Skip to main content

用时间表告诉你如何“剪羊毛”,看不看空中国取决于你屁股坐哪


看懂这个时间表的必备知识:外汇储备概念,美国“剪羊毛”技术

1)2006年10月中国外汇储备超1万亿美元,美国开始推动人民币加速升值
2)2007年以淼拿拦鶳E巨头们不远万里地到中国投资房地产/股权,给中国送
去了以后5年如火如荼的PE
3)2007年QFII共有约50家,投资总额约100亿美元
4)2007年人民币开始加速升值
5)2008年美国金融危机,FED开始QE1/2/3美元加速大幅贬值,人民币快速大幅升值
6)2008年中国信贷理财市场诞生
7)2009年中国外汇储备突破2万亿美元
8)2009年理财市场规模超5万亿人民币,基本全部为银行和信托公司合作开发的产品
9)2011年中国外汇储备突破3万亿美元
10)2012年底,房地产PE基金规模超过2000亿人民币
11)2012年底,QFII总规模800亿美元,RQFII总规模500亿人民币
12)2012年底,理财市场规模达到24.7万亿人民币
13)2013年1月起,人民币加速升值
14)2013年3月,中国即将卸任的星空总理出台20%房地产增值税
15)2013年6月,FED暗示QE将推出,美元资产将逐步恢复强势,请各回各家,各找各妈。
16)2013年6月,中国央行断奶严控金融风险,不让银行做最后一个拿上接力棒的选手
。股市持续低迷,想退出,割吧。

从时间表上看,美帝“剪羊毛”之心昭然若揭,但是目前看中国的应对依旧得当,美元
资产想全身而退不太可能,可如果长期被迫呆在中国做国际雷锋,美国本土复苏乏力,
得不偿失。所以看不看空中国还是取决于你屁股坐哪。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...