Skip to main content

有两种股票很难用FA分析




1. 高科技
原因:竞争对手太多,谁知道会不会在MIT的哪个实验室正有几个精力旺盛的家伙在那
里通宵捣鼓你的竞争产品。
从FA看,谁在2007年能想到NOK回倒的那么快,而终结它命运的却是像苹果这样的不做
手机的企业。这就是为什么最近老巴坚决出来intel 的缘故。

2. 能源业。
原因:能源价格影响因素太多,真所谓牵一发而动全身。而能源企业本身却没有定价权
。连老巴2007年买cop都吃了大亏,几年就斩仓出局,和他老人家buy and hold 的方式
很不一样。

小小人和麻油兔就犯的后一种错误,不是他们看报表没看好,实在是企业没有定价权,
处于非常被动的地位。

如果您想buy and hold, 您就需要买那种
1. 有很宽护城河。
2. 有定价权。
3. 如果要beat spy, 这个企业还不能太大。
4. 最好是在那个特别的领域有统治权的企业。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...