Skip to main content

太黑来科普 之 证券大势岂可挡

发信人: litaihei (李太黑), 信区: Quant
标  题: 太黑来科普 之 证券大势岂可挡
发信站: BBS 未名空间站 (Sun Oct 12 11:32:19 2008)

近来科普金融工程,成为了bbs上的一种时尚。太黑也来凑个热闹。臭名昭著的CDO近来
遭到大家的一致唾弃,连带着做CDO模型的矿工们也被殃及池鱼。

经济崩溃了,大家心里都很郁闷。总得找个发泄处。华尔街成了千夫所指。CDO成了过
街之鼠。历史总是惊人的相似。1987年股市大崩盘,股指期货的遭遇和现在CDO颇有些
类似之处。大家认为,股指期货这东西除了增加人们的赌博欲望,也不产生什么效益,
增大了股市的波动。

但是后来的数据分析表明,没有证据证明股指期货的推出,增大了股市的波动率。股指
期货经历了几十年的发展,非但没有被废除,反而成了一种必备的金融产品。

CDO作为一种房贷证券化的产品,真的就是罪魁祸首么?二十年前的存贷危机,也是因
为房产泡沫破灭,倒闭了一千多家银行,那时候有CDO么?

股指期货为什么能够存在,因为它提供了一种超低成本的规避风险的机制。房贷证券化
,同样对于经营房屋贷款的金融机构提供了一种规避风险的机制。至于为什么那么多金
融机构破产,同时也应该看到有很多金融机构没破产,而且趁机大赚其钱。

刀枪从来不是战争的根源,拉不出屎来,也莫怨茅坑不好。
--
当一切都无可挽回的沦为真实,我的故事就要结束了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...