The document describes a rolling collar options strategy presented by Haryo Suparmun to the Happy Day Options Club. The strategy involves buying an underlying asset like QQQQ stock, selling near-month calls against the position, and purchasing long-term protective puts. As the short calls expire or are closed, new calls are sold each month to generate premium income and maintain downside protection from the long puts, hence creating a "rolling" collar. Backtesting showed the strategy performed better than a buy-and-hold approach for QQQQ over a 59-month period by mitigating losses in down markets while still achieving gains.
The green shoe option is a provision in an underwriting agreement that allows underwriters to sell more shares than originally planned if there is high demand. It gives underwriters the right to sell additional shares at the offering price. The green shoe can vary in size up to 15% of the original shares offered. Its objectives are to provide price stability and reduce risk.
The green shoe option, also known as an over-allotment option, allows investment banks underwriting an IPO to purchase up to an additional 15% of shares at the IPO price in order to stabilize stock prices. It originated from Green Shoe Manufacturing Company implementing this clause in underwriting agreements. In India, SEBI introduced green shoe options in 2003 to stabilize newly listed share prices for up to 30 days after IPO allotment. The option involves underwriters borrowing shares from promoters to over-allocate shares and purchase shares back if prices fall for stabilization.
The document discusses various topics related to equity analysis including technical analysis, fundamental analysis, stock splits, and buybacks of shares. Technical analysis uses past price and volume data to identify trends and patterns to predict future price movements, while fundamental analysis examines a company's financial statements and competitive position. A stock split increases the number of shares but does not change the underlying value of the company, and can make shares more affordable. A reverse stock split decreases the number of shares if a stock price gets too low. Buybacks allow a company to purchase its own shares from free reserves or securities premium to restructure capital. There are certain conditions that must be met for a company to conduct a legal share buyback.
Hostile Takeover Strategies with Analysis of Case StudiesPavan Kumar Vijay
This document discusses strategies for hostile takeovers and provides examples. It begins by defining a takeover as acquiring shares or control of a target company. There are two main types of takeovers - friendly/negotiated and hostile. A hostile takeover occurs when a board rejects an offer but the bidder pursues it anyway. Common hostile takeover strategies include tender offers, creeping tender offers, and proxy fights. The document also profiles typical hostile takeover targets and discusses several case studies of hostile takeovers in India.
The document outlines SEBI regulations regarding buyback of securities by listed companies in India. It discusses various methods of buyback including tender offers to shareholders on a proportionate basis, from the open market through book building or stock exchange, and from odd lot holders. It specifies various procedural requirements such as filing of resolutions, public announcements, record dates, payment of consideration, and extinguishment of shares post-buyback. Key requirements include making the buyback through a tender offer process, reserving 15% of shares for small shareholders, keeping 25-35% of consideration in an escrow account, and ensuring compliance with stock exchange guidelines for open market buybacks.
This document discusses various methods of share repurchase by companies, including open market purchases, fixed price tender offers, Dutch auctions, and selective buybacks. It provides a case study of Berger Paints' share buyback program in 2005, where the company offered to purchase up to 3098333 shares at a maximum price of Rs. 60 per share. The buyback had a positive impact on the company's earnings per share and shareholder value. Restrictions on buybacks under Indian law are also outlined, as well as some examples of major buyback programs by companies like Reliance in the future. In conclusion, the document states buybacks should only be used to exit a company when its prospects are uncertain or
Green shoe option allows underwriters of an IPO to purchase up to 15% additional shares of a company at the offering price in order to stabilize share prices. It originated from Green Shoe Manufacturing Company in the 1960s. The green shoe option reduces risk for both the issuing company and underwriters by allowing underwriters to buy back shares if the price falls below the offering price without incurring losses.
The document discusses share buybacks, which refers to a company repurchasing its own outstanding shares to reduce the number on the market. It can increase share value and prevent hostile takeovers. The document outlines the objectives, legal requirements, process, and potential benefits and risks of share buybacks for companies.
The green shoe option is a provision in an underwriting agreement that allows underwriters to sell more shares than originally planned if there is high demand. It gives underwriters the right to sell additional shares at the offering price. The green shoe can vary in size up to 15% of the original shares offered. Its objectives are to provide price stability and reduce risk.
