The blog post "Kelly Can't Fail," authored by John Mount and published on the Win-Vector LLC website, delves into the oft-misunderstood concept of the Kelly criterion, a formula used to determine optimal bet sizing in scenarios with known probabilities and payoffs. The author meticulously dismantles the common misconception that the Kelly criterion guarantees success, emphasizing that its proper application merely optimizes the long-run growth rate of capital, not its absolute preservation. He accomplishes this by rigorously demonstrating, through mathematical derivation and illustrative simulations coded in R, that even when the Kelly criterion is correctly applied, the possibility of experiencing substantial drawdowns, or losses, remains inherent.
Mount begins by meticulously establishing the mathematical foundations of the Kelly criterion, illustrating how it maximizes the expected logarithmic growth rate of wealth. He then proceeds to construct a series of simulations involving a biased coin flip game with favorable odds. These simulations vividly depict the stochastic nature of Kelly betting, showcasing how even with a statistically advantageous scenario, significant capital fluctuations are not only possible but also probable. The simulations graphically illustrate the wide range of potential outcomes, including scenarios where the wealth trajectory exhibits substantial declines before eventually recovering and growing, emphasizing the volatility inherent in the strategy.
The core argument of the post revolves around the distinction between maximizing expected logarithmic growth and guaranteeing absolute profits. While the Kelly criterion excels at the former, it offers no safeguards against the latter. This vulnerability to large drawdowns, Mount argues, stems from the criterion's inherent reliance on leveraging favorable odds, which, while statistically advantageous in the long run, exposes the bettor to the risk of significant short-term losses. He further underscores this point by contrasting Kelly betting with a more conservative fractional Kelly strategy, demonstrating how reducing the bet size, while potentially slowing the growth rate, can significantly mitigate the severity of drawdowns.
In conclusion, Mount's post provides a nuanced and technically robust explanation of the Kelly criterion, dispelling the myth of its infallibility. He meticulously illustrates, using both mathematical proofs and computational simulations, that while the Kelly criterion provides a powerful tool for optimizing long-term growth, it offers no guarantees against substantial, and potentially psychologically challenging, temporary losses. This clarification serves as a crucial reminder that even statistically sound betting strategies are subject to the inherent volatility of probabilistic outcomes and require careful consideration of risk tolerance alongside potential reward.
A recent report from the U.S. Environmental Protection Agency (EPA) has unveiled a deeply concerning vulnerability within the nation's critical infrastructure: the drinking water systems serving approximately 26 million Americans face a heightened risk of cyberattacks. This sobering assessment underscores the potential for malicious actors to compromise the operational integrity of these essential utilities, potentially jeopardizing the health and safety of a significant portion of the population. The report meticulously details a confluence of factors contributing to this elevated risk profile, including the aging infrastructure of many water systems, which often relies on outdated and insecure technologies, coupled with a concerning lack of robust cybersecurity protocols and adequate investment in protective measures.
Specifically, the EPA identified key deficiencies, such as insufficiently implemented access controls, a scarcity of intrusion detection systems capable of identifying and mitigating malicious activity, and a general absence of comprehensive cybersecurity training programs for personnel. These vulnerabilities create exploitable weaknesses that could be leveraged by cybercriminals to disrupt water treatment processes, tamper with water quality, or even cause widespread service disruptions. The report further emphasizes the interconnected nature of these systems, highlighting how a successful breach in one facility could have cascading effects across a wider network of interconnected utilities.
The EPA's assessment underscores the urgency of addressing these cybersecurity gaps. The report advocates for increased federal funding to support the modernization of water infrastructure, the implementation of stringent cybersecurity standards, and the development of robust incident response plans. Furthermore, it emphasizes the critical need for enhanced collaboration between federal agencies, state and local governments, and the private sector to effectively share information and coordinate responses to potential cyber threats. This collaborative approach is deemed essential to bolstering the resilience of the nation's water infrastructure against the ever-evolving landscape of cyberattacks, ensuring the continued provision of safe and reliable drinking water to the millions of Americans who depend on these vital services. The potential consequences of inaction are dire, ranging from localized disruptions in water supply to widespread public health emergencies. Therefore, the EPA's report serves as a clarion call for immediate and decisive action to safeguard these essential systems from the growing threat of cyberattacks.
