Skip to main content

太黑来科普 之 银行为何拿钱多

发信人: litaihei (李太黑), 信区: Quant
标  题: 太黑来科普 之 银行为何拿钱多
发信站: BBS 未名空间站 (Fri Oct  3 22:23:16 2008)

现在满大街的评论家,都在大骂花街贪婪,都说银行不从事生产,凭什么拿这么多钱。
新的救市计划,还有限制银行奖金的条款。那么,银行拿多钱,到底和不合理呢?

让我们建立一个小模型。假设有一家银行和n个工厂。银行自己不能产生收益。假设工
厂离了银行,也不能产生收益。但是银行和一个工厂合作,能够产生一块钱的收益。那
么当银行和n个工厂合作,产生出来n块钱,银行和工厂之间,应该如何分配这n块钱呢?

在满足一定条件的前提下,银行拿n/2块钱,工厂那1/2块钱,是最为合理的分配方式。

为什么这样呢?因为银行的存在,要比单个工厂的存在更为重要,银行没了,大家都没
钱赚。那么能不能银行少拿点,工厂多拿些呢?当然可以,但这不是最优解,在社会的
发展之中,自然会回归到最优解。

中国足协经常拍脑门作决定,现在看来,fed也差不多啊。听说大本还是教授什么的。
。。


--
当一切都无可挽回的沦为真实,我的故事就要结束了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...