The green shoe option, also known as an over-allotment option, allows investment banks underwriting an IPO to purchase up to an additional 15% of shares at the IPO price in order to stabilize stock prices. It originated from Green Shoe Manufacturing Company implementing this clause in underwriting agreements. In India, SEBI introduced green shoe options in 2003 to stabilize newly listed share prices for up to 30 days after IPO allotment. The option involves underwriters borrowing shares from promoters to over-allocate shares and purchase shares back if prices fall for stabilization.
The document discusses various topics related to equity analysis including technical analysis, fundamental analysis, stock splits, and buybacks of shares. Technical analysis uses past price and volume data to identify trends and patterns to predict future price movements, while fundamental analysis examines a company's financial statements and competitive position. A stock split increases the number of shares but does not change the underlying value of the company, and can make shares more affordable. A reverse stock split decreases the number of shares if a stock price gets too low. Buybacks allow a company to purchase its own shares from free reserves or securities premium to restructure capital. There are certain conditions that must be met for a company to conduct a legal share buyback.
Hostile Takeover Strategies with Analysis of Case StudiesPavan Kumar Vijay
This document discusses strategies for hostile takeovers and provides examples. It begins by defining a takeover as acquiring shares or control of a target company. There are two main types of takeovers - friendly/negotiated and hostile. A hostile takeover occurs when a board rejects an offer but the bidder pursues it anyway. Common hostile takeover strategies include tender offers, creeping tender offers, and proxy fights. The document also profiles typical hostile takeover targets and discusses several case studies of hostile takeovers in India.
The document outlines SEBI regulations regarding buyback of securities by listed companies in India. It discusses various methods of buyback including tender offers to shareholders on a proportionate basis, from the open market through book building or stock exchange, and from odd lot holders. It specifies various procedural requirements such as filing of resolutions, public announcements, record dates, payment of consideration, and extinguishment of shares post-buyback. Key requirements include making the buyback through a tender offer process, reserving 15% of shares for small shareholders, keeping 25-35% of consideration in an escrow account, and ensuring compliance with stock exchange guidelines for open market buybacks.
This document discusses various methods of share repurchase by companies, including open market purchases, fixed price tender offers, Dutch auctions, and selective buybacks. It provides a case study of Berger Paints' share buyback program in 2005, where the company offered to purchase up to 3098333 shares at a maximum price of Rs. 60 per share. The buyback had a positive impact on the company's earnings per share and shareholder value. Restrictions on buybacks under Indian law are also outlined, as well as some examples of major buyback programs by companies like Reliance in the future. In conclusion, the document states buybacks should only be used to exit a company when its prospects are uncertain or
Green shoe option allows underwriters of an IPO to purchase up to 15% additional shares of a company at the offering price in order to stabilize share prices. It originated from Green Shoe Manufacturing Company in the 1960s. The green shoe option reduces risk for both the issuing company and underwriters by allowing underwriters to buy back shares if the price falls below the offering price without incurring losses.
The document discusses share buybacks, which refers to a company repurchasing its own outstanding shares to reduce the number on the market. It can increase share value and prevent hostile takeovers. The document outlines the objectives, legal requirements, process, and potential benefits and risks of share buybacks for companies.
The document discusses five types of assessments that are important for comprehensive risk management: risk assessment, security controls assessment, compliance assessment, vulnerability assessment, and penetration testing. It provides an overview of why each assessment is conducted, how it is conducted, and the expected outcome. Comprehensive risk management involves identifying threats and risks, understanding existing security controls, ensuring compliance with standards, identifying vulnerabilities, and testing the effectiveness of controls against attacks.
Security Information Management: An introductionSeccuris Inc.
Information Security managers have long been tasked with monitoring the enterprises they work for while the business requirements for enterprise security monitoring continue to mutate and be redefined with ever increasing speed. The definition and location of our assets shifts on a daily basis requiring a new unsurpassed level of flexibility and visibility in managing information security/ Traditional security technologies have continued their overlap with network, information and audit management solutions creating workplace silos for managing information security.
The ability to monitor in the enterprise, identifying, interpreting and intelligently responding to the true needs of our organizations seems impossible.
This presentation introduces Security Information Management (SIM) technologies and concerns, outlining potential solutions and approaches you can take to move your security posture forward.