The Hacker News post "Drinking water systems for 26M Americans face high cybersecurity risks" has generated a number of comments discussing the vulnerabilities of water systems and potential solutions.
Several commenters express concern about the lack of security in critical infrastructure, highlighting the potential for disastrous consequences if these systems are compromised. They point out the reliance on outdated technology, insufficient funding, and a lack of awareness as contributing factors to these vulnerabilities.
One commenter notes the inherent difficulty in securing these systems due to their geographically dispersed nature and the frequent use of legacy systems that were not designed with security in mind. They suggest that focusing on core functionalities and isolating critical systems from network access could be a more effective approach than attempting to secure every endpoint.
Another commenter emphasizes the importance of proactive security measures, such as robust intrusion detection and incident response plans. They argue that waiting for an incident to occur before taking action is unacceptable given the potential impact on public health and safety.
The discussion also touches upon the challenges of implementing security measures in resource-constrained environments. Some commenters acknowledge the financial burden on smaller utilities and suggest that government assistance and shared resources might be necessary to address these challenges.
There's a discussion about the role of regulation and oversight in ensuring the security of water systems. Some advocate for stricter regulations and mandatory security standards, while others express concerns about the potential for overly burdensome regulations to hinder innovation and efficiency.
Finally, several commenters highlight the need for increased collaboration between government agencies, private utilities, and security experts to develop comprehensive security strategies and share best practices. They argue that a collective effort is essential to mitigate the risks and protect critical infrastructure from cyberattacks. One commenter specifically mentions the importance of information sharing and collaboration between different levels of government and the private sector.
In summary, the comments reflect a shared concern about the cybersecurity risks facing water systems and offer a variety of perspectives on how to address these challenges. The discussion emphasizes the need for proactive measures, increased funding, regulatory oversight, and collaboration between stakeholders to protect this vital infrastructure.
Summary of Comments ( 120 )
https://news.ycombinator.com/item?id=42466676
The Hacker News comments discuss the limitations and practical challenges of applying the Kelly criterion. Several commenters point out that the Kelly criterion assumes perfect knowledge of the probability distribution of outcomes, which is rarely the case in real-world scenarios. Others emphasize the difficulty of estimating the "edge" accurately, and how even small errors can lead to substantial drawdowns. The emotional toll of large swings, even if theoretically optimal, is also discussed, with some suggesting fractional Kelly strategies as a more palatable approach. Finally, the computational complexity of Kelly for portfolios of correlated assets is brought up, making its implementation challenging beyond simple examples. A few commenters defend Kelly, arguing that its supposed failures often stem from misapplication or overlooking its long-term nature.
The Hacker News post "Kelly Can't Fail" (linking to a Win-Vector blog post about the Kelly Criterion) generated several comments discussing the nuances and practical applications of the Kelly Criterion.
One commenter highlighted the importance of understanding the difference between "fraction of wealth" and "fraction of bankroll," particularly in situations involving leveraged bets. They emphasize that Kelly Criterion calculations should be based on the total amount at risk (bankroll), not just the portion of wealth allocated to a specific betting or investment strategy. Ignoring leverage can lead to overbetting and potential ruin, even if the Kelly formula is applied correctly to the initial capital.
Another commenter raised concerns about the practical challenges of estimating the parameters needed for the Kelly Criterion (specifically, the probabilities of winning and losing). They argued that inaccuracies in these estimates can drastically affect the Kelly fraction, leading to suboptimal or even dangerous betting sizes. This commenter advocates for a more conservative approach, suggesting reducing the calculated Kelly fraction to mitigate the impact of estimation errors.
Another point of discussion revolves around the emotional difficulty of adhering to the Kelly Criterion. Even when correctly applied, Kelly can lead to significant drawdowns, which can be psychologically challenging for investors. One commenter notes that the discomfort associated with these drawdowns can lead people to deviate from the strategy, thus negating the long-term benefits of Kelly.
A further comment thread delves into the application of Kelly to a broader investment context, specifically index funds. Commenters discuss the difficulties in estimating the parameters needed to apply Kelly in such a scenario, given the complexities of market behavior and the long time horizons involved. They also debate the appropriateness of using Kelly for investments with correlated returns.
Finally, several commenters share additional resources for learning more about the Kelly Criterion, including links to academic papers, books, and online simulations. This suggests a general interest among the commenters in understanding the concept more deeply and exploring its practical implications.