Creating your own educator portfolio allows you to display your competence as a teacher in both qualitative and quantitative ways. It allows you to showcase yourself as a teacher and educator much better than a resume can. It is also very advantageous when applying for jobs and promotions. As such, an educator portfolio can be much more productive for your teaching career than any resume. Building an online teaching portfolio is even better because it saves you from carrying your materials everywhere or mailing them to each job listing.
A constant rebalanced portfolio is an asset allocation algorithm which keeps the same distribution of wealth among a set of assets along a period of time. Recently, there has been work on on-line portfolio selection algorithms which are competitive with the best constant rebalanced portfolio determined in hindsight. By their nature, these algorithms employ the assumption that high returns can be achieved using a fixed asset allocation strategy. However, stock markets are far from being stationary and in many cases the wealth achieved by a constant rebalanced portfolio is much smaller than the wealth achieved by an ad-hoc investment strategy that adapts to changes in the market. In this paper we present an efficient Bayesian portfolio selection algorithm that is able to track a changing market. We also describe a simple extension of the algorithm for the case of a general transaction cost, including the transactions cost models recently investigated by Blum and kalai. We provide a simple analysis of the competitiveness of the algorithm and check its performance on real stock data from the New York Stock Exchange accumulated during a 22-year period.
So far in my series on building the right cybersecurity portfolio for your business, I've outlined three key steps companies should take. I've advocated that companies not overspend on prevention, assess their unique cybersecurity needs and create a balanced portfolio that meets those needs by taking into account all five of the categories in the NIST framework for cybersecurity. In this piece, I want to drill down into the fourth step of the portfolio process: choosing the right products for your business. As in previous pieces, ("How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products", "How To Design Your Cybersecurity Portfolio"), I'll be relying on the wisdom of the many security experts I interviewed to help guide my focus. The first two articles covered steps 1, 2, and 3 (Determine Needs, Allocate Spending According to Risk, Design Your Portfolio).
In a recent piece, I compared investing in your cybersecurity profile to a financial investment portfolio. In that article, I advocated for companies to take a strategic approach in determining how to balance their security spend across all five functions of the National Institute of Standards and Technology's framework for cybersecurity. Those five functions would ensure enterprises can identify, detect, protect, respond, and recover from threats. Within each of the categories, there are numerous actions companies can undertake to achieve a solid security infrastructure, from cataloguing resources and technologies, to implementing risk and governance policies, to limiting access to assets and networks, to network monitoring, to isolating and responding to attacks when they do occur. This is the second article in a series on building the right cybersecurity profile for your business.
The advances in computing capacity and artificial intelligence have long been hailed as a tremendous efficiency boost for wealth advisors and their clients. While almost all advisors recognize the implicit value of integrating AI into their daily practice, most AI adoption has either been via robo advisors (Wealthfront and Betterment) or "intelligent" customer service (think chatbots). The rise in model portfolios and manager selection has relieved advisors of the sole focus on individual equities, but clients still want insights on their favorite names (TSLA, AAPL, BTC). In addition, advisors with in-house research need to be able to provide the full context behind analyst upgrades/downgrades or price target changes and, therefore, have to dig through a mountain of PDFs and collate information from disparate sources in order to answer client questions and be seen as value-add. In the past, advisors with access to a dedicated information terminal could quickly access news and data their clients weren't seeing.