Marmelo Abante Official
Marmelo Abante Official
  • 1 978
  • 665 968

Відео

Quantitative Investment Analysis
Переглядів 42 години тому
Quantitative Investment Analysis
Portfolio Performance Measurement and Attribution
Переглядів 74 години тому
Portfolio Performance Measurement and Attribution
Global Investment Strategies
Переглядів 177 годин тому
Global Investment Strategies
Fixed Income Portfolio Management
Переглядів 169 годин тому
Fixed Income Portfolio Management
Current Trends, Issues and Concerns in Investment Analysis and Portfolio Management
Переглядів 1612 годин тому
Current Trends, Issues and Concerns in Investment Analysis and Portfolio Management
Behavioral Finance and Market Anomalies
Переглядів 1814 годин тому
Behavioral Finance and Market Anomalies
Sociotechnical Systems
Переглядів 1016 годин тому
Sociotechnical Systems
Quality Management
Quality Management
Dependability and Security Assurance
Dependability and Security Assurance
Security Engineering
Security Engineering
Sociotechnical system
Sociotechnical system
Software Testing
Software Testing
Software Testing
Переглядів 13519 годин тому
Software Testing
Evaluation of Evaluation Performance
Переглядів 221 годину тому
Evaluation of Evaluation Performance
Evaluation of Portfolio Performance
Evaluation of Portfolio Performance
Evaluation of Portfolio Performance
Evaluation of Portfolio Performance
Portfolio Performance Measurement and Attribution
Portfolio Performance Measurement and Attribution
Forward, Futures, and Swap Contracts
Forward, Futures, and Swap Contracts
ACTIVE PORTFOLIO MANAGEMENT, ALTERNATIVE ASSETS, AND INDUSTRY ETHICS
ACTIVE PORTFOLIO MANAGEMENT, ALTERNATIVE ASSETS, AND INDUSTRY ETHICS
Stock Market and Industry Analysis
Stock Market and Industry Analysis
The Investment Setting
The Investment Setting
Equity Portfolio Management Strategies
Equity Portfolio Management Strategies
Organization and Functioning of Securities Market
Organization and Functioning of Securities Market
Current Trends and Issues for Investment Analysis and Portfolio Management
Current Trends and Issues for Investment Analysis and Portfolio Management
Option Contracts and other Derivatives
Option Contracts and other Derivatives
Introduction to Financial Statement and Security Analysis
Introduction to Financial Statement and Security Analysis
Fixed Income Portfolio Management
Fixed Income Portfolio Management
Bond Analysis and Portfolio Management Strategy
Bond Analysis and Portfolio Management Strategy
Security Market Indexes and Index Fund
Security Market Indexes and Index Fund

КОМЕНТАРІ

  • @KirstenJimenez
    @KirstenJimenez День тому

    I really appreciate your efforts! A bit off-topic, but I wanted to ask: My OKX wallet holds some USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). Could you explain how to move them to Binance?

  • @janeanframes
    @janeanframes 2 дні тому

    Such a great video!,Something I don't understand: I have TRC20 USDT in my OKX wallet and I have the recovery phrase: (pear flame keen lift shine genuine photo other wire motion pact common). How should I convert them into Bitcoin?

  • @IvyMallett
    @IvyMallett 3 дні тому

    Appreciate the detailed breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (mistake turkey blossom warfare blade until bachelor fall squeeze today flee guitar). Could you explain how to move them to Binance?

  • @OrangelNorma
    @OrangelNorma 5 днів тому

    Thanks for the breakdown! Just a quick off-topic question: I have a SafePal wallet with USDT, and I have the seed phrase. (mistake turkey blossom warfare blade until bachelor fall squeeze today flee guitar). What's the best way to send them to Binance?

  • @anshitabhardwaj4211
    @anshitabhardwaj4211 7 днів тому

    please work on your audio, its cracking.

