Britain is expected to reach “peak cash” in 2018 while Google responds to European data privacy regulations. And in other news, U.S. counterfeit fraud drops by 70%.
Watch this quick 49 second marketing video…see who you are overlooking in your business!
Watch this 49 second marketing video and see something that is often overlooked. Front line employees and the effect they have on your business!
I have always been fascinated by the healing powers of Mother Nature. I aspire to help my patients find relief and relaxation amidst the everyday stresses of life, and improve their understanding and awareness about the connection between their physical and mental health.
Alexandra has always been passionate about Massage Therapy and natural healing. Even though she was a college student in Economy, she fell more attracted to Massage, than economy.
She began her Massage Therapy career in 2011 after graduating an intense 600 hours program in medical healing massages at Massage Therapy school Omega in Plovdiv, Bulgaria. Later on, she expanded her knowledge in the Massage Therapy field with a course in spa and wellness therapies. Since then, she has worked at various Massage Therapy clinics, Spa and Wellness centers and ski resorts.
In 2015 she accomplished a 120 hours program in Ayurveda at Ayurvedic Center Sofia, Bulgaria. This training has allowed her to incorporate body/mind medicine concepts in her work as a Massage Therapist. She strives to improve her patients understanding and awareness about the connection between their physical and mental health.
Alexandra has an extensive training in Neuromuscular Massage Therapy, Trigger point therapy and Deep Tissue Therapy.
In 2017 Alexandra passed the Massage and Bodywork Licensing Examination (MBLEx) and became a licensed massage therapist in Colorado.
CO MT License #21043
Licensed Massage Therapist
Bachelor of Economy – Insurance and Social work 2013, University on National and World Economy, Sofia, Bulgaria
Massage Specialist in:
Neuromuscular Therapy, Deep Tissue Massage, Sports Massage, Pre-natal, Aromatherapy, Reflexology
Work with the founders and other consultants to lead and execute payments-specific consulting projects for technology companies, acquirers, ISOs, banks, card brands and other players. Projects will primarily focus on payment facilitator operations…
At Double Diamond Group, we start with you: your perceptions, your questions, your challenges. We understand that you make decisions involving millions of dollars every day, and we respect your priorities, your timeline and your budget.
*“Double Diamond was essential in helping refine our portfolio company’s strategy and prioritizing its resources. Then, Todd and his team worked side by side with the management team to manage implementation and execution. The entire board was very pleased with the process and the results of our collaboration.” – Carty Chock, Co-Founder and Partner, ClearPoint Investment Partners (Worked with Double Diamond Group in a prior private equity firm)
*“I have had the pleasure of working with Todd Ablowitz in a variety of capacities during the past fifteen years, and in every instance he has demonstrated his professionalism, his leadership, and his ability to deliver actionable insights and strategic direction. Whether we were working together at the same company, or I referred Double Diamond Group to other businesses, Todd has always exceeded expectations and made a measurable difference.” – Diane Vogt Faro, President, National Benefit Programs
“We appreciated how professionally the Double Diamond Group and Rich Consulting team managed the project. They were genuinely interested in our success, and worked as partners throughout the entire process by continually looking for ways to provide value.” – Russ Jones, CFO, Shopify
See more about our story: Aggregation Solutions.
“Working with Double Diamond Group and Rich Consulting definitely expedited our process of having a final set of policies by months if not years.” –
Daniel Wacker, Club Ready
Read our case study: Payments Facilitation.
“I’ve known Todd for many years and he has an exceptional reputation for grasping the big picture, and following through with quality results. Double Diamond Group not only understands our business as well as we do, Todd and his team have innovative ideas about how we can open new market segments.” – Bill Clark, General Manager, Secure Payments Division, Apriva
“Double Diamond Group hit a home run. Their information was transformative in nature as far as educating us on what’s happening in the marketplace. It allowed the organization to rally behind the investments needed to pursue the opportunities uncovered through our work together.” – Marianne Johnson, Executive Vice President, Global Product & Innovation, Elavon
See more about our story: Payment Consulting Success.
“It’s rare to find a consulting firm that moves beyond validating strategies and assumptions to actually delivering new information that is surprising and insightful. Double Diamond Group gets to the heart of the issues and clearly answers the questions that a CEO or operational leader needs to know.” – Nina Vellayan, President & CEO, Frontstream Payments
See more about our story: Payment Research Success.
“When it comes to the Payment Facilitator model, very few people have the depth and breadth of knowledge and expertise as Double Diamond Group” – Chris Rhode, memberplanet
“The DDG consulting team not only had the specialized experience we needed, they also quickly understood our business and had an appreciation for our customer base.” – Russ Jones, CFO for Shopify.
