Skip to main content

联储老包讲话和问答总结

 发信人: niuheliang (别问我是谁), 信区: Stock
标  题: 1/26联储老包讲话和问答总结
发信站: BBS 未名空间站 (Wed Jan 26 15:38:44 2022, 美东)

1、加息前景:
1a、一年内很可能要加息;
1b、3月会议确定是否加息(3月底前不会加息,3月会议是否加息联储主席也不知道);
1c、现在没有加息计划(次数、频率、幅度);
1d、联储还没(讨论)决定3月是否加息,更没有讨论是否加息0.5%;
1e、关注市场利率为何预期联储加3次息(花姐在带节奏);

2、资产购买计划:3月份停止印钱购(地产?)债券;

3、缩表前景
3a、(一年内)没有缩表计划;
3b、加息前不会缩表;
3c、证券到期会继续滚动购买资产;

4、资产市场近期动荡
4a、很高兴资产市场priced in联储可能的政策变动;
4b、资产市场很健康,企业个人等不存在危机。


=============================================================
发信人: niuheliang (别问我是谁), 信区: Stock
标  题: Re: 鲍威尔连任提名资格听证会要点总结:美联储到2022年将实现货币
发信站: BBS 未名空间站 (Tue Jan 11 17:36:13 2022, 美东)

GRE逻辑800分尝试解读老鲍谈话。

1、加息前景:可能没有必要在更长时期内更多次地加息。

2、资产购买计划:还没最后决定是否在3月底结束资产购买。

3、缩表前景:2022年可能条件不允许美联储开始缩减资产负债表。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...