Patents by Inventor James Thomas Kost

James Thomas Kost has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11882094
    Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.
    Type: Grant
    Filed: June 15, 2021
    Date of Patent: January 23, 2024
    Assignee: Cobalt Iron, Inc.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Patent number: 11636207
    Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.
    Type: Grant
    Filed: March 22, 2022
    Date of Patent: April 25, 2023
    Assignee: COBALT IRON, INC.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Publication number: 20220215096
    Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.
    Type: Application
    Filed: March 22, 2022
    Publication date: July 7, 2022
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Patent number: 11308209
    Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: April 19, 2022
    Assignee: Cobalt Iron, Inc.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Patent number: 11212304
    Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions for indications of an attack in a computer network, determine a change in the at least one of metrics, events, and conditions in the computer network, detect the attack in the computer network based on the change in the at least one of metrics, events, and conditions in the computer network, analyze the at least one of metrics, events, and conditions in the computer network and determine that at least one hardware device has been infected, restrict access to the at least one hardware device that has been infected, and generate a copy of data that was created before the attack and associated with the at least one hardware device that has been infected.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: December 28, 2021
    Assignee: COBALT IRON, INC.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
  • Publication number: 20210314295
    Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.
    Type: Application
    Filed: June 15, 2021
    Publication date: October 7, 2021
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Patent number: 11063907
    Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: July 13, 2021
    Assignee: COBALT IRON, INC.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Patent number: 10891200
    Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions in a computer network, under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network, detect that one of a condition and an event has occurred in the computer network, automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, collect the second level of data from the at least one hardware device, and store the second level of data obtained from the at least one hardware device.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: January 12, 2021
    Assignee: Colbalt Iron, Inc.
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
  • Publication number: 20200233754
    Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions in a computer network, under normal operating conditions in the computer network, obtain a first level of data from at least one hardware device in the computer network, detect that one of a condition and an event has occurred in the computer network, automatically transmit an instruction to modify the first level of data obtained from the at least one hardware device to a second level of data more robust than the first level of data when one of the condition and the event has occurred, collect the second level of data from the at least one hardware device, and store the second level of data obtained from the at least one hardware device.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
  • Publication number: 20200236085
    Abstract: A system includes a memory and at least one processor to set a network throughput level setting to a default network traffic rate in a computer network, begin a data protection operation at the network throughput level setting in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, dynamically adjust the network throughput level setting in response to the condition by one of decreasing the network throughput level setting by a network traffic rate increment and increasing the network throughput level setting by the network traffic rate increment, and dynamically shape network or storage traffic for the data protection operation using the network throughput level setting.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis
  • Publication number: 20200236121
    Abstract: A system includes a memory and at least one processor to continually analyze at least one of metrics, events, and conditions for indications of an attack in a computer network, determine a change in the at least one of metrics, events, and conditions in the computer network, detect the attack in the computer network based on the change in the at least one of metrics, events, and conditions in the computer network, analyze the at least one of metrics, events, and conditions in the computer network and determine that at least one hardware device has been infected, restrict access to the at least one hardware device that has been infected, and generate a copy of data that was created before the attack and associated with the at least one hardware device that has been infected.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost
  • Publication number: 20200233959
    Abstract: A system includes a memory and at least one processor to disable automatic prioritization of at least one data protection operation in a computer network, begin the at least one data protection operation in the computer network, continually monitor the computer network and determine that a condition has occurred in the computer network, activate automatic prioritization of the at least one data protection operation in the computer network, and instruct backup server tooling software to direct backup data for the at least one data protection operation to move from a first target storage repository to a second target storage repository.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Inventors: Richard Raymond Spurlock, Robert Merrill Marett, James Thomas Kost, Gregory John Tevis