Skip to main content

三个比喻道尽投资精髓


FA方面的书看过了不少n>>10。所谓真传一句话,假话万卷书。

我觉得有三个比喻将投资的精髓说的很透彻,我试着给大家说说:
1. 股市就是赛马场。
赌马的人大多数都会亏钱,原因是大多数马的赔率已经设定为对赌马的人不利。一匹
非常优秀的马不一定可以给你挣钱,因为赔率不对。你要找的是那匹赔率设定的不对的
马。
启发:
1) 一个各方面都很好的公司股票并不一定是好的投资,因为赔率不对。已经
overvalue 了。
2) 大多数股票都不值得去买,因为还是因为赔率对你不利。大家应该切实减少交易
次数。一年买三到五只股票就很多了。
3)往往是大家觉得有一点问题的公司,如果问题的影响不是那么大,所以反而是好投
资。
4)一个很坏的公司当然也不是好投资,因为他根本就没有取胜的可能,破产指日可待。

2. 投资人就好像在打棒球。
没看到好球就不要出击,但一旦发现好球就一定要抓住机会,全力出击。
启发:
1)每天我们都看到很多股票在股版中被人提及,应该说:99%都是毫无投资价值的。
抑制住自己的购买冲动很重要。
2)如果真的发现好的投资机会,一定要全力出击,不是撒胡椒面。投个几千翻十倍又
怎么样呢?
3)买后就耐心持有。一直到这个公司的基本面发生根本变化再卖出。持有三年是最基
本的。
4)什么样的公司值得长期持有:巴菲特总结的好,你买了后,不担心股市关闭三年的
股票才值得持有。不是击鼓传花。

3. 每做一个投资就在棒球卡上打一个洞,一生只有20次机会。
启发:
1) 不要东搞搞,西搞搞。到处去要PICK,随便试。
2)一生只需要抓住3到5次好的机会,就会挣很多很多钱。

当然运气也很重要。实在太走霉运也是没有办法的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...