  • @DarioChika
    @DarioChika 10 днів тому

    Thanks for sharing such valuable information! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

  • @danishuddin9752
    @danishuddin9752 12 днів тому

    Thank you

  • @MorganAbe-y1z
    @MorganAbe-y1z 15 днів тому

    Very good video! I have TRC20 USDT in my OKX wallet and I have my recovery phrase: 【pride pole obtain together second when future mask review nature potato bulb】 How do I transfer them to Binance?

  • @SemariasThelma
    @SemariasThelma 19 днів тому

    Great analysis, thank you! I have a quick question: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?

  • @MilciadesTeisha
    @MilciadesTeisha 20 днів тому

    Thank you so much for this amazing video! I need some advice: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How can I transfer them to Binance?

  • @noturbusiness941
    @noturbusiness941 29 днів тому

    i love piracy

  • @noturbusiness941
    @noturbusiness941 29 днів тому

    sigma male grindset frfr

  • @donnamyragarcia7846
    @donnamyragarcia7846 29 днів тому

    Thank you for sharing

  • @kellersvlog4099
    @kellersvlog4099 Місяць тому

    watching ur pre host

  • @Jennifer-s3k4r
    @Jennifer-s3k4r Місяць тому

    Thanks for the breakdown! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?

  • @DestinyKalu-m3z
    @DestinyKalu-m3z Місяць тому

    I'm new to trading, and I've lost a good sum trying out strategies I found in online tutorials. I would sincerely appreciate any recommendations you have.

    • @favouropara2058
      @favouropara2058 Місяць тому

      I suggest Elizabeth Patrick Hester is extremely good on that. She is really good at what she does, Now I can pay so many bills because of her help.

    • @Promise-c7r
      @Promise-c7r Місяць тому

      This is correct, Elizabeth Patrick Hester strategy has normalized winning trades for me also, and it's a huge milestone for me looking back to how it all started..😊

    • @Despreado
      @Despreado Місяць тому

      Yes, I agree with you. Her platform is wonderful, and her strategies are exceptional

    • @OPARAROSELINE-u5r
      @OPARAROSELINE-u5r Місяць тому

      It doesn't matter if you are a current hodler or a newbie. You can capitalize on the fluctuation of Bitcoin by trading with good strategy/signals

    • @favouropara2058
      @favouropara2058 Місяць тому

      She's on Facebook

  • @uragonsktv1152
    @uragonsktv1152 Місяць тому

    Tamsak

  • @KeyserTheRedBeard
    @KeyserTheRedBeard Місяць тому

    Impressive video, Marmelo Abante Official. Looking forward to your next upload! I smashed that thumbs up button on your content. Keep up the fantastic work! Your insights on personalized learning through technology are spot on. How do you think emerging technologies like AI could further enhance student-teacher interactions in the future?

  • @KevinG.Ruayaa
    @KevinG.Ruayaa 2 місяці тому

    For the time being understanding legal, ethical, and professional issues in information security is crucial for managing liability and ensuring compliance. These are the key roles to manage the organization stability for keeping it safe in these modern day threats.

  • @CristopherJRRecto
    @CristopherJRRecto 2 місяці тому

    In all these areas, the main goal is to protect people’s privacy, secure data, and maintain trust in the systems you manage or audit. Whether you’re handling personal information, responding to a cyberattack, or simply following company policies, making responsible, informed decisions in these areas is essential to your role. Understanding and respecting privacy, adhering to legal requirements, ensuring responsible practices, and upholding the integrity of the profession are all critical elements of ensuring security in a way that respects individual rights and organizational needs.

