Skip to main content

实际情况比大多数人想的还糟糕 mark my words

发信人: oyxy (oyxy), 信区: Stock
标  题: 实际情况比大多数人想的还糟糕 mark my words
发信站: BBS 未名空间站 (Sun Aug  7 15:57:16 2011, 美东)

这些天全世界关心经济的人好像突然一下猛增了,好像这些个危机都是这几个星期才出
来的一样,好像大家突然才发现原来美国08年后没解决啥实际问题。我只能说most
people dont even have a clue about what's going on.我说几句,大家可以mark my
words

1. S&P500今年至少会探底到1100点,甚至更低。
2. QE3在选举前会出来,但是不可能让大盘再创任何新高。
3. QE会不断的进行下去,实体经济无法从根本好转,美国经济会进入严重的滞涨时期。
4. Oil和base metal的价格近期不会超过2007年的最高位
5. 黄金持续上涨,到2016年会升到5000以上
6. 农产品价格指数稳步上涨,会outperform油价。
7. 中国会被美国QE继续拖累,让通膨越加严重,终会有可能影响政治稳定。
--

※ 来源:·WWW 未名空间站 海外: mitbbs.com 中国: mitbbs.cn·[FROM: 68.124.]

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec