Post-Modern Security Analysis: Part Five (Managing Complexity)
This is the fifth article in a series about Post-Modern Security Analysis. The challenge of complexity In part three of this series, I wrote: … the first step of Post-Modern Security Analysis is simply to identify issuers or instruments that are too complex to analyze and move on to more worthy objects of analysis. […]