Skip to main content

投资小结 - 投资人的基本需求


投资小结  - 投资人的基本需求

长期来说,应该投资跟人类基本需求密切相关的东西。人类的基本需求无非是吃喝玩乐
四个字,因为人类历史的发展一再表明,人活着主要就是吃吃喝喝,玩玩乐乐。另外,
现代人大多希望可以活得久些,那就再加上个医字吧。比较一下麦当劳,可口可乐,迪
斯尼等这类股票的回报跟同期指数的回报,这个简单的投资理念的可靠性不言而喻。

股票名称               1980年至今的累计回报
麦当劳(MCD)              8700.62%
可口可乐(KO)             5521.76%
迪斯尼  (DIS)            5368.66%
联合医疗(UNH)            17960.39% (3/26/1990以来的回报)
标普500(SP500)           1300.87%

当然为了降低投资个股的风险,可以选择投资基金,比如consumer staples fund 里主
要就是制造必需消费品的公司,leisure fund主要是跟玩乐公司有关的,health care
fund里主要是提供医疗健康服务的公司。随着婴儿潮那代人步入退休年龄,医疗类公司
在今后10-20年应该会有不错的表现。另外一个值得关注的趋势是,随着技术的发展,
人的生活变得越来越舒适。虽然大部分技术的开发是为了提高生产力,但某些技术公司
的产品其实是提供了一种leisure。不管哪类技术,投资真正给人类生活带来舒适度的
技术公司回报也是不错的。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...