President and Founder, DCIG, LLC.

jerome wendtJerome Wendt currently serves as the President and Founder of DCIG, LLC, which he founded in 2007. Mr. Wendt is an avid writer who has written thousands of articles that have appeared in multiple magazines, on-line publications, and websites. Mr. Wendt is recognized as one of the foremost technology analysts in the enterprise data storage and data protection industries. Mr. Wendt covers topics related to enterprise and cloud infrastructures to include all-flash and hybrid arrays, cloud computing, cloud storage, data protection, hyperconverged infrastructures, and software-defined storage (SDS).

Since founding DCIG, Mr. Wendt originated and developed the processes and methodologies that went into the creation of the DCIG Buyer’s Guides. The first DCIG Midrange Array Buyer’s Guide was released in 2010 with millions of copies of the DCIG Buyer’s Guides being distributed worldwide. These Buyer’s Guides have assisted decision makers in properly evaluating and classifying key enterprise data center technologies. The DCIG Buyer’s Guides are widely recognized and used by information technology professionals who view them as the “go-to” source if looking to understand where a product best fits in their enterprise infrastructure.

Prior to founding DCIG, Mr. Wendt served as storage engineer working for First Data Corp. He also has written and contributed to leading publications to include ComputerWorld, InfoStor, IT Central Station, SearchStorage.com, and Storage Magazine, among others. He earned a bachelor’s degree in Computer Information Systems in 1995 from Washburn University (Topeka, KS) and a bachelor’s degree in Theology in 1990 from Ambassador University (now merged with Azusa Pacific University) in Pasadena, CA. More recently, Mr. Wendt was certified as an Amazon Cloud Solutions Architect. When away from work, he enjoys bowling, camping, fishing and playing Sudoku.

Latest Posts

Analytics, Microservices and Scalable Storage Finding Their Way onto Backup Appliances

Companies of all sizes pay more attention to their backup and recovery infrastructure than perhaps ever before. While they still rightfully prioritize their production infrastructure over their backup one, companies seem to recognize and understand that can use backups as more than just insurance policies to recover their production data. This is resulting in cutting edge innovations such as analytics, microservices, and scalable storage finding their way into backup solutions in general and backup appliances specifically.

0 comments

Make the Right Choice between Scale-out and Scale-up Backup Appliance Architectures

Companies are always on the lookout for simpler, most cost-effective methods to manage their infrastructure. This explains, in part, the emergence of scale-out architectures over the last few years as a preferred means for implementing backup appliances. It is as scale-out architectures gain momentum that it behooves companies taking a closer look at the benefits and drawbacks of both scale-out and scale-up architectures to make the best choice for their environment.

0 comments

DCIG Introduces Two New Offerings in 2019

DCIG often gets so busy covering all the new and emerging technologies in multiple markets that we can neglect to inform our current and prospective clients of new offerings that DCIG has brought to market. Today I address this oversight.

0 comments

The New Need to Create a Secondary Perimeter to Detect for Malware’s Presence

Malware – and specifically ransomware – tends to regularly make headlines with some business somewhere in the world reporting having its data encrypted by it. Due to this routine occurrence, companies need to acknowledge that their standard first line defenses such as cybersecurity and backup software no longer completely suffice to detect malware. To augment these defenses, companies need to take new steps to shore up these traditional defenses which, for many, will start with creating a secondary perimeter around their backup stores to detect the presence of malware.

0 comments