This document contains chapter 9 from the 10th edition of the textbook "Management Information Systems" by Raymond McLeod and George Schell, published in 2007 by Prentice Hall. The chapter covers information security, including the organizational needs for security, the objectives of information security, threats and risks, security management, implementing security policies, and common security controls. The learning objectives, content, and figures aim to educate readers on fundamental concepts and best practices for securing information systems within organizations.
This document discusses computing and communications resources and covers topics such as computer hardware components, personal computing devices, data storage, input/output devices, software, computer networking, and the internet. The learning objectives are to understand the various computer components, data storage media, software types, computer networking strategies, and the differences between intranets, extranets, and the internet.
1) The document discusses the fundamentals of computer processing including computing history, sizes of computers, literacy, central processing units, memory, storage devices, and input/output devices.
2) It also covers databases and database management systems including data organization, database structures, relational databases, creating databases, and query languages.
3) Key concepts are explained like database management systems, data redundancy, data independence, database administration, and knowledge discovery in databases.
This document discusses risk management for information security. It defines risk management as identifying and controlling risks to an organization. The key components of risk management are risk identification, risk assessment, and risk control. Risk identification involves inventorying assets, identifying threats and vulnerabilities. Risk assessment evaluates the likelihood and impact of risks. Risk control strategies include avoidance, transference, mitigation and acceptance of risks. The goal is to reduce residual risks to a level acceptable for the organization.
This document discusses definitions and concepts related to artificial intelligence (AI). It provides several definitions of AI from different experts that describe AI as studying how to make computers behave intelligently like humans, studying symbolic and non-algorithmic problem solving, and studying how to solve exponentially hard problems efficiently. The document also discusses key differences between conventional and intelligent computing, applications of AI, and proposes the Turing Test for evaluating machine intelligence.
This document discusses key topics in software engineering including its importance, costs, methods, challenges and professional responsibilities. It begins by outlining the objectives of understanding what software engineering is, its importance, and ethical issues. It then discusses that software costs, especially maintenance, often exceed development costs. Software engineering aims to improve cost-effectiveness. The document poses several frequently asked questions about software engineering and provides concise answers, covering topics such as the definition of software and differences between computer science, software engineering and system engineering. It also discusses software processes, costs, methods, CASE tools, attributes of good software and challenges in the field.
This document provides an overview of call and put options, including:
- Call options give the buyer the right to purchase an underlying asset at a specified strike price. Put options give the buyer the right to sell an underlying asset at a specified strike price.
- Options have an expiration date and are used for speculation or hedging. Speculators try to profit from price changes, while hedgers use options to reduce risk.
- The value of an option depends on the value of the underlying asset and volatility. At expiration, call options are worth the maximum of the asset price minus strike price and zero. Put options are worth the maximum of strike price minus asset price and zero.
- Buy
11. hapzi ali, sim, implikasi etis dari tiHapzi Ali
Prof. Dr. Hapzi Ali, CMA
Universitas Mercu Buana (Mercu Buana University), Jakarta Indonesia
Bidang Ilmu: Marketing & Business Management, Research Method, MIS, Good Corporate Governance
www.mercubuana.ac.id.
email: hapzi.ali@gmail.com, hapzi.ali@mercubuana.ac.id
This document discusses software process models. It begins by outlining common activities like specification, design, validation and evolution. It then describes three generic process models: waterfall, evolutionary development, and component-based development. Waterfall involves separate sequential phases while evolutionary development interleaves activities. Component-based development focuses on reuse. The document also discusses process iteration techniques like incremental delivery and spiral development to accommodate changing requirements.
The document discusses requirements engineering processes. It describes the main activities as feasibility studies to determine if a project is worthwhile, elicitation and analysis to discover requirements, specification to formalize requirements, and validation to check requirements. It discusses techniques for eliciting requirements including interviews, scenarios, use cases and viewpoints to represent different stakeholder perspectives. The goal is to create and maintain requirements documents through these iterative processes.
The document discusses socio-technical systems and their key differences from technical computer systems. Socio-technical systems include technical, organizational and human elements. Emergent properties like reliability depend on complex interactions between system components and are difficult to predict. Systems engineering aims to design socio-technical systems to meet requirements while accounting for organizational factors. Legacy systems also present challenges due to their critical role and difficulty evolving over time.
