Skip to main content

长期的投资分析


巴肥可以面试持股公司的管理层,小散没法做到
稳定盈利,稳定的发派股息,以及市场上占据垄断地位,很确定的东西,多数人都能看
到的东西,也确定了它的股市收益,比如公共类的CHL
除非有突发事件造成的恐慌,但对5年以上的长期发展影响小,比如BP漏油,会有比较
好的收益比


【 在 boglehead (fast is slow) 的大作中提到: 】
: 我的一点青蛙看法:
: 对于长期的投资分析来说,grpn换CEO之类的消息可能不是那么重要,要在意的是公司
: 的成长和盈利。20年稳定盈利,20年稳定的发派股息,以及市场上占据垄断地位,都是
: 很好的FA的标准。财报什么的是为了证明持久稳定的盈利而不是今年怎么样明年怎么样
: 。像巴菲特有些购买的股票是因为认识那些公司的管理层,认为这样优秀的经理人会带
: 来良好的盈利,可能连财报都不用看。
: 然而市场是非理性的,由于各种各样的消息会导致股价的上扬或者下跌,一个真的FA信
: 徒会在股票价格远低于内在价值的时候买入并且长期持有,然后依靠复利来不断升值。
: 所以是不是能看到最新的财报有什么关系呢?哪怕是根据过去十年全部的财报也足够判
: 断一家公司是否值得投资。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...