- 1 978
- 665 968
Marmelo Abante Official
Philippines
Приєднався 20 жов 2013
This channel shares about book writing, online learning, LMS, Education contents in Information Technology Education courses.
Design and Implementation in Software Engineering
Design and Implementation in Software Engineering
Переглядів: 4
Відео
Portfolio Performance Measurement and Attribution
Переглядів 74 години тому
Portfolio Performance Measurement and Attribution
Current Trends, Issues and Concerns in Investment Analysis and Portfolio Management
Переглядів 1612 годин тому
Current Trends, Issues and Concerns in Investment Analysis and Portfolio Management
Behavioral Finance and Market Anomalies
Переглядів 1814 годин тому
Behavioral Finance and Market Anomalies
ACTIVE PORTFOLIO MANAGEMENT, ALTERNATIVE ASSETS, AND INDUSTRY ETHICS
ACTIVE PORTFOLIO MANAGEMENT, ALTERNATIVE ASSETS, AND INDUSTRY ETHICS
Current Trends and Issues for Investment Analysis and Portfolio Management
Current Trends and Issues for Investment Analysis and Portfolio Management
Introduction to Financial Statement and Security Analysis
Introduction to Financial Statement and Security Analysis
I really appreciate your efforts! A bit off-topic, but I wanted to ask: My OKX wallet holds some USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). Could you explain how to move them to Binance?
Such a great video!,Something I don't understand: I have TRC20 USDT in my OKX wallet and I have the recovery phrase: (pear flame keen lift shine genuine photo other wire motion pact common). How should I convert them into Bitcoin?
Appreciate the detailed breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (mistake turkey blossom warfare blade until bachelor fall squeeze today flee guitar). Could you explain how to move them to Binance?
Thanks for the breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (mistake turkey blossom warfare blade until bachelor fall squeeze today flee guitar). What's the best way to send them to Binance?
please work on your audio, its cracking.
Thanks for sharing such valuable information! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
Thank you
Very good video! I have TRC20 USDT in my OKX wallet and I have my recovery phrase: 【pride pole obtain together second when future mask review nature potato bulb】 How do I transfer them to Binance?
Great analysis, thank you! I have a quick question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
Thank you so much for this amazing video! I need some advice: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?
i love piracy
sigma male grindset frfr
Thank you for sharing
watching ur pre host
Thanks for the breakdown! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
I'm new to trading, and I've lost a good sum trying out strategies I found in online tutorials. I would sincerely appreciate any recommendations you have.
I suggest Elizabeth Patrick Hester is extremely good on that. She is really good at what she does, Now I can pay so many bills because of her help.
This is correct, Elizabeth Patrick Hester strategy has normalized winning trades for me also, and it's a huge milestone for me looking back to how it all started..😊
Yes, I agree with you. Her platform is wonderful, and her strategies are exceptional
It doesn't matter if you are a current hodler or a newbie. You can capitalize on the fluctuation of Bitcoin by trading with good strategy/signals
She's on Facebook
Tamsak
Impressive video, Marmelo Abante Official. Looking forward to your next upload! I smashed that thumbs up button on your content. Keep up the fantastic work! Your insights on personalized learning through technology are spot on. How do you think emerging technologies like AI could further enhance student-teacher interactions in the future?
For the time being understanding legal, ethical, and professional issues in information security is crucial for managing liability and ensuring compliance. These are the key roles to manage the organization stability for keeping it safe in these modern day threats.
In all these areas, the main goal is to protect people’s privacy, secure data, and maintain trust in the systems you manage or audit. Whether you’re handling personal information, responding to a cyberattack, or simply following company policies, making responsible, informed decisions in these areas is essential to your role. Understanding and respecting privacy, adhering to legal requirements, ensuring responsible practices, and upholding the integrity of the profession are all critical elements of ensuring security in a way that respects individual rights and organizational needs.
Happy Holiday
Many of them knew about me yet we still won
We really won real victory and happy Hanukkah 🕎
Sandal 👡
I was the only one in the Jackson building who did not have the COVID virus 🦠
Legal, ethical, and professional issues in information security are critical aspects that ensure the responsible and safe handling of data, especially in a world where information is incredibly valuable and sensitive. Learning about these issues emphasizes the broader responsibilities of security professionals. They’re not only tasked with protecting information but also with doing so in a way that respects legal requirements, ethical considerations, and professional standards. This understanding is fundamental for anyone in the field to build secure systems, maintain public trust, and uphold the integrity of the information security profession. Joshua M. Guerrero BSIT-Batch 17 PTC Executive Program
Teaching people about laws and regulations related to information security helps protect individual and organizational rights. Everyone should be aware of their responsibilities and the potential consequences of their actions. Also knowing the laws and policies of an organization or country helps information security personnel understand risks and guides them in protecting against internal and external threats.