The document discusses critical systems and system dependability. It defines critical systems as systems where failure could result in significant economic losses, damage, or threats to human life. It describes four dimensions of dependability for critical systems: availability, reliability, safety, and security. It emphasizes that critical systems require trusted development methods to achieve high dependability.
The document discusses software requirements and requirements engineering. It introduces concepts like user requirements, system requirements, functional requirements, and non-functional requirements. It explains how requirements can be organized in a requirements document and the different types of stakeholders who read requirements. The document also discusses challenges in writing requirements precisely and provides examples of requirements specification for a library system called LIBSYS.
This document provides an overview of information security management based on an ISO approach. It discusses key ISO security categories and controls, including risk management, policy management, security organization management, and others. Sample organizational charts and resources for further information are also included. The document aims to help map strengths and responsibilities to different security areas.
The document discusses information security management systems (ISMS) and the ISO 27001 standard. It provides an overview of ISMS, describing their role in systematically managing information security. It then outlines the key aspects of ISO 27001, including its 11 domains that cover information security areas like policies, asset management, access control, and compliance. The document emphasizes that ISO 27001 certification provides organizations benefits like increased credibility, assurance for partners and authorities, and a competitive advantage.
This document discusses chapter 11 on decision support systems from the textbook "Management Information Systems, 10th Edition" by Raymond McLeod and George Schell. It covers key topics such as decision making, problem solving, mathematical modeling, the use of spreadsheets and artificial intelligence in decision support systems. The chapter describes how decision support systems have evolved over time to incorporate additional functions such as group decision support, online analytical processing and artificial intelligence.
This document discusses the ethical implications of information technology. It begins with learning objectives that cover understanding how morals, ethics and laws differ; computer legislation; how firms can create an ethical culture; and society's rights regarding computers. It then discusses concepts like morals, ethics and laws; computer legislation in the US; how firms can establish an ethics culture; reasons why computer ethics are important; and society's rights related to privacy, accuracy, property and accessibility of information. It also covers the roles of internal auditing in ensuring ethical computer systems and practices.
The document discusses five types of assessments that are important for comprehensive risk management: risk assessment, security controls assessment, compliance assessment, vulnerability assessment, and penetration testing. It provides an overview of why each assessment is conducted, how it is conducted, and the expected outcome. Comprehensive risk management involves identifying threats and risks, understanding existing security controls, ensuring compliance with standards, identifying vulnerabilities, and testing the effectiveness of controls against attacks.
Security Information Management: An introductionSeccuris Inc.
Information Security managers have long been tasked with monitoring the enterprises they work for while the business requirements for enterprise security monitoring continue to mutate and be redefined with ever increasing speed. The definition and location of our assets shifts on a daily basis requiring a new unsurpassed level of flexibility and visibility in managing information security/ Traditional security technologies have continued their overlap with network, information and audit management solutions creating workplace silos for managing information security.
The ability to monitor in the enterprise, identifying, interpreting and intelligently responding to the true needs of our organizations seems impossible.
This presentation introduces Security Information Management (SIM) technologies and concerns, outlining potential solutions and approaches you can take to move your security posture forward.
This document contains chapter 9 from the 10th edition of the textbook "Management Information Systems" by Raymond McLeod and George Schell, published in 2007 by Prentice Hall. The chapter covers information security, including the organizational needs for security, the objectives of information security, threats and risks, security management, implementing security policies, and common security controls. The learning objectives, content, and figures aim to educate readers on fundamental concepts and best practices for securing information systems within organizations.
This document discusses computing and communications resources and covers topics such as computer hardware components, personal computing devices, data storage, input/output devices, software, computer networking, and the internet. The learning objectives are to understand the various computer components, data storage media, software types, computer networking strategies, and the differences between intranets, extranets, and the internet.
1) The document discusses the fundamentals of computer processing including computing history, sizes of computers, literacy, central processing units, memory, storage devices, and input/output devices.
2) It also covers databases and database management systems including data organization, database structures, relational databases, creating databases, and query languages.
3) Key concepts are explained like database management systems, data redundancy, data independence, database administration, and knowledge discovery in databases.
