Skip to main content

A股还是不要碰了。


为什么呢?

除了众所周知的2大原因以外,

还有就是一个公众的信任力。

dow 过去几十年一直都是不断地增长,即便是遇到大波动,总体态势还是跟随者经济呈
正面增长。这就是为什么尽量不要short的原因,也是资金源源不断的涌入股市的原因。

反观A股,从企业,到fund,到大大小小的investor,

所有的人都想在股市里面套利,更没有人愿意hold几年。

这些除了人心浮躁以外,更重要的是普通投资者对市场缺乏信任。

和东欧国家一样,百姓没有一个feel comfortable的心态,对外在事物的不信任,

导致了市场不能有效地运作,大部分资金涌入楼市,黄金,甚至是saving。

所以不管经济发展的有多厉害,公信力没有了,

这是一个企业,一个市场,最大的问题,

就像是甲A,发展不起来了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...