Patents by Inventor James Thomas Kost
James Thomas Kost has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11882094Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: GrantFiled: June 15, 2021Date of Patent: January 23, 2024Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11636207Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: GrantFiled: March 22, 2022Date of Patent: April 25, 2023Assignee: COBALT IRON, INC.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20220215096Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: ApplicationFiled: March 22, 2022Publication date: July 7, 2022Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11308209Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: GrantFiled: January 18, 2019Date of Patent: April 19, 2022Assignee: Cobalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11212304Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions for indications of an attack in a computer network, determine a change in the at least one of metrics, events, and conditions in the computer network, detect the attack in the computer network based on the change in the at least one of metrics, events, and conditions in the computer network, analyze the at least one of metrics, events, and conditions in the computer network and determine that at least one hardware device has been infected, restrict access to the at least one hardware device that has been infected, and generate a copy of data that was created before the attack and associated with the at least one hardware device that has been infected.Type: GrantFiled: January 18, 2019Date of Patent: December 28, 2021Assignee: COBALT IRON, INC.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
-
Publication number: 20210314295Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: ApplicationFiled: June 15, 2021Publication date: October 7, 2021Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 11063907Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: GrantFiled: January 18, 2019Date of Patent: July 13, 2021Assignee: COBALT IRON, INC.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Patent number: 10891200Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions in a computer network, under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network, detect that one of a condition and an event has occurred in the computer network, automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, collect the second level of data from the at least one hardware device, and store the second level of data obtained from the at least one hardware device.Type: GrantFiled: January 18, 2019Date of Patent: January 12, 2021Assignee: Colbalt Iron, Inc.Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
-
Publication number: 20200236085Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20200236121Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions for indications of an attack in a computer network, determine a change in the at least one of metrics, events, and conditions in the computer network, detect the attack in the computer network based on the change in the at least one of metrics, events, and conditions in the computer network, analyze the at least one of metrics, events, and conditions in the computer network and determine that at least one hardware device has been infected, restrict access to the at least one hardware device that has been infected, and generate a copy of data that was created before the attack and associated with the at least one hardware device that has been infected.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
-
Publication number: 20200233959Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
-
Publication number: 20200233754Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions in a computer network, under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network, detect that one of a condition and an event has occurred in the computer network, automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, collect the second level of data from the at least one hardware device, and store the second level of data obtained from the at least one hardware device.Type: ApplicationFiled: January 18, 2019Publication date: July 23, 2020Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost