Skip to main content

炒股是一个自知之明的游戏

发信人: rival (sss), 信区: Stock
标  题: 炒股是一个自知之明的游戏
发信站: BBS 未名空间站 (Sun Jan  1 09:29:35 2012, 美东)

zijing的回帖当中我写过了,这里抄过来,对有些人或许有些用处。

zijing的确很牛了,可以说是大家的目标或者说梦想。但炒股首先牵扯到一个自知之明的问题,紫荆即使还没有完全得道,在炒股当中也是出类拔萃了。但对 于大部分人来说,这辈子其实无论怎么努力都不可能得道了。没有得道其实没什么,但就怕明明没有那个本事,而去用0.001%尖子的trading操作,去 追求超高的利润。一旦亏损,马上又恐慌。说白了,还是贪婪和恐惧的问题。这就是我说股版大部分帖子有误导,因为这些帖子再把大家往一条根本不适合大部分人 的路上引。

诸如我这样的泛泛之辈,股市也是有机会的,但首先要否定自己,承认自己永远不可能是1年就弄出几十倍10倍甚至2倍的人,咱们的目标就是一年30%-50%. 其实这个30-50%坚持10年已经足够你提前退休了。我个人的经验就是4条:

   1. 纪律性。比如大阴棒坚决不买,不到自己定的TA indicator不买,等等
   2. 只买自己了解的股票或者买超级大蓝筹。买自己了解的股票能很清楚什么价值是可以买的,并且如果被套还可以淡定。如果懒的研究基本面,那就炒MCD等等。今年炒MCD/wmt buy on dip也赚得满满了,而且睡的香。
    3. 做单边。这个其实可以商榷,只是如果单边做不好,双边除了两面抽没其他结果
    4. 开发自己的系统,并且坚决执行或者自动交易。

我刚才提的4点是我自己的切身体会,别人可能不同,但纪律性无论如何是必须要保证的。

ok,说了半天。其实仍然大部分人股市是失败者,否则赢家的钱从哪里来得?大家都是尖子,或者都是纪律超强,钱从谁身上赚呢?呵呵

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...