Skip to main content

投资地产,五年实现财务自由-- ZT

生命是宝贵的、人生是短暂的, 人生应该还是自由的。想滑雪就去滑雪,想打球就去打球。一年一家至少应该出去旅游两次,看看不同文化的人群是怎么生活的。父母双全、兄弟姐妹同在、亲朋好友同乐,干自己想干的事情,拥有健康、幸福、自由和充实的人生,这才是我们不论生活在哪个国度应该有的生活。

  可是现实生活并非如此:许多人每天上班路上就要化两个小时;担心公司裁员,夜里常常失眠;有的家庭破裂,甚至有人自杀。压力、财政压力会压垮一个人的健康、一个幸福的家庭和一个人的光辉未来。解决收入问题,是我们每个人拥有自由人生的前提:没有财务自由,就不会有时间上的自由;没有时间自由,就不会充分享受人生。

  拥有财务自由的人,并不一定是家有万贯的人。财务自由是指一个人不用工作但仍然有可以维持现有的生活水准的收入,有的家庭是2000美金,有的家庭是3000美金,有的家庭需要5000美金。这种收入不是自己去干才有的收入。一个家庭的收入可以是以下三种:打工或开小生意的收入;雇人的生意收入和投资收入。

  雇人赚钱的收入(OPT)和投资收入(OPM)属于被动型收入,有被动型收入是解决财政问题的关键。当每月被动型收入大于等于一个家庭的每月开销时,我们就叫财务自由了。获得财务自由的秘诀是雇人赚钱(开公司)和用别人的钱赚钱(投资)。

  投资房地产是借银行的钱去投资实现财务自由的重要手段,也是切实可行,普通人都可以做得到的投资手段。由于人口在增加,地产资源有限,因此地产长线肯定是涨价。另外地产投资是自己可以控制的投资,风险小而回报平稳。地产投资的产品很多,从土地、商铺、Apt Building、Plaza 到民宅应有尽有。房地产是一个永远不缺产品而又永远不缺市场的行业。

  为什么需要五年呢?获得财务自由的难度有多大?我们说相当于读一个学士学位。只要观念对了,思路有了,有计划、有团队、有Mentors(老师),获得财务自由就真的只需4-5年时间。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...