Skip to main content

美国退休金计划的黑暗面


美国退休金计划的黑暗面

今天晚上PBS Front Line节目播送了一个关于美国退休金计划(401403等)的记录电视片,其中用大量的专家和用户访谈揭露了一个华尔街的盈利内幕。

美国政府法律规定了退休金投资的延迟交税优惠政策,迫使亿万工薪阶层把一大部分工资收入放进了各种各样的退休金计划账户里。而绝大多数的退休金是投入到管理基金公司经营的投资基金里。而基金内部扣收的各种名目繁多的费用,有时会高达25个百分点。

而基金销售从业人员大部分是靠推销基金来拿佣金的。他们把佣金率最高的基金作为自己的推销重点,根本忽视投资者的利益。

换一句或说,美国国会和华尔街联手,两面夹击,挟持了亿万工薪阶层,将辛辛苦苦省下来的退休养老金拱手送进虎口,让华尔街的大佬们谋取暴利。

我觉得这是跟每一个在美国有工作的人的切身利益有关的话题,所以推荐给众网友们去看一看这个节目。然后认真看一看你自己的退休金计划。

The Retirement Gamble



逸宽于孑孓盧

4/23/13

羁旅达城

Watch The Retirement Gamble on PBS. See more from FRONTLINE.

Watch The Retirement Gamble on PBS. See more from FRONTLINE.

Watch The Retirement Gamble on PBS. See more from FRONTLINE.

Watch The Retirement Gamble on PBS. See more from FRONTLINE.

Watch The Retirement Gamble on PBS. See more from FRONTLINE.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...