“Lori has been my trusted financial industry consultant for years. Top tier lawyers apparently agree, as I often receive requests for her services as an expert.” – IMS Expert Services, Recruiter
When electronic payments and mobile payments companies turn to Double Diamond Group, their high expectations are met with fresh ideas, actionable recommendations, quality execution and measurable results.
For more information, contact:
Todd Ablowitz, President
Double Diamond Group, LLC
Tel: +1 (303) 916-9997
Call us to create big results today!
Keeping Your Furniture Beautiful
Quality wood furniture is a significant investment expected to last for generations. To maintain its beauty and help it last, wood furniture needs the right care. The sheen, or gloss, of the finish ranges from high to low, depending on the piece or collection. The finish protects the wood and adds to its beauty. No finish is totally indestructible. But with regular care, the finish will last much longer, providing years of enjoyment to you…
Best Interior Designers in Dallas
We reviewed over 100 of the best Dallas, TX interior designers and picked the top 20 based on multiple factors including their experience, customer satisfaction, responsiveness, and quality of work. Whatever style you’re looking for – traditional, modern, or contemporary – these designers are some of the best in the Dallas-Forth Worth area…
Curtain Cleaning Made Easy
Have you noticed the dust that’s collected on your curtains in recent months? Use these tips for curtain cleaning from Consumer Reports’ “How to Clean Practically Anything.” Before cleaning your curtains and draperies, read the care instructions carefully to determine whether you can wash them or whether you should have them dry-cleaned…
Pillows should be washed every three to six months to remove bacteria, mold, and odors. These helpful steps will demonstrate the right way to do it…
Fine linen and wool textiles spun and woven by boutique mills in Belgium and Italy filter light through metallic threads, unique burnout patterns and embroideries done by hand. These serene and neutral colors, which allow maximum natural light to flood in…
Fiber Care specializes in removing stains and caring for fine fabrics. We offer long lasting fabric protection and cleaning services for upholstery, draperies, rugs and carpet…
My Forever Treasures is pleased to offer our first combination 3 iconic sports hero treasures. Tennis great Rod Laver, basketball’s Lew Alcindor and baseball’s Mickey and Yogi. We start with an autographed photo of Rod Laver. Tennis’s first king of the courts. Rod is an Australian tennis player, widely regarded as the greatest in the history of the sport. He won 11 singles grand slams. He won a record 200 tournaments. Held the #1 world ranking from 1964-1970. The only male or female tennis player to win two grand slams in single calendar years. Laver was the first to exceed more than $1 million on tour. He won 11 major titles in just 16 tries. Rod Laver’s 2 French Opens, 4 Wimbledon Championships, 2 U.S. National Titles and 3 Australian Titles set the bar for Federer and all who follow him. Today Kareem Abdul Jabbar aka Lew Alcindor still holds the N.B.A.’s lifetime scoring record. Jordan and the others including Lebron James might never catch his incredible 38,387 points. In his second year, this 1970-71 Alcindor Milwaukee Bucks basketball card has him scoring 31 points a game with 16 rebounds as well.He changed his name to Kareem […]
Payment facilitators doing business in Europe have work to do, if they’re going to be ready for the new data privacy rules that will be effective in May.
It is an exciting time in networking, and Apstra is leading innovation in the area of Intent-Based Networking. Apstra pioneered this concept and was the first to bring it to market with the Apstra Operating System (AOS). The reason behind this excitement is that businesses need to be responsive and agile to key initiatives; and networking is critical to most of these key initiatives. Business leaders also realize that they need to think of networking in a fundamentally different way. They must move towards a massive simplification of their network operations, enabled by autonomous self-operations. I wanted to be a part of the effort along with the passionate team at Apstra. This is why I am at Apstra. Exciting!
In my debut blog at Apstra, having spent the past 6+ years at Palo Alto Networks, I thought I’d share a few thoughts on how network security fits into this new networking paradigm.
Control and Visibility
I like to think of network security in the context of “control” and “visibility”. It is very hard to secure something you do not have visibility into and you cannot secure things you cannot control.
But before jumping into these aspects of network security, let me highlight some key concepts of the AOS Network Operating System (AOS™) which I’m particularly excited about. AOS is a distributed network operating system that allows users to specify intent, and is responsible for configuring the network to operate according to the specified intent. In addition it monitors the network and ensures network operation is compliant with the specified intent. The user specified intent is used to build a network reference design that is represented as a graph in the AOS store. The network reference design graph models the network elements and relationships between network elements.