This document discusses risk management for information security. It defines risk management as identifying and controlling risks to an organization. The key components of risk management are risk identification, risk assessment, and risk control. Risk identification involves inventorying assets, identifying threats and vulnerabilities. Risk assessment evaluates the likelihood and impact of risks. Risk control strategies include avoidance, transference, mitigation and acceptance of risks. The goal is to reduce residual risks to a level acceptable for the organization.
This document discusses definitions and concepts related to artificial intelligence (AI). It provides several definitions of AI from different experts that describe AI as studying how to make computers behave intelligently like humans, studying symbolic and non-algorithmic problem solving, and studying how to solve exponentially hard problems efficiently. The document also discusses key differences between conventional and intelligent computing, applications of AI, and proposes the Turing Test for evaluating machine intelligence.
This document discusses key topics in software engineering including its importance, costs, methods, challenges and professional responsibilities. It begins by outlining the objectives of understanding what software engineering is, its importance, and ethical issues. It then discusses that software costs, especially maintenance, often exceed development costs. Software engineering aims to improve cost-effectiveness. The document poses several frequently asked questions about software engineering and provides concise answers, covering topics such as the definition of software and differences between computer science, software engineering and system engineering. It also discusses software processes, costs, methods, CASE tools, attributes of good software and challenges in the field.
This document provides an overview of call and put options, including:
- Call options give the buyer the right to purchase an underlying asset at a specified strike price. Put options give the buyer the right to sell an underlying asset at a specified strike price.
- Options have an expiration date and are used for speculation or hedging. Speculators try to profit from price changes, while hedgers use options to reduce risk.
- The value of an option depends on the value of the underlying asset and volatility. At expiration, call options are worth the maximum of the asset price minus strike price and zero. Put options are worth the maximum of strike price minus asset price and zero.
- Buy
11. hapzi ali, sim, implikasi etis dari tiHapzi Ali
Prof. Dr. Hapzi Ali, CMA
Universitas Mercu Buana (Mercu Buana University), Jakarta Indonesia
Bidang Ilmu: Marketing & Business Management, Research Method, MIS, Good Corporate Governance
www.mercubuana.ac.id.
email: hapzi.ali@gmail.com, hapzi.ali@mercubuana.ac.id
This document discusses software process models. It begins by outlining common activities like specification, design, validation and evolution. It then describes three generic process models: waterfall, evolutionary development, and component-based development. Waterfall involves separate sequential phases while evolutionary development interleaves activities. Component-based development focuses on reuse. The document also discusses process iteration techniques like incremental delivery and spiral development to accommodate changing requirements.
The document discusses requirements engineering processes. It describes the main activities as feasibility studies to determine if a project is worthwhile, elicitation and analysis to discover requirements, specification to formalize requirements, and validation to check requirements. It discusses techniques for eliciting requirements including interviews, scenarios, use cases and viewpoints to represent different stakeholder perspectives. The goal is to create and maintain requirements documents through these iterative processes.
The document discusses socio-technical systems and their key differences from technical computer systems. Socio-technical systems include technical, organizational and human elements. Emergent properties like reliability depend on complex interactions between system components and are difficult to predict. Systems engineering aims to design socio-technical systems to meet requirements while accounting for organizational factors. Legacy systems also present challenges due to their critical role and difficulty evolving over time.
The document discusses critical systems and system dependability. It defines critical systems as systems where failure could result in significant economic losses, damage, or threats to human life. It describes four dimensions of dependability for critical systems: availability, reliability, safety, and security. It emphasizes that critical systems require trusted development methods to achieve high dependability.
The document discusses software requirements and requirements engineering. It introduces concepts like user requirements, system requirements, functional requirements, and non-functional requirements. It explains how requirements can be organized in a requirements document and the different types of stakeholders who read requirements. The document also discusses challenges in writing requirements precisely and provides examples of requirements specification for a library system called LIBSYS.
This document provides an overview of information security management based on an ISO approach. It discusses key ISO security categories and controls, including risk management, policy management, security organization management, and others. Sample organizational charts and resources for further information are also included. The document aims to help map strengths and responsibilities to different security areas.
The document discusses information security management systems (ISMS) and the ISO 27001 standard. It provides an overview of ISMS, describing their role in systematically managing information security. It then outlines the key aspects of ISO 27001, including its 11 domains that cover information security areas like policies, asset management, access control, and compliance. The document emphasizes that ISO 27001 certification provides organizations benefits like increased credibility, assurance for partners and authorities, and a competitive advantage.