Waw
Their are no more visible
Highly informative. Thanks!
13:40 - 18:12
The Data Privacy Act of 2012 in the Philippines represents a significant step towards safeguarding personal information. It establishes guidelines for the collection, storage, and processing of data, ensuring individuals' privacy rights are respected. The Act mandates organizations to implement robust security measures and outlines the responsibilities of data controllers and processors. It also empowers individuals by granting them access to their data and the right to seek redress in case of violations. Overall, this legislation promotes transparency and accountability, fostering trust in how personal information is handled in the digital age. Cristopher Recto Jr BSIT Batch 17
I have learned that The Data Privacy Act of 2012 (Republic Act No. 10173) of the Philippines is a comprehensive law designed to protect personal information and privacy by regulating the processing of personal data by various sectors. It is safe to say that it protects the welfare of the personal information of a individual to any malpractice on the data. Kevin Ruaya BSIT Batch 17 - Executive Class
As I watched the whole video talking about the Data Privacy Act of 2012, I realized the importance of this topic, especially for this era or generation to which I belong since it is already a big part of our daily lives now. Dealing with this kind of era wherein people are already sharing personal information about themselves on the internet had its benefits and also some harmful experiences since everybody could have their own way of using the internet for good and also for their personal interests. I believe learning this RA10173, or Data Privacy Act of 2012, is a must for people since it is a way for us to avoid or to protect us from any harmful things that might happen to us. In the video also, the rights of the data subject are included, and it is one of the things that people should know because this part of the whole topic for me is somehow neglected since many people are getting abused or misused just by not knowing their rights for the data they have given. Having rights also gives you the power to be able to protect yourself from any harmful or disadvantages that could happen to you once you have given your personal data. Also, what I like about this video presentation is that it teaches us how to safely secure our personal data. I believe that the stronger the security, the more that you will avoid certain data breaches that can potentially harm you in anyway. In the end, maximizing your knowledge and knowing your responsibilities will always be the right thing to do when it comes to this. We don’t know what could happen in the future, but what we can do is prepare for things in the present. IVAN ROYCE MARASIGAN BSIT - B17 EXEC CLASS
My insights about this video regarding Data Privacy Act of 2012 are the followings, data is more important than money. Because gathering data of someone is very dangerous it can be sold on the dark web by hackers. That is why we must be more careful when putting information about ourself and more observant when visiting websites, it must be an HTTPS site not HTTP for more secure browsing. Example of Breaches and Live Cases about records in different offices, organizations and establishments that are or may violating the Data Privacy Act of 2012. Also, there must be guidelines according to Data Privacy, all staffs from the highest position to the lowest position must know about Data Privacy. Guidelines and procedure regarding breaches of data in an organization. Technical Side about Data Privacy must have, encryptions, backups, access control, strong password for different accounts. In Organizational physical security must have secure storage of data, CCTV cameras and secure disposal of hardcopies of data or files. Data Privacy Act of 2012 is important and its guidelines must be implemented inside an organization or even in a personal side. For the security of our personal data against other people who are getting our information with or without our consent. IAS BSIT-B17 Salvador
I've learned a lot in this video specially when it comes to Data Privacy Act of 2012. It gives me more ideas and awareness also in what I am going to do to secure my data or personal information. As stated in the video presentation the DPA is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected. I agree with the statement that "Do not COLLECT if you cannot PROTECT" The amount of data collected on the internet in a minute is very alarming. And data is more valuable than Money, that's all they have . But if you let someone take your data, they may eventually take your money too. There are many situations that we are breaching some important personal data. And when we let this thing happen, we are compromised. The data or personal information that is collected in us will be used in stealing our identity, using it for scamming activity and even hacking our bank/social media accounts, they will also used it for ransomware activity in exchange of money and many more bad things that we can't imagine. That's why it is very important to always secure our data or personal information and always be aware in not sharing it to anyone. Joshua Guerrero BSIT-B17
Paper mario
nice explanations thanks
Supply chain management and logistics are two overlapping concepts. However, I like the subject matter of the video and like to watch more videos like this.
Thank you
Please try to explain and dont read slides
sir thank you for sharing this lecture. sobrang laking tulong po for reporting
"Promo SM"
I want u to teach mi
Your work has not only caught my eye but also sparked my curiosity.The level of quality and informativeness is truly commendable.Your videos have lots of value if you can convey them to a global audience, how getting response from UA-cam, will your plan be achieve? Have you considered any strategies for improving your results?
Sir what UA-cam channel yun reference nyo sa 4:00 minute mark? magfollow sna ako sa kanya. thanks!
dude this framework is from 2012....you are late to the party by years....!
Ano pong reference book gamit nyo?
sory, can i use your music in my video?
Watchinng po tamsak done