Thursday, March 26, 2009

"Justified by Faith"



(Sakura - cherry blossom trees - around Tokyo)


"Justified by Faith"

(All Subprime Loan-Embedded Instruments Could be Tracked)



There is a big question in their explanation about why they could not stop the total tsunami effect of subprime-loan default in payment.

They said that any single subprime loan contract was divided, securitized, and distributed into various financial instruments to be sold in the global money market. Accordingly, they claimed that they could not track where any single fraction of a subprime loan contract is buried or left forgotten in this path of distribution and transaction from Wall Street.

However, Wall Street businesses could use tens of thousands of powerful computers equipped with hundreds of efficient application programs with financial capability to contract any first-rate IT companies for tracking any fraction of a subprime loan contract in this path of distribution and transaction.

Pick up any subprime-loan applied house on any town, then a Wall Street company must be able to track every paper work and confirm how and where its pieces of loan contract were securitized and distributed all over the world. It is because such paper work on financial instruments is done electronically through computers and networks.

It is all because tracking data is a basic function of a computer.

*** *** *** ***


The basic skill to manipulate data in a computer is related to how to connect pieces of data to combine all of them to build one meaningful information, such as a document file, a picture file, or an audio file.

It is so, since one whole file cannot be stored in a computer memory space in a contiguous manner; it has to be divided into many pieces and placed in discrete locations numbered with sometimes random addresses.

--------------------------
The Linked List

Now that you understand basic pointer concepts, you may be asking yourself, "What is this linked list thing?" Well, a linked list is a dynamic data structure consisting of records (called nodes) that hold data and are "'linked" to each other by a method determined by the programmer. The most common linking method is through pointers (addresses), such that each record contains the address of the next node in the list in addition to the record's regular data. The first node in the list, called the head, is used as the list's key identifier. You must always keep track of the head of the list. Why? Because it is the starting point that will be used later to retrieve the information that you have stored in the list. Lose the head, and you have lost the entry point to the entire list, particularly in our implementation here of the singly linked list. A list expands and shrinks (hence dynamic data structure) as data is added and deleted, allowing the list to accommodate an arbitrary number of elements. Compare this concept to the allocation of an array, which remains the same size during its lifetime. Figure 1.1 shows a visual example of a singly linked list, which we will be discussing throughout this article.



http://www.gamedev.net/reference/articles/article1072.asp
--------------------------

Each piece of data must be linked to form a whole file. For this purpose in a bit field of a piece of data, link information is written.

So, a piece of data has two types of location information: its own address in a memory space and an address of another piece of data to be connected to.

Naturally, a file itself must have two types of location information: its own address in a storage system or a disk space and an address of another file to be connected to.

So, a storage system or a disk must have two types of location information: its own address in a computer system and an address of another device system to be connected to.

Finally, a computer system must have two types of location information: its own address in a network system and an address of another computer system to be connected to.

Additionally, a network system must have two types of location information: its own address in a global IT network, including the Internet, and an address of another network system to be connected to.

Yes, it is a kind of fractal structure.

Accordingly, I recommend computer students in the world to first study the idea of a fractal that is generally "a rough or fragmented geometric shape that can be split into parts, each of which is (at least approximately) a reduced-size copy of the whole."

http://en.wikipedia.org/wiki/Fractal

*** *** *** ***

Now, it is reported that three million houses were evacuated in the U.S. in 2008 due to a trouble of paying back a loan.

However, if the U.S. Government had provided $1000 per month to each house owner on any contractual base, all of them might have been able to retain their houses.

Then, the total tsunami catastrophe must have been prevented with the federal costs of only $36 billion per year being invested into three million subprime-loan applied houses.

What I mean is that there must have been some experts on Wall Street who could clearly foresee that three million houses would be evacuated in 2008 due to a trouble of paying back a loan while they could identify each house at stake before 2008.

It is so since there were so many computers and application programs in addition to high-speed or broadband Internet connections on Wall Street.



(Vous ne devez pas me laisser descendre.

http://www.geocities.com/midicentral2000/beatles/_050888/DontLetMeDown.mid

Source: http://www.geocities.com/midicentral2000/beatles/PM2.html)




Rom 3:26 To declare, I say, at this time his righteousness: that he might be just, and the justifier of him which believeth in Jesus.

Rom 3:27 Where is boasting then? It is excluded. By what law? of works? Nay: but by the law of faith.

Rom 3:28 Therefore we conclude that a man is justified by faith without the deeds of the law.