This document discusses chapter 11 on decision support systems from the textbook "Management Information Systems, 10th Edition" by Raymond McLeod and George Schell. It covers key topics such as decision making, problem solving, mathematical modeling, the use of spreadsheets and artificial intelligence in decision support systems. The chapter describes how decision support systems have evolved over time to incorporate additional functions such as group decision support, online analytical processing and artificial intelligence.
This document discusses the ethical implications of information technology. It begins with learning objectives that cover understanding how morals, ethics and laws differ; computer legislation; how firms can create an ethical culture; and society's rights regarding computers. It then discusses concepts like morals, ethics and laws; computer legislation in the US; how firms can establish an ethics culture; reasons why computer ethics are important; and society's rights related to privacy, accuracy, property and accessibility of information. It also covers the roles of internal auditing in ensuring ethical computer systems and practices.
This document discusses various types of information systems used in organizations. It describes transaction processing systems, organizational information systems for marketing, human resources, manufacturing and finance. It also discusses executive information systems, customer relationship management systems, data warehousing systems, and how data is stored and analyzed through online analytical processing and data mining.
This document discusses systems development and project management. It covers the systems approach, systems development lifecycles (SDLC), modeling techniques like data flow diagrams and use cases, and project management mechanisms. SDLC approaches covered include traditional waterfall, prototyping, rapid application development, phased development, and business process redesign. Project management topics discussed are project leadership, planning tools like Gantt charts and network diagrams, and cost estimating.
This document discusses database management systems and relational databases. It defines key concepts like data hierarchy, database structures, and the database management system. It provides learning objectives about understanding database concepts and structures. It also includes examples of a schedule database implemented in Microsoft Access with tables, fields and their definitions. The document discusses how the relational database breaks information into multiple tables to avoid data duplication.
This document discusses chapter 4 from the 10th edition of the textbook "Management Information Systems" by Raymond McLeod and George Schell. The chapter covers system users and developers, including end-user computing, the roles of information specialists, and the benefits and risks of the virtual office and virtual organization models. It also outlines the types of knowledge and skills needed for information systems careers.
This document discusses electronic commerce and interorganizational systems. It defines electronic commerce, business-to-business commerce, and business-to-consumer commerce. The document also outlines the benefits of electronic commerce such as improved customer service and relationships with suppliers. Additionally, it describes interorganizational systems and how they allow firms to work together efficiently. Specific interorganizational systems discussed include electronic data interchange and extranets.
This document outlines key concepts from Chapter 2 of the textbook "Management Information Systems, 10th edition" by Raymond McLeod and George Schell. It discusses using information systems to achieve competitive advantage through concepts like supply chain management, value chains, and knowledge management. It also covers challenges of developing global information systems and the importance of strategic planning for information resources.
This document discusses an introduction to information systems chapter from a management information systems textbook. It covers the evolution of computer hardware and applications, including transaction processing systems, management information systems, enterprise resource planning systems, and decision support systems. It also discusses problem solving, decision making, and the future of information technology.
Ringkasan dokumen tersebut adalah:
1. Dokumen tersebut membahas tentang laba per saham dan berbagai sekuritas yang dapat mempengaruhi perhitungan laba per saham seperti obligasi konversi, saham preferen konversi, waran, hak atas saham, dan opsi saham.
2. Ada dua jenis laba per saham yaitu laba per saham dasar untuk struktur modal sederhana dan laba per saham dilusian untuk struktur modal kompleks yang
Unlocking WhatsApp Marketing with HubSpot: Integrating Messaging into Your Ma...Niswey
50 million companies worldwide leverage WhatsApp as a key marketing channel. You may have considered adding it to your marketing mix, or probably already driving impressive conversions with WhatsApp.
But wait. What happens when you fully integrate your WhatsApp campaigns with HubSpot?
That's exactly what we explored in this session.
