Skip to main content

与一位犹太老头谈投资和经济

俺家隔壁是犹太人.每天早晨俺喜欢到后院去活动活动老胳膊老腿的.隔壁的犹太老头也在做同样的事.一来二去就同他混熟了.老头叫史密斯,退休前是一家上市公司的财务主管(CFO).

他喜欢打听中国的经济和政治.俺也趁机向他请教投资和经济方面的问题.

俺问他,现在美国的经济危机看不到头,钱放在哪里好?房产?股票?黄金?外币?

他说,他的钱一部分换成金币放在银行里,一部分是长期持有的商业房地产,50%是现金(包括外币).

俺问,你守这么多的现金不怕通货膨胀,美元贬值吗?

他说,现在大家都在谈论通货膨胀.汽油,食品涨价了, 而且还要继续涨,这是事实.但这些都是穷人们担心的事.作为一个投资者,你看,房价差不多掉了一半.五年前一百万根本买不到一个像样的房子,现在一百万可以买什么样的房子?GE五年前是几块一股,现在是几块一股?...从投资者的角度看,房产和股票是美国最大的资产.只要这两样东西继续往下掉,你就根本不用担心美元贬值.记住,当一场大的经济危机爆发时,现金是王!听老一代的人说,上一世纪30年代,纽约的豪宅才几万块一栋,世界名画才几千块一幅...守着现金,到时候你就等着拣便宜吧!

听说犹太人拥有的现金可以把整个美国买下来,从这老头的话来看,此言不虚也.

这老头的话也算是一家之言吧.凡中国人,手上总有几张钞票,看到美国政府不断地印钱,大家都惶惶不可终日,生怕再过几年美元都成了废纸.现在看来犹太人手上的现金比老中要多得多.他们在等什么?值得我们深思.


Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...