protection func­tions from a single vendor in a scale-out cluster, these pre-integrated appliances accelerate and simplify infrastructure deploy­ments and management. As such, the stakes are high for Dell EMC and Nutanix who are competing to own this critical piece of data center infrastructure real estate.

Read More

Comtrade Software goes beyond AHV, Adds ESX Support

By | Data Protection, Virtualization | No Comments

Every vendor new to a market generally starts by introducing a product that satisfies a niche to gain a foothold in that market. Comtrade Software exemplified this premise by earlier this year coming to market with its HYCU software that targets the protection of VMs hosted on the Nutanix AHV hypervisor. But to grow in a market, especially in the hyper-competitive virtual machine (VM) data protection space, one must expand to protect all market-leading hypervisors. Comtrade Software’s most recent HYCU release achieves that goal with its new support for VMware ESX.

Read More

VMware vSphere and Nutanix AHV Hypervisors: A Head-to-Head Comparison

By | Hyper-converged, Software Defined Storage Software, Virtualization | No Comments

Many organizations view hyper-converged infrastructure appliances (HCIAs) as foundational for the cloud data center architecture of the future. However, as part of an HCIA solution, one must also select a hypervisor to run on this platform. The VMware vSphere and Nutanix AHV hypervisors are two common choices but key differences between them persist.

Read More

A Modern Day IT Reformation is Underway

By | DCIG | No Comments

As human beings we have a proclivity to believe that whatever it is we as an individual or as a society experience, we are the first to go through an event like it. By way of example, corporate IT is undergoing a transformation as enterprises change IT to better align it with the broader business. Ironically, this IT reformation takes place on the 500th anniversary of a more well-known reformation that occurred in 1517.

Read More

Data Center Efficiency, Performance, Scalability: How Dell EMC XtremIO, Pure Storage Flash Arrays Differ

By | All-Flash Array, Deduplication, Flash Memory, Pocket Analyst Report, SSD Storage Systems, Storage Systems | No Comments

Hybrid and all-disk arrays still have their place in enterprise data centers but all-flash arrays are “where it’s at” when it comes to hosting and accelerating the performance of production applications. Once reserved only for applications that could cost-justify these arrays, continuing price erosion in the underlying flash media coupled with technologies such as compression and deduplication have put these arrays at a price point within reach of almost any size enterprise. As that occurs, all-flash arrays from Dell EMC XtremIO and Pure Storage are often on the buying short lists for many companies. Those companies considering these two products can turn to a recent DCIG Pocket Analyst Report that compares these two products to help them make an informed buying decision.

Read More

Deduplication Still Matters in Enterprise Clouds as Data Domain and ExaGrid Prove

By | Backup Appliance, Data Protection, Data Reduction, DCIG, Deduplication, Disaster Recovery, Disk Based Backup, Pocket Analyst Report | No Comments

DCIG Pocket Analyst Report Compares Dell EMC Data Domain and ExaGrid Product Families

Technology conversations within enterprises increasingly focus on the “data center stack” with an emphasis on cloud enablement. While I agree with this shift in thinking, one can too easily overlook the merits of underlying individual technologies when only considering the “Big Picture”. Such is happening with deduplication technology. A key enabler of enterprise archiving, data protecton, and disaster recovery solutions, vendors such as Dell EMC and ExaGrid deliver deduplication technology in different ways as DCIG’s most recent 4-page Pocket Analyst Report reveals that makes each product family better suited for specific use cases.

Read More

DCIG Quick Look: Comtrade HYCU Dives Deeper into the Nutanix Backup Pool

By | DCIG | One Comment

Comtrade Software’s release of HYCU backup software a few months ago validated that Nutanix’s impact on the enterprise data center was real as HYCU specifically targets Nutanix environments. But one release does not a product make. That’s what makes Comtrade’s follow-on announcement notable. HYCU’s expanded support for more applications and cloud solutions, addition of new encryption features, and tweaks to more quickly complete backups reflect Comtrade’s commitment to diving deeper into the protection of Nutanix AOS environments.

Read More

Veritas Delivering on its 360 Data Management Strategy While Performing a 180

By | Business Continuity, Cloud, Cloud Computing, Cloud Storage, Data Protection, Deduplication | No Comments

Vendors first started bandying about the phrase “cloud data management” a year or so ago. While that phrase caught my attention, specifics as what one should expect when acquiring a “cloud data management” solution remained nebulous at best. Fast forward to this week’s Veritas Vision 2017 and I finally encountered a vendor that was providing meaningful details as to what cloud data management encompasses while simultaneously performing a 180 behind the scenes.

Read More

Ransomware Possesses Three Techniques to Turn “Good” Backups Bad

By | Data Protection | One Comment

The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing up your data no longer provides an absolute guarantee that you can recover from a ransomware attack. Here are three techniques that ransomware may use to circumvent existing backups and make your “good” backups bad.

Read More

VMware Shows New Love for Public Clouds and Containers

By | Cloud, Cloud Storage, Private Cloud, Virtualization | No Comments

In recent months and years, many have come to question VMware’s commitment to public clouds and containers used by enterprise data centers (EDCs). No one disputes that VMware has a solid footprint in EDCs and that it is in no immediate danger of being displaced. However, many have wondered how or if it will engage with public cloud providers such as Amazon as well as how it would address threats posed by Docker. At VMworld 2017, VMware showed new love for these two technologies that should help to alleviate these concerns.

Read More

The End Game for Cloud Data Protection Appliances is Recovery

By | Backup Appliance, Buyer's Guides, Cloud, Cloud Storage, Data Protection, DCIG, Disaster Recovery | No Comments

The phrase “Cloud Data Protection Appliance” is included in the name of DCIG’s forthcoming Buyer’s Guide but the end game of each appliance covered in that Guide is squarely on recovery. While successful recoveries have theoretically always been the objective of backup appliances, vendors too often only paid lip service to that ideal as most of their new product features centered on providing better means for doing backups. Recent technology advancements have flipped this premise on its head.

Read More
image_pdfimage_print