Skip to main content

美国退出QE, 印度陷入经济危机

当全世界等待着中国爆发新兴市场危机时,一件不太有趣的事情发生了。危机反而先在
印度上演了。

传染病往往首先攻击薄弱环节,令隐藏的弱点一览无遗。卢比贬值暴露出印度的问题:
就绝对值而言,它是新兴市场财政赤字和经常账户赤字最糟糕的国家。

出什么问题了?在过去十年内的大部分时间,印度曾被誉为注定将无限期崛起下去的新
兴国家之一。即便是在2008年全球危机后,印度也依然像中国等国一样,通过大举支出
,并借助来自美国的宽松资金洪流,维持了活跃的增长。但在光环之下,印度的真实情
况却在恶化,裙带资本主义抬头,政府补贴大幅增加,通胀快速上扬。

早在2011年,随着危机后刺激政策的效果消褪,资金开始流出新兴国家。印度经济增长
放缓,经济结构弊端暴露。导火索发生在今年5月,有关美联储(Fed)认真考虑缩减量
化宽松计划的消息,导致美国长期利率骤增,吸引美元流回国内。离开新兴市场的细流
变成了洪流。在空前依赖外国资本的印度,卢比自5月以来已经贬值20%,是新兴市场货
币中贬值最严重的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...