AOS then establishes “expectations” for network operation to be compliant to the specified intent. Expectations in AOS are representations of network state expressed as telemetry from network elements. For example interface status, MAC addresses, ARP information and route information are some examples of raw telemetry that is collected from network elements. Since the network is represented as a graph, applications can use graph queries to get network state information.
We call this concept Live Queries and it offers the ability to query the network topology, set up notifications to detect change in the network and register callbacks to process these notifications. In order to ensure that the network operates in compliance with the specified intent, AOS collects telemetry from network elements and detects anomalies and processes anomalies (remedial action) using the specified handlers.
As is hopefully clear from my description above, AOS provides unprecedented control and visibility into the network state and network operation.
Now to focus on the security aspect, AOS allows users to specify policy and constraints on various network elements in the network reference design graph. Security is essentially a part of intent. For example, a policy to add a set of allowed destination IP addresses/ports traversing a switch interface can be part of the intent. Another example that is fairly simple but very important is to specify intent based on network element artifacts like NOS version, patch level for software on the device, or other custom artifacts. Once these are specified, any deviations will be tracked and reported as anomalies with associated remedial action, take the device offline, send an alert or trigger a patch update. This is key in today’s environment where keeping network devices updated to have the right level of software and vulnerability patches is critical to network security.
Specifying and extending security constructs with ease
AOS provides built-in services that collect raw telemetry from network elements (e.g. MAC addresses, ARP tables, route tables, etc.) and set up expectations and monitor the state of the network based on the collected telemetry. Telemetry collection is extensible: it allows collection of custom telemetry from elements, and provides the ability to associate the telemetry with the network reference design graph. This could be done by running a live query that is associated with the custom telemetry and setup expectations and anomalies based on the telemetry. This capability is very powerful as the live query provides notifications, and an ability to react to the same in real-time as network state changes. The blog post Apstra AOS 2.0 for Custom Telemetry Applications explains this concept in detail.
The ability to set up Custom Telemetry Applications allows users to specify several security constructs for network activity in a data center network that is typically behind a firewall or in a secure zone. For example, it can facilitate detection of lateral movement inside the network, detect traffic flows that should not be present, movement of mac addresses, interface statistics, etc. All these can be defined with ease in AOS. This way you do not have to deal with the complexity of collecting all network counters, and processing the same using big data analytics to detect anomalies.
The ease with which users can add security constructs to intent makes handling complex security tasks very easy. Consider the above example of lateral movement of data in a virtual network where nodes are moving around or being brought up/down on demand. Since AOS creates the network reference design and ensures operation of the network, it has the context to be able to respond to various questions about the network (regardless of the complexity) in the presence of constant change. AOS enables applications to be notified only about the changes that the application cares about in real-time with associated network context. This is a huge shift in the way networks are monitored!
In AOS 2.1, Apstra introduced Intent-Based Analytics and it is available to customers. This extends the concept of raw telemetry described above. It allows users to aggregate raw telemetry from network elements, and supports analytics constructs like thresholding and pipelines of data across processing stages. This concept also allows users to create constructs related to the state of network devices along with network data patterns or other network parameters.
An example of that would be to detect server activity (e.g. CPU, I/O, application metrics) and correlate that with the network activity of the server (traffic patterns, interface stats, ports used etc). The ability to leverage rich context from elements in a network and co-relate across network element parameters, data flows and network operations to detect anomalies provides unprecedented visibility.
Compare this to sending all your network/server data all the time to external systems. The external system has to process a large amount of data offline and then, if you’re lucky, detect anomalies and come up with remedial actions. This results in a time lag between the time of the anomaly and detection, and renders the anomaly detection and remedial actions ineffective in the context of network security. The blog post, Intent-Based Analytics: How can I use them Now? describes how you can configure and use IBA probes.
Massive simplification of network operations through autonomous self-operation
Last but not least, AOS allows the user to specify intent, and then simply operates the network for the user. You could say “build a network with 25 racks and 20 servers in each rack with 10G links and 2:1 oversubscription and ensure that there is no ssh or ftp activity between a set of servers and trigger alerts and deny access if there is a traffic burst from any server that violates the standard deviation of the “tx_bytes” by 30%”. AOS will build a reference design for you and once this is deployed, the network will setup expectations based on the intent and trigger alerts and remedial actions specified. This is the closest the industry has gotten to autonomous network self-operation. Sounds too good to be true? Try this new “refreshingly simple” approach to network operations. Check out AOS.