Skip to main content

解释一下Quant(转自某人博客)

 解释一下Quant(转自某人博客)
整天把quant挂在嘴边,大部分人都不知道这是虾米东东,解释一下

投行是quant集中地,投行有两块业务,一是corporate finance,兼并收购上市发行债
券之类,一是trading,做交易,现在交易主要向金融衍生品集中了,例如各种期权,
swap之类。 quant属于后一块,,但不是直接做trading,而是为trader和sales做支持
,制定交易策略和定价,还有hedging。quant在trading floor属于核心人物,一般一
个人支持数个trader和sales,被称为“力量增加器”。一家大投行也就10个左右quant
,却有数百个trader和sales。

quant的coding是必需,C++要“monster”级别---“招聘用语”。但是本身数理一定要
强,最好是理论物理phd,因为理论物理就是建模。当然,还要懂得金融数学和各种金
融模型,pde和sde要娴熟。另外金融理论也要知道,各种衍生物要熟悉。因为要求高,
拿钱不少,第一年50000英镑,以后每年至少增长50%,指数增长。当然,压力超大,工
作时间超长。因为trader要抓狂的,作的交易都是几千万数亿美元计!衍生品的恐怖在
于算错1%,实际会损失10%!


quant一般是物理phd出身。数学phd也ok,不过部分数学phd偏于逻辑了,没有什么模型
发展。最适合的应该是金融数学phd,科班出身嘛,不过我所知道的former phd都教书
去了,至少在Imperial是这样,他们都说“鄙视quant!”不想由academic堕落到人家
赚钱的工具。CS做quant的比较少,他们一般在IT部门。当然也有金融数学master出去
做quant。

Anyway,try一下,不行就去读phd

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...