credit default swaps

Using data reported by Depository Trust & Clearing Corporation during the 155 weeks ending June 28, 2013, there were credit default swaps traded on only 13 reference names among U.S. banking firms:

Bank of America Corporation
Morgan Stanley
The Goldman Sachs Group, Inc.
JPMorgan Chase & Co.
Citigroup Inc.
Wells Fargo & Co. (NYSE:WFC)
MetLife, Inc. (NYSE:MET)
Ally Financial, Inc.
iStar Financial Inc. (SFI)
American Express Company (NYSE:AXP)
Capital One Financial Corporation (NYSE:COF)
Capital One Bank (USA), National Association
Citigroup Japan Holdings Corp.

from: https://seekingalpha.com/article/1635052-u-s-bank-credit-default-swaps-only-those-too-big-too-fail-can-be-hedged

ubuntu 18.04 manual raid, crypt, lvm highlights

After many days of banging my head against how to get 18.04 installed with raid1, crypt, and lvm on new disks from alternative server iso, the crux was the 1mb bios boot partition at the beginning of both disks.
Without that I’d get all the way through the install and – can’t install grub “you’re f’d”

What I did:

partition 1mb bios boot partition 1mb into the disk – offset by 2048 bytes from beginning of disk for size of 2048 bytes. type is bios boot.

then I did a generous boot partition of 732MB as raid, then the rest of the disk as a raid partition.

setup raid on sd[a,b]2 as md0, sd[a,b]3 as md1

setup ext4 on md0 mount as /boot

setup crypt on md1

setup lvm on crypt
setup swap on lvm, setup root on lvm

assign swap as swap
setup ext4 on lvm-root mount on /

finish install

xenserver 7.0 based on centos 7.2

https://docs.citrix.com/content/dam/docs/en-us/xenserver/xenserver-7-0/downloads/xenserver-7-0-installation-guide.pdf states:

 The Control Domain: Also known as 'Domain0', or 'dom0', the Control Domain is a secure, privileged Linux VM (based on a CentOS 7.2 distribution) that runs the XenServer management toolstack. Besides providing XenServer management functions, the Control Domain also runs the driver stack that provides user created Virtual Machines (VMs) access to physical devices. 

apply xen server patches in bulk

download a bunch of the buggers


for file in XS*.zip;do foo=`basename -s .zip $file`; unzip $file; bar=`xe patch-upload file-name=${foo}.xsupdate`;xe patch-apply uuid=$bar host-uuid=YOUR_HOST_UUID;done

you’ll probably want to add an rm of the zip file and an rm of the xsupdate file (exercise for the reader)

This won’t work for XS70E002 and XS70E003 until you apply XS70E004 (read the release notes).