  • @BrandonKatrena-j6c
    @BrandonKatrena-j6c 2 місяці тому

    Happy Holiday

  • @BrandonKatrena-j6c
    @BrandonKatrena-j6c 2 місяці тому

    Many of them knew about me yet we still won

  • @BrandonKatrena-j6c
    @BrandonKatrena-j6c 2 місяці тому

    We really won real victory and happy Hanukkah 🕎

  • @BrandonKatrena-j6c
    @BrandonKatrena-j6c 2 місяці тому

    Sandal 👡

  • @BrandonKatrena-j6c
    @BrandonKatrena-j6c 2 місяці тому

    I was the only one in the Jackson building who did not have the COVID virus 🦠

  • @JOSHUAM.GUERRERO
    @JOSHUAM.GUERRERO 2 місяці тому

    Legal, ethical, and professional issues in information security are critical aspects that ensure the responsible and safe handling of data, especially in a world where information is incredibly valuable and sensitive. Learning about these issues emphasizes the broader responsibilities of security professionals. They’re not only tasked with protecting information but also with doing so in a way that respects legal requirements, ethical considerations, and professional standards. This understanding is fundamental for anyone in the field to build secure systems, maintain public trust, and uphold the integrity of the information security profession. Joshua M. Guerrero BSIT-Batch 17 PTC Executive Program

  • @NICKSONU.SALVADOR
    @NICKSONU.SALVADOR 2 місяці тому

    Teaching people about laws and regulations related to information security helps protect individual and organizational rights. Everyone should be aware of their responsibilities and the potential consequences of their actions. Also knowing the laws and policies of an organization or country helps information security personnel understand risks and guides them in protecting against internal and external threats.

  • @fentahunworku4404
    @fentahunworku4404 2 місяці тому

    Waw

  • @Sadem-l6z
    @Sadem-l6z 2 місяці тому

    Their are no more visible

  • @MasbudA.GaimaII
    @MasbudA.GaimaII 2 місяці тому

    Highly informative. Thanks!

  • @folklorevermore1989
    @folklorevermore1989 3 місяці тому

    13:40 - 18:12

  • @CristopherJRRecto
    @CristopherJRRecto 3 місяці тому

    The Data Privacy Act of 2012 in the Philippines represents a significant step towards safeguarding personal information. It establishes guidelines for the collection, storage, and processing of data, ensuring individuals' privacy rights are respected. The Act mandates organizations to implement robust security measures and outlines the responsibilities of data controllers and processors. It also empowers individuals by granting them access to their data and the right to seek redress in case of violations. Overall, this legislation promotes transparency and accountability, fostering trust in how personal information is handled in the digital age. Cristopher Recto Jr BSIT Batch 17

  • @KevinG.Ruayaa
    @KevinG.Ruayaa 3 місяці тому

    I have learned that The Data Privacy Act of 2012 (Republic Act No. 10173) of the Philippines is a comprehensive law designed to protect personal information and privacy by regulating the processing of personal data by various sectors. It is safe to say that it protects the welfare of the personal information of a individual to any malpractice on the data. Kevin Ruaya BSIT Batch 17 - Executive Class

  • @IvanRoyceN.Marasigan
    @IvanRoyceN.Marasigan 3 місяці тому

    As I watched the whole video talking about the Data Privacy Act of 2012, I realized the importance of this topic, especially for this era or generation to which I belong since it is already a big part of our daily lives now. Dealing with this kind of era wherein people are already sharing personal information about themselves on the internet had its benefits and also some harmful experiences since everybody could have their own way of using the internet for good and also for their personal interests. I believe learning this RA10173, or Data Privacy Act of 2012, is a must for people since it is a way for us to avoid or to protect us from any harmful things that might happen to us. In the video also, the rights of the data subject are included, and it is one of the things that people should know because this part of the whole topic for me is somehow neglected since many people are getting abused or misused just by not knowing their rights for the data they have given. Having rights also gives you the power to be able to protect yourself from any harmful or disadvantages that could happen to you once you have given your personal data. Also, what I like about this video presentation is that it teaches us how to safely secure our personal data. I believe that the stronger the security, the more that you will avoid certain data breaches that can potentially harm you in anyway. In the end, maximizing your knowledge and knowing your responsibilities will always be the right thing to do when it comes to this. We don’t know what could happen in the future, but what we can do is prepare for things in the present. IVAN ROYCE MARASIGAN BSIT - B17 EXEC CLASS