We take a look at everything that you need to know in order to deploy effective WhatsApp marketing strategies, and integrate it with your buyer journey in HubSpot. From technical requirements to innovative campaign strategies, to advanced campaign reporting - we discuss all that and more, to leverage WhatsApp for maximum impact. Check out more details about the event here https://events.hubspot.com/events/details/hubspot-new-delhi-presents-unlocking-whatsapp-marketing-with-hubspot-integrating-messaging-into-your-marketing-strategy/
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Enhancing Adoption of AI in Agri-food: IntroductionCor Verdouw
Introduction to the Panel on: Pathways and Challenges: AI-Driven Technology in Agri-Food, AI4Food, University of Guelph
“Enhancing Adoption of AI in Agri-food: a Path Forward”, 18 June 2024
Tired of chasing down expiring contracts and drowning in paperwork? Mastering contract management can significantly enhance your business efficiency and productivity. This guide unveils expert secrets to streamline your contract management process. Learn how to save time, minimize risk, and achieve effortless contract management.
The Most Inspiring Entrepreneurs to Follow in 2024.pdfthesiliconleaders
In a world where the potential of youth innovation remains vastly untouched, there emerges a guiding light in the form of Norm Goldstein, the Founder and CEO of EduNetwork Partners. His dedication to this cause has earned him recognition as a Congressional Leadership Award recipient.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART INDIA MATKA KALYAN SATTA MATKA 420 INDIAN MATKA SATTA KING MATKA FIX JODI FIX FIX FIX SATTA NAMBAR MATKA INDIA SATTA BATTA
Satta matka fixx jodi panna all market dpboss matka guessing fixx panna jodi kalyan and all market game liss cover now 420 matka office mumbai maharashtra india fixx jodi panna
Call me 9040963354
WhatsApp 9040963354
DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KALYAN FIX JO...essorprof62
DPBOSS NET SPBOSS SATTA MATKA RESULT KALYAN MATKA GUESSING FREE KALYAN FIX JODI ANK LEAK FIX GAME BY DP BOSS MATKA SATTA NUMBER TODAY LUCKY NUMBER FREE TIPS ...
Prescriptive analytics BA4206 Anna University PPTFreelance
Business analysis - Prescriptive analytics Introduction to Prescriptive analytics
Prescriptive Modeling
Non Linear Optimization
Demonstrating Business Performance Improvement
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART KALYAN CHART
1. HAPPY DAY OPTIONS CLUB
ROLLING COLLAR STRATEGY
Presented by
HARYO SUPARMUN
2. OPTIONS
AN OPTION CONTRACT:
- A CONTRACT BETWEEN WRITER AND
HOLDER.
- GIVES TO ITS HOLDER THE RIGHT, BUT
NOT THE OBLIGATION, TO BUY OR
SELL SHARES OF THE UNDERLYING
SECURITY AT A SPECIFIC PRICE ON OR
BEFORE A GIVEN DATE.
- AFTER THIS DATE, THE OPTION
EXPIRES.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
2
5. RIGHT OR OBLIGATION
CALL OPTIONS
Buy Call
Right, not
obligation to BUY
PUT OPTIONS
Buy Put
Right, not
obligation to SELL
Sell Call
Obligation to SELL,
if being exercised
Sell Put
Obligation to BUY,
if being exercised
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
5
6. COLLAR STRATEGY
OWN or BUY SHARES OF STOCK.
SELL CALL OPTIONS AGAINST THE
STOCK.
BUY PUT OPTIONS FOR PROTECTION.
A combination of
Covered Call and Protective Put
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
6
7. COLLAR STRATEGY
XYZ trading at $72,
Selling an 80-strike Call for $2
Buy a 70-strike Put for $3
Creates a collar
limits the total risk to $3 per share
limits profit potential to $7 per share.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
7
8. COLLAR:
Long Stock at $72, Long 70 Put at $3, Short 80 Call at $2
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
8
9. ILLUSTRATION ON ROLLING COLLAR TRADE
MARKET:
NASDAQ 100 TRACKING STOCK (QQQQ) AND ITS
OPTIONS. STRATEGY CAN BE APPLIED TO OTHER
HIGH-VOLUME EXCHANGE TRADED FUNDS (ETFs)
AND THEIR LIQUID OPTIONS CONTRACTS.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
9
10. ILLUSTRATION ON ROLLING COLLAR TRADE
SYSTEM CONCEPT:
NASDAQ 100 TRACKING STOCK (QQQQ)
BUY-&-HOLD STRATEGY
vs
COLLAR using LEAPS
LEAPS= Long-term Equity AnticiPation
Securities (options with at least a year to
expiration)
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
10
11. ILLUSTRATION ON ROLLING COLLAR TRADE
Strategy:
-
Buy or Own underlying market (QQQQ).