  • @NICKSONU.SALVADOR
    @NICKSONU.SALVADOR 3 місяці тому

    My insights about this video regarding Data Privacy Act of 2012 are the followings, data is more important than money. Because gathering data of someone is very dangerous it can be sold on the dark web by hackers. That is why we must be more careful when putting information about ourself and more observant when visiting websites, it must be an HTTPS site not HTTP for more secure browsing. Example of Breaches and Live Cases about records in different offices, organizations and establishments that are or may violating the Data Privacy Act of 2012. Also, there must be guidelines according to Data Privacy, all staffs from the highest position to the lowest position must know about Data Privacy. Guidelines and procedure regarding breaches of data in an organization. Technical Side about Data Privacy must have, encryptions, backups, access control, strong password for different accounts. In Organizational physical security must have secure storage of data, CCTV cameras and secure disposal of hardcopies of data or files. Data Privacy Act of 2012 is important and its guidelines must be implemented inside an organization or even in a personal side. For the security of our personal data against other people who are getting our information with or without our consent. IAS BSIT-B17 Salvador

  • @JOSHUAM.GUERRERO
    @JOSHUAM.GUERRERO 3 місяці тому

    I've learned a lot in this video specially when it comes to Data Privacy Act of 2012. It gives me more ideas and awareness also in what I am going to do to secure my data or personal information. As stated in the video presentation the DPA is the policy of the State to protect the fundamental human right of privacy, of communication while ensuring free flow of information to promote innovation and growth. The State recognizes the vital role of information and communications technology in nation-building and its inherent obligation to ensure that personal information in information and communications systems in the government and in the private sector are secured and protected. I agree with the statement that "Do not COLLECT if you cannot PROTECT" The amount of data collected on the internet in a minute is very alarming. And data is more valuable than Money, that's all they have . But if you let someone take your data, they may eventually take your money too. There are many situations that we are breaching some important personal data. And when we let this thing happen, we are compromised. The data or personal information that is collected in us will be used in stealing our identity, using it for scamming activity and even hacking our bank/social media accounts, they will also used it for ransomware activity in exchange of money and many more bad things that we can't imagine. That's why it is very important to always secure our data or personal information and always be aware in not sharing it to anyone. Joshua Guerrero BSIT-B17

  • @TUYonYouTube
    @TUYonYouTube 5 місяців тому

    Paper mario

  • @robertsibanda7737
    @robertsibanda7737 7 місяців тому

    nice explanations thanks

  • @supplychainlogisticstv
    @supplychainlogisticstv 8 місяців тому

    Supply chain management and logistics are two overlapping concepts. However, I like the subject matter of the video and like to watch more videos like this.

  • @anoymouschannel3513
    @anoymouschannel3513 8 місяців тому

    Thank you

  • @lettechtutorials
    @lettechtutorials 9 місяців тому

    Please try to explain and dont read slides

  • @frogtyfruit
    @frogtyfruit 9 місяців тому

    sir thank you for sharing this lecture. sobrang laking tulong po for reporting

  • @chipruggerio8376
    @chipruggerio8376 10 місяців тому

    "Promo SM"

  • @KajubiGodfrey-o3z
    @KajubiGodfrey-o3z 10 місяців тому

    I want u to teach mi

  • @TouTube-Growth-Consultation
    @TouTube-Growth-Consultation 11 місяців тому

    Your work has not only caught my eye but also sparked my curiosity.The level of quality and informativeness is truly commendable.Your videos have lots of value if you can convey them to a global audience, how getting response from UA-cam, will your plan be achieve? Have you considered any strategies for improving your results?

  • @SirBren
    @SirBren Рік тому

    Sir what UA-cam channel yun reference nyo sa 4:00 minute mark? magfollow sna ako sa kanya. thanks!

  • @michaels8153
    @michaels8153 Рік тому

    dude this framework is from 2012....you are late to the party by years....!

  • @kimdsdelacruz
    @kimdsdelacruz Рік тому

    Ano pong reference book gamit nyo?

  • @HowToGrowTV
    @HowToGrowTV Рік тому

    sory, can i use your music in my video?

  • @babyr6130
    @babyr6130 Рік тому

    Watchinng po tamsak done