Sell near month Call Option.
Buy LEAPs Put for protection.
Position:
- Covered Call to collect income.
- Long Put for Protection.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
11
12. ILLUSTRATION ON ROLLING COLLAR TRADE
Combining a protective Put with
Covered Call (Long QQQQ and Short
OTM Call) creates a “rolling” collar.
The “roll” occurs as you buy back the
short call each month (or,
alternately, they expire) and then
sell new calls in the next expiration
month.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
12
13. ILLUSTRATION ON ROLLING COLLAR TRADE
Initial investment $50,000 on Jan 2, 2001,
no additional capital over the past 5 years.
Adjusted overall position periodically as
QQQQ moved Up or Down. Additional
shares were purchased with the premium
from selling short-term calls. Shares were
sold if funds were needed to buy back ITM
calls or roll the LEAPs.
No margin were used, commissions were
not included, and all trades used current
bid/ask prices.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
13
14. ILLUSTRATION ON ROLLING COLLAR TRADE
QQQQ closed at $53.44 on Jan 2, 2001.
Create initial collar:
-
Buy 735 shares QQQQ.
Buy 7 Jan 2003 $55 Puts (the LEAPs).
Sell 7 Feb 2001 $58 Calls.
Compared with:
Buy-&-hold strategy bought 935 shares.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
14
15. ILLUSTRATION ON ROLLING COLLAR TRADE
Trade Rules:
1. For every 100 shares owned,
purchase an ATM LEAPS Put option in
farthest out year. Hold these Puts
until a new LEAPS expiration become
available for the following year.
Then, sell the current long Puts and
buy the same number of ATM Puts in
the new furthest expiration year.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
15
16. ILLUSTRATION ON ROLLING COLLAR TRADE
Trade Rules:
2. For every 100 shares owned, sell
near-month Calls just less than one
standard deviation above QQQQ’s
current price. If call’s bid price is less
than $0.10, select one strike lower to
ensure you collect adequate
premium.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
16
17. ILLUSTRATION ON ROLLING COLLAR TRADE
Trade Rules:
3. On expiration day, if the short calls are ITM, then cover
them (most likely at a loss). If the calls are OTM, then
allow them to expire worthless.
In either case, sell the next-month calls at this time.
a. If the calls are ITM, any cash shortfall is met by selling
QQQQ shares.
b. If the calls are OTM, any excess cash is used to purchase
additional QQQQ shares.
c. After another 100 shares are purchased, sell an additional
call each month and begin to save that premium to buy
another ATM Put to protect those shares.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
17
18. ILLUSTRATION ON ROLLING COLLAR TRADE
Test Data:
The system was tested using NASDAQ 100 tracking
Stock (QQQQ) and its options.
Test Period:
Jan 2, 2001 to November 18, 2005
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
18
19. ILLUSTRATION ON ROLLING COLLAR TRADE
Test Result:
-
-
QQQQ was equally split between positive and
negative monthly returns during test period, with 29
positive months and 29 negative months.
After 59 months:
- Buy-&-hold approach declined from $50,000 to
$38,752, or 22.50% loss.
- Rolling collar climbed from $50,000 to $59,388 (not
including commissions), or 18.78% gain.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
19
20. ILLUSTRATION ON ROLLING COLLAR TRADE
Outcome:
The rolling collar is a hedged position,
- dramatically mitigates losses in bear markets.
- although it lags buy-&-hold in sharply bullish
markets, it still can gain ground when the market
rallies.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
20
21. Figure 1: Daily Chart of QQQQ
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
21
22. Figure 2:
Compares the performance buy-&-hold vs rolling collar
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
22
26. Rolling Collar STRATEGY on QQQQ
Buy 100 QQQQ at $38.65,
Sell 39-strike JUL 06 Call for $0.75,
Buy 36-strike JAN 08 Put for $2.20.
Costs: 38.65+2.20-0.75=$40.10
If price >$39, close Call option,
if price <$38, allow expire,
follow by sell next month Call at this time.
ROI ~ 2% per month.
Jun 17, 2006
HARYO SUPARMUN
in HDO